{"id":"https://openalex.org/W2621116887","doi":"https://doi.org/10.1109/tifs.2017.2711424","title":"The Spatial\u2013Temporal Perspective: The Study of the Propagation of Modern Social Worms","display_name":"The Spatial\u2013Temporal Perspective: The Study of the Propagation of Modern Social Worms","publication_year":2017,"publication_date":"2017-06-02","ids":{"openalex":"https://openalex.org/W2621116887","doi":"https://doi.org/10.1109/tifs.2017.2711424","mag":"2621116887"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2711424","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2711424","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/The_spatial-temporal_perspective_the_study_of_the_propagation_of_modern_social_worms/20837557","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018085680","display_name":"Tianbo Wang","orcid":"https://orcid.org/0000-0002-0227-9557"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianbo Wang","raw_affiliation_strings":["Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035296513","display_name":"Chunhe Xia","orcid":"https://orcid.org/0000-0003-4424-8449"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunhe Xia","raw_affiliation_strings":["Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China","School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112521638","display_name":"Zhong Li","orcid":"https://orcid.org/0009-0003-1109-9448"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Li","raw_affiliation_strings":["Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100430482","display_name":"Xiaochen Liu","orcid":"https://orcid.org/0000-0001-5362-4018"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochen Liu","raw_affiliation_strings":["Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5018085680"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":1.7541,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.86746119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"12","issue":"11","first_page":"2558","last_page":"2573"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.6877999305725098},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6218203902244568},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5068522095680237},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32682323455810547},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.11158901453018188}],"concepts":[{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.6877999305725098},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6218203902244568},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5068522095680237},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32682323455810547},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.11158901453018188},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2017.2711424","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2711424","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30100387","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20837557","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/The_spatial-temporal_perspective_the_study_of_the_propagation_of_modern_social_worms/20837557","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20837557","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/The_spatial-temporal_perspective_the_study_of_the_propagation_of_modern_social_worms/20837557","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G4645851237","display_name":null,"funder_award_id":"U1636208","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1492113516","https://openalex.org/W1526975558","https://openalex.org/W1964585873","https://openalex.org/W1975789484","https://openalex.org/W1980065740","https://openalex.org/W1982691206","https://openalex.org/W1984156542","https://openalex.org/W2034279876","https://openalex.org/W2050642268","https://openalex.org/W2056284729","https://openalex.org/W2060740733","https://openalex.org/W2067064024","https://openalex.org/W2073457560","https://openalex.org/W2075594102","https://openalex.org/W2088907607","https://openalex.org/W2100734403","https://openalex.org/W2103396020","https://openalex.org/W2103811250","https://openalex.org/W2107510910","https://openalex.org/W2110725936","https://openalex.org/W2112519645","https://openalex.org/W2113496760","https://openalex.org/W2114969599","https://openalex.org/W2124885201","https://openalex.org/W2128397999","https://openalex.org/W2133400794","https://openalex.org/W2138373763","https://openalex.org/W2142864044","https://openalex.org/W2146910660","https://openalex.org/W2393902438","https://openalex.org/W2441196741","https://openalex.org/W2572026813","https://openalex.org/W4230399697","https://openalex.org/W4237627353","https://openalex.org/W4238664777","https://openalex.org/W4390766678"],"related_works":["https://openalex.org/W1987689495","https://openalex.org/W4254805721","https://openalex.org/W3008425890","https://openalex.org/W1890018278","https://openalex.org/W3034138874","https://openalex.org/W2317206952","https://openalex.org/W2624148578","https://openalex.org/W3009388254","https://openalex.org/W2170879722","https://openalex.org/W2353686261"],"abstract_inverted_index":{"Due":[0],"to":[1,28,35,80,226],"the":[2,20,37,67,145,153,172,183,242],"critical":[3,88],"security":[4],"threats":[5],"imposed":[6],"by":[7,58,124,168],"social":[8,24,41,82,201,248],"worms,":[9],"such":[10],"as":[11],"Twitter":[12],"and":[13,16,34,70,95,213,215,223],"Facebook,":[14],"modeling":[15,241],"simulation":[17,203,229],"study":[18],"of":[19,23,147,160,177,185,246],"propagation":[21,38,244],"dynamics":[22],"worms":[25,42,249],"is":[26,237],"essential":[27],"predict":[29],"their":[30],"potential":[31],"for":[32,240],"damage":[33],"understand":[36],"characteristics.":[39],"Modern":[40],"exhibit":[43],"one":[44],"new":[45,77],"feature,":[46],"<italic":[47,90,96,105,132,141],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[48,91,97,106,133,142],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">reinfection-notification</i>":[49],".":[50,101,137],"It":[51],"indicates":[52],"that":[53,116,156,174,234],"malicious":[54,68],"messages":[55,78,164,178,187],"are":[56,86,122,166,188],"sent":[57],"neighbors":[59],"whenever":[60],"any":[61],"susceptible":[62],"or":[63,170],"infected":[64],"recipients":[65],"open":[66],"attachments,":[69],"a":[71,81,104,140,199],"user":[72],"will":[73],"get":[74],"reminders":[75],"when":[76],"come":[79],"account.":[83],"Meanwhile,":[84],"there":[85],"two":[87],"problems:":[89],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">dynamic":[92,134],"host":[93,135],"usage</i>":[94,136],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">temporal":[98],"message":[99,149,161],"processing</i>":[100],"First,":[102],"from":[103,128,139,152],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">spatial</i>":[107],"perspective,":[108,144],"previous":[109],"models":[110],"have":[111,179],"not":[112],"taken":[113],"into":[114],"account":[115],"public":[117],"hosts":[118],"in":[119,205,250],"different":[120],"locations":[121],"shared":[123],"several":[125],"users":[126],"arising":[127],"human":[129],"mobility,":[130],"namely,":[131],"Second,":[138],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">temporal</i>":[143],"problem":[146],"temporal":[148],"processing":[150],"results":[151,232],"improper":[154],"assumption":[155],"during":[157],"this":[158,206],"period":[159],"checking,":[162],"unread":[163,186],"all":[165],"read":[167],"default,":[169],"under":[171],"condition":[173],"some":[175],"parts":[176],"been":[180],"read,":[181],"but":[182],"rest":[184],"no":[189],"longer":[190],"processed":[191],"afterward.":[192],"To":[193],"address":[194],"these":[195],"problems,":[196],"we":[197],"present":[198],"novel":[200],"worm":[202],"model":[204,236],"paper,":[207],"which":[208],"adopts":[209],"\u201csocial":[210],"network-based":[211],"sharing\u201d":[212],"\u201csorting":[214],"attenuation\u201d":[216],"methods.":[217],"We":[218],"perform":[219],"comprehensive":[220],"theoretical":[221],"analyses":[222],"experimental":[224],"evaluation":[225],"validate":[227],"our":[228,235],"model.":[230],"The":[231],"show":[233],"more":[238],"suitable":[239],"complicated":[243],"behaviors":[245],"modern":[247],"hierarchical":[251],"networks.":[252]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
