{"id":"https://openalex.org/W3036712562","doi":"https://doi.org/10.1109/icce-taiwan49838.2020.9257999","title":"Modeling of malware diffusion with the FLIPIT game","display_name":"Modeling of malware diffusion with the FLIPIT game","publication_year":2020,"publication_date":"2020-09-28","ids":{"openalex":"https://openalex.org/W3036712562","doi":"https://doi.org/10.1109/icce-taiwan49838.2020.9257999","mag":"3036712562"},"language":"en","primary_location":{"id":"doi:10.1109/icce-taiwan49838.2020.9257999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-taiwan49838.2020.9257999","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013001176","display_name":"Hideyoshi Miura","orcid":"https://orcid.org/0000-0001-9487-9084"},"institutions":[{"id":"https://openalex.org/I56624758","display_name":"Kansai University","ror":"https://ror.org/03xg1f311","country_code":"JP","type":"education","lineage":["https://openalex.org/I56624758"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hideyoshi Miura","raw_affiliation_strings":["Faculty of Engineering Science, Kansai University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering Science, Kansai University, Osaka, Japan","institution_ids":["https://openalex.org/I56624758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079640692","display_name":"Tomotaka Kimura","orcid":"https://orcid.org/0000-0003-0677-9767"},"institutions":[{"id":"https://openalex.org/I133984924","display_name":"Doshisha University","ror":"https://ror.org/01fxdkm29","country_code":"JP","type":"education","lineage":["https://openalex.org/I133984924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomotaka Kimura","raw_affiliation_strings":["Faculty of Science and Engineering, Doshisha University, Kyoto, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and Engineering, Doshisha University, Kyoto, Japan","institution_ids":["https://openalex.org/I133984924"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087962607","display_name":"Kouji Hirata","orcid":"https://orcid.org/0000-0002-9607-6864"},"institutions":[{"id":"https://openalex.org/I56624758","display_name":"Kansai University","ror":"https://ror.org/03xg1f311","country_code":"JP","type":"education","lineage":["https://openalex.org/I56624758"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kouji Hirata","raw_affiliation_strings":["Faculty of Engineering Science, Kansai University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering Science, Kansai University, Osaka, Japan","institution_ids":["https://openalex.org/I56624758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013001176"],"corresponding_institution_ids":["https://openalex.org/I56624758"],"apc_list":null,"apc_paid":null,"fwci":0.2663,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.51971768,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"119","issue":"460","first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10482","display_name":"Mathematical and Theoretical Epidemiology and Ecology Models","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9074655771255493},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7405942678451538},{"id":"https://openalex.org/keywords/stochastic-game","display_name":"Stochastic game","score":0.7050455808639526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6872156262397766},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.6464331746101379},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5467008352279663},{"id":"https://openalex.org/keywords/epidemic-model","display_name":"Epidemic model","score":0.5065881013870239},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.4818602502346039},{"id":"https://openalex.org/keywords/normal-form-game","display_name":"Normal-form game","score":0.46862295269966125},{"id":"https://openalex.org/keywords/best-response","display_name":"Best response","score":0.4670846462249756},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.34790441393852234},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.23110699653625488},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15287470817565918},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.09302425384521484},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07690808176994324}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9074655771255493},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7405942678451538},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.7050455808639526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6872156262397766},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.6464331746101379},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5467008352279663},{"id":"https://openalex.org/C1627819","wikidata":"https://www.wikidata.org/wiki/Q2572354","display_name":"Epidemic model","level":3,"score":0.5065881013870239},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.4818602502346039},{"id":"https://openalex.org/C155930848","wikidata":"https://www.wikidata.org/wiki/Q1069099","display_name":"Normal-form game","level":4,"score":0.46862295269966125},{"id":"https://openalex.org/C32407928","wikidata":"https://www.wikidata.org/wiki/Q2733833","display_name":"Best response","level":3,"score":0.4670846462249756},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.34790441393852234},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.23110699653625488},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15287470817565918},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.09302425384521484},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07690808176994324},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icce-taiwan49838.2020.9257999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-taiwan49838.2020.9257999","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","raw_type":"proceedings-article"},{"id":"mag:3194781997","is_oa":false,"landing_page_url":"https://www.ieice.org/ken/paper/20200306j1vF/eng/","pdf_url":null,"source":{"id":"https://openalex.org/S4306512848","display_name":"IEICE Technical Report; IEICE Tech. Rep.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEICE Technical Report; IEICE Tech. Rep.","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3","score":0.8700000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2008620264","https://openalex.org/W2015787697","https://openalex.org/W2797942597"],"related_works":["https://openalex.org/W4286890617","https://openalex.org/W2084993028","https://openalex.org/W2071481816","https://openalex.org/W2355770865","https://openalex.org/W4387970507","https://openalex.org/W1853631319","https://openalex.org/W4394872292","https://openalex.org/W2141154922","https://openalex.org/W3144134336","https://openalex.org/W1629081884"],"abstract_inverted_index":{"In":[0,24],"this":[1],"paper,":[2],"we":[3,102],"examine":[4,103],"the":[5,10,13,17,25,29,46,59,62,65,68,77,81,90,95,100,104,108,111],"optimal":[6,105],"strategy":[7,93],"to":[8,20],"control":[9],"spread":[11],"of":[12,41],"infection":[14],"by":[15,70,80],"applying":[16],"FLIPIT":[18,82],"game":[19,27,83],"malware":[21,49],"epidemic":[22,30],"models.":[23],"FILPIT":[26],"for":[28,38,55,107],"models,":[31],"an":[32],"attacker":[33,44,69,109],"and":[34,50,73,94,110],"a":[35],"defender":[36,63],"compete":[37],"computing":[39,53],"resources":[40,54],"hosts.":[42],"The":[43],"infects":[45],"hosts":[47,66],"with":[48],"abuses":[51],"their":[52],"illegal":[56],"attacks.":[57],"On":[58],"other":[60],"hand,":[61],"protects":[64],"from":[67,99],"removing":[71],"vulnerabilities":[72],"malware.":[74],"We":[75],"calculate":[76],"payoff":[78],"obtained":[79],"through":[84],"simulation":[85],"experiments.":[86],"Furthermore,":[87],"based":[88],"on":[89],"best":[91],"response":[92],"Nash":[96],"equilibrium":[97],"derived":[98],"results,":[101],"behavior":[106],"defender.":[112]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
