{"id":"https://openalex.org/W1989811622","doi":"https://doi.org/10.1109/wimob.2012.6379111","title":"Evaluating the threat of epidemic mobile malware","display_name":"Evaluating the threat of epidemic mobile malware","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W1989811622","doi":"https://doi.org/10.1109/wimob.2012.6379111","mag":"1989811622"},"language":"en","primary_location":{"id":"doi:10.1109/wimob.2012.6379111","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2012.6379111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018800728","display_name":"Christian Szongott","orcid":null},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Christian Szongott","raw_affiliation_strings":["Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover","Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover","institution_ids":[]},{"raw_affiliation_string":"Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover, Germany#TAB#","institution_ids":["https://openalex.org/I114112103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047869381","display_name":"Benjamin Henne","orcid":null},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Benjamin Henne","raw_affiliation_strings":["Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover","Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover","institution_ids":[]},{"raw_affiliation_string":"Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover, Germany#TAB#","institution_ids":["https://openalex.org/I114112103"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000498964","display_name":"Matthew Smith","orcid":"https://orcid.org/0000-0002-2724-1379"},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthew Smith","raw_affiliation_strings":["Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover","Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover","institution_ids":[]},{"raw_affiliation_string":"Distributed Computing & Security Group, Gottfried Wilhelm Leibniz University of Hannover, Germany#TAB#","institution_ids":["https://openalex.org/I114112103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018800728"],"corresponding_institution_ids":["https://openalex.org/I114112103"],"apc_list":null,"apc_paid":null,"fwci":2.6933,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.92401646,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"443","last_page":"450"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.9291177988052368},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8462014198303223},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7317839860916138},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6883139610290527},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.5898051857948303},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.5819229483604431},{"id":"https://openalex.org/keywords/mobile-technology","display_name":"Mobile technology","score":0.5085092782974243},{"id":"https://openalex.org/keywords/mobile-web","display_name":"Mobile Web","score":0.4813852608203888},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45265665650367737},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.44479626417160034},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18106502294540405},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17077875137329102},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15648558735847473}],"concepts":[{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.9291177988052368},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8462014198303223},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7317839860916138},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6883139610290527},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.5898051857948303},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.5819229483604431},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.5085092782974243},{"id":"https://openalex.org/C516764902","wikidata":"https://www.wikidata.org/wiki/Q1043805","display_name":"Mobile Web","level":4,"score":0.4813852608203888},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45265665650367737},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.44479626417160034},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18106502294540405},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17077875137329102},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15648558735847473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob.2012.6379111","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2012.6379111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3","score":0.8500000238418579}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W20023138","https://openalex.org/W86565278","https://openalex.org/W378983897","https://openalex.org/W1593031142","https://openalex.org/W1963876301","https://openalex.org/W1970306653","https://openalex.org/W1972673017","https://openalex.org/W1978136502","https://openalex.org/W1984773706","https://openalex.org/W1988843485","https://openalex.org/W2044062684","https://openalex.org/W2058710608","https://openalex.org/W2101866211","https://openalex.org/W2113496760","https://openalex.org/W2113755340","https://openalex.org/W2115026336","https://openalex.org/W2115618531","https://openalex.org/W2123557610","https://openalex.org/W2123662953","https://openalex.org/W2127963467","https://openalex.org/W2142145056","https://openalex.org/W2171528862","https://openalex.org/W3178988496","https://openalex.org/W4412345202","https://openalex.org/W6600852038","https://openalex.org/W6613043737","https://openalex.org/W6646466753","https://openalex.org/W6677043194"],"related_works":["https://openalex.org/W2538622067","https://openalex.org/W2181494682","https://openalex.org/W3114159050","https://openalex.org/W4245250093","https://openalex.org/W2609233367","https://openalex.org/W2484248966","https://openalex.org/W4244354662","https://openalex.org/W4200054778","https://openalex.org/W2777464647","https://openalex.org/W2965539362"],"abstract_inverted_index":{"While":[0],"mobile":[1,30,38,51,76,88,100,110,123,136,147,171,178,190],"malware":[2,89,111,148],"has":[3,182],"played":[4],"a":[5,55,84,98,105,109,122,168,185],"relatively":[6],"small":[7],"role":[8],"compared":[9],"to":[10,42,62,82,116,141],"the":[11,16,20,26,29,35,72,80,133,160,175],"behemoth":[12],"of":[13,28,37,50,59,75,87,93,107,135,146,166,170],"desktop":[14],"malware,":[15],"changes":[17],"both":[18],"in":[19,25,153],"capability":[21,81],"as":[22,24,40],"well":[23],"proliferation":[27],"devices":[31,39,52,77,137],"will":[32],"steadily":[33],"increase":[34],"attractiveness":[36],"resources":[41],"be":[43],"attacked.":[44],"The":[45],"increased":[46],"usage":[47],"and":[48,119,138,149,163,174],"connectivity":[49],"opens":[53,78],"up":[54,79],"much":[56],"larger":[57],"set":[58],"attack":[60],"vectors":[61],"compromise":[63],"these":[64,114],"devices.":[65],"In":[66],"this":[67],"paper,":[68],"we":[69,128],"discuss":[70],"how":[71],"new":[73,85],"features":[74,115],"create":[83],"generation":[86],"which":[90],"is":[91],"capable":[92],"realistically":[94],"spreading":[95],"epidemically":[96],"on":[97],"fully":[99],"infection":[101,151],"vector.":[102,125],"We":[103],"present":[104,150],"prototype":[106],"such":[108],"that":[112,159],"uses":[113],"replicate":[117],"itself":[118],"spread":[120,145],"over":[121],"device-to-device":[124],"Using":[126],"simulations":[127],"give":[129],"quantitative":[130],"support":[131],"for":[132,142,188],"number":[134],"conditions":[139],"needed":[140],"an":[143],"epidemic":[144,189],"scenarios":[152],"downtown":[154],"Chicago.":[155],"Our":[156],"results":[157],"show":[158],"recent":[161],"growth":[162],"market":[164],"dominance":[165],"just":[167],"handful":[169],"phone":[172],"companies":[173],"trend":[176],"towards":[177],"operating":[179],"systems":[180],"monoculture":[181],"already":[183],"created":[184],"viable":[186],"substrate":[187],"malware.":[191]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-02-22T13:39:03.778224","created_date":"2025-10-10T00:00:00"}
