{"id":"https://openalex.org/W4412170841","doi":"https://doi.org/10.1109/tnse.2025.3586909","title":"Modeling and Predicting Malware Propagation in Double-Layer Computer Networks","display_name":"Modeling and Predicting Malware Propagation in Double-Layer Computer Networks","publication_year":2025,"publication_date":"2025-07-10","ids":{"openalex":"https://openalex.org/W4412170841","doi":"https://doi.org/10.1109/tnse.2025.3586909"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3586909","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3586909","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058003632","display_name":"Dongli Duan","orcid":"https://orcid.org/0000-0002-3920-2326"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongli Duan","raw_affiliation_strings":["School of Management, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073707134","display_name":"Xinjie Yang","orcid":"https://orcid.org/0000-0002-7581-0441"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohao Yang","raw_affiliation_strings":["School of Management, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018745403","display_name":"Changchun Lv","orcid":null},"institutions":[{"id":"https://openalex.org/I148099405","display_name":"Xi'an University of Architecture and Technology","ror":"https://ror.org/04v2j2k71","country_code":"CN","type":"education","lineage":["https://openalex.org/I148099405"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changchun Lv","raw_affiliation_strings":["School of Information and Control Engineering, Xi&#x0027;an University of Architecture and Technology, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Xi&#x0027;an University of Architecture and Technology, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I148099405"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052222899","display_name":"Zhiqiang Cai","orcid":"https://orcid.org/0000-0002-7380-8110"},"institutions":[{"id":"https://openalex.org/I4210115513","display_name":"Xi\u2019an University","ror":"https://ror.org/01zzmf129","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210115513"]},{"id":"https://openalex.org/I4210141776","display_name":"China XD Group (China)","ror":"https://ror.org/04ceqst84","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210141776"]},{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Cai","raw_affiliation_strings":["School of Mechanical and Electrical Engineering, Northwestern Polytechnical University, Xi&#x0027;an, China","School of Mechanical and Electrical Engineering, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Mechanical and Electrical Engineering, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Mechanical and Electrical Engineering, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I4210141776","https://openalex.org/I4210115513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058003632"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":1.5458,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.85689536,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"717","last_page":"727"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7232972383499146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6884522438049316},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.45007824897766113},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40765345096588135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2182992398738861},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.08906465768814087}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7232972383499146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6884522438049316},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.45007824897766113},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40765345096588135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2182992398738861},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.08906465768814087},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3586909","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3586909","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.4300000071525574}],"awards":[{"id":"https://openalex.org/G3059042446","display_name":null,"funder_award_id":"72231008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5776997243","display_name":null,"funder_award_id":"72071153","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8884624108","display_name":null,"funder_award_id":"2022GY-325","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1878853999","https://openalex.org/W1976506837","https://openalex.org/W1994529225","https://openalex.org/W2040428201","https://openalex.org/W2057541707","https://openalex.org/W2061158874","https://openalex.org/W2067327603","https://openalex.org/W2110919848","https://openalex.org/W2124486211","https://openalex.org/W2128397999","https://openalex.org/W2143224214","https://openalex.org/W2143389120","https://openalex.org/W2154663898","https://openalex.org/W2171322701","https://openalex.org/W2263008129","https://openalex.org/W2277170616","https://openalex.org/W2411326260","https://openalex.org/W2584686170","https://openalex.org/W2614753645","https://openalex.org/W2784113120","https://openalex.org/W2793390856","https://openalex.org/W2804900588","https://openalex.org/W2884539532","https://openalex.org/W2889096365","https://openalex.org/W2904394492","https://openalex.org/W2945015800","https://openalex.org/W2973056123","https://openalex.org/W2978887504","https://openalex.org/W3032319387","https://openalex.org/W3035716901","https://openalex.org/W3037826211","https://openalex.org/W3129375586","https://openalex.org/W3160546232","https://openalex.org/W3163598082","https://openalex.org/W3165740926","https://openalex.org/W3213840904","https://openalex.org/W4226276164","https://openalex.org/W4226393988","https://openalex.org/W4281757828","https://openalex.org/W4290097514","https://openalex.org/W4292120401","https://openalex.org/W4296307122","https://openalex.org/W4312053021","https://openalex.org/W4361284633","https://openalex.org/W4366439857","https://openalex.org/W4383222020","https://openalex.org/W4386090462","https://openalex.org/W4386902812","https://openalex.org/W4387623768"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819"],"abstract_inverted_index":{"Traditional":[0],"malware":[1,26,143,162],"propagation":[2,27,153,163],"models":[3],"exhibit":[4],"inherent":[5],"limitations":[6],"in":[7,132,164,176],"addressing":[8],"topological":[9],"heterogeneity,":[10],"computational":[11,71],"complexity,":[12,72],"and":[13,42,114,124,138,167,184],"quantifying":[14],"perturbation":[15],"responses.":[16],"To":[17,69],"overcome":[18],"these":[19,149],"challenges,":[20],"this":[21],"paper":[22],"proposes":[23],"a":[24,32,47,56,65,73,88,158,169],"novel":[25],"dynamics":[28],"model":[29],"based":[30],"on":[31,111,142],"double-layer":[33,165],"network":[34],"architecture.":[35],"By":[36],"decomposing":[37],"large-scale":[38],"networks":[39,166],"into":[40,80,87],"core":[41,53],"peripheral":[43,62],"subnetworks,":[44],"we":[45],"develop":[46],"heterogeneous":[48],"recovery":[49,67],"strategy":[50],"framework:":[51],"the":[52,61,81,96,128,134],"subnetwork":[54,63],"adopts":[55],"state-dependent":[57],"feedback":[58],"mechanism,":[59],"while":[60],"employs":[64],"fixed":[66],"rate.":[68],"reduce":[70],"degree-weighted":[74],"dimensionality":[75],"reduction":[76],"method":[77],"is":[78,93],"integrated":[79],"framework,":[82],"transforming":[83],"high-dimensional":[84],"differential":[85],"equations":[86],"low-dimensional":[89],"system.":[90],"Propagation":[91],"behavior":[92],"analyzed":[94],"via":[95],"basic":[97],"reproduction":[98],"number":[99],"(<inline-formula":[100],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[102],"notation=\"LaTeX\">$R_{0}$</tex-math></inline-formula>)":[103],"to":[104],"identify":[105],"dominant":[106],"spreading":[107],"factors.":[108],"Validation":[109],"experiments":[110],"Erd\u0151s-R\u00e9nyi":[112],"(ER)":[113],"Barab\u00e1si-Albert":[115],"(BA)":[116],"synthetic":[117],"networks,":[118],"as":[119,121,181],"well":[120],"real-world":[122],"Facebook":[123],"Email-Eu-core":[125],"datasets,":[126],"demonstrate":[127],"model'":[129],"s":[130],"effectiveness":[131],"predicting":[133],"impacts":[135],"of":[136],"structural":[137],"dynamic":[139],"parameter":[140],"perturbations":[141,150],"propagation.":[144],"Further":[145],"analysis":[146],"reveals":[147],"how":[148],"quantitatively":[151],"influence":[152],"dynamics.":[154],"This":[155],"research":[156],"establishes":[157],"predictive":[159],"framework":[160],"for":[161,172],"provides":[168],"theoretical":[170],"foundation":[171],"proactive":[173],"defense":[174],"strategies":[175],"critical":[177],"infrastructure":[178],"systems":[179],"such":[180],"power":[182],"grids":[183],"communication":[185],"networks.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-23T05:10:03.516525","created_date":"2025-10-10T00:00:00"}
