{"id":"https://openalex.org/W2067729432","doi":"https://doi.org/10.1145/1287791.1287805","title":"On the performance evaluation and prediction of encounter-based worm interactions based on node characteristics","display_name":"On the performance evaluation and prediction of encounter-based worm interactions based on node characteristics","publication_year":2007,"publication_date":"2007-09-14","ids":{"openalex":"https://openalex.org/W2067729432","doi":"https://doi.org/10.1145/1287791.1287805","mag":"2067729432"},"language":"en","primary_location":{"id":"doi:10.1145/1287791.1287805","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1287791.1287805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM workshop on Challenged networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029041182","display_name":"Sapon Tanachaiwiwat","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sapon Tanachaiwiwat","raw_affiliation_strings":["University of Southern California, Los Angeles, CA","University of Southern California,,,Los Angeles,CA,"],"affiliations":[{"raw_affiliation_string":"University of Southern California, Los Angeles, CA","institution_ids":["https://openalex.org/I1174212"]},{"raw_affiliation_string":"University of Southern California,,,Los Angeles,CA,","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048781653","display_name":"Ahmed Helmy","orcid":"https://orcid.org/0000-0003-1878-3536"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed Helmy","raw_affiliation_strings":["University of Florida, Gainesville, FL"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, FL","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029041182"],"corresponding_institution_ids":["https://openalex.org/I1174212"],"apc_list":null,"apc_paid":null,"fwci":1.2835,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82046682,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"67","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7959749698638916},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.766867995262146},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5878229141235352},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5360100269317627},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5221205949783325},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.47260338068008423},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4723164737224579},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.46696311235427856},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3588988184928894},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11249664425849915},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08502724766731262}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7959749698638916},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.766867995262146},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5878229141235352},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5360100269317627},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5221205949783325},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.47260338068008423},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4723164737224579},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.46696311235427856},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3588988184928894},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11249664425849915},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08502724766731262},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1287791.1287805","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1287791.1287805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the second ACM workshop on Challenged networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1481600190","https://openalex.org/W1492715660","https://openalex.org/W1559162865","https://openalex.org/W1572481965","https://openalex.org/W1595564425","https://openalex.org/W1914027636","https://openalex.org/W1954073967","https://openalex.org/W1980065740","https://openalex.org/W2054184948","https://openalex.org/W2103315222","https://openalex.org/W2109528718","https://openalex.org/W2112876030","https://openalex.org/W2134006599","https://openalex.org/W2138926528","https://openalex.org/W2148301044","https://openalex.org/W2157947204","https://openalex.org/W2335872799","https://openalex.org/W2470063481","https://openalex.org/W2944005185","https://openalex.org/W6640264449","https://openalex.org/W6675339478","https://openalex.org/W6677064317"],"related_works":["https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W2384544638","https://openalex.org/W2161277559","https://openalex.org/W1502313685","https://openalex.org/W3112632410","https://openalex.org/W2373539721","https://openalex.org/W3008753976","https://openalex.org/W2372679928","https://openalex.org/W2084288121"],"abstract_inverted_index":{"An":[0],"encounter-based":[1,36,173],"network":[2,8,127],"is":[3,38],"a":[4],"frequently-disconnected":[5],"wireless":[6],"ad-hoc":[7],"requiring":[9],"nearby":[10],"neighbors":[11],"to":[12,55,101,150,167],"store":[13],"and":[14,19,66,85],"forward":[15],"data":[16],"utilizing":[17],"mobility":[18],"encounters":[20,132],"over":[21],"time.":[22],"Using":[23,124],"traditional":[24],"approaches":[25],"such":[26,62,156],"as":[27],"gateways":[28],"or":[29],"firewalls":[30],"for":[31,43],"deterring":[32],"worm":[33,45,53,59,83,109],"propagation":[34,60],"in":[35,61,99,155,171],"networks":[37],"inappropriate.":[39],"We":[40,64,87,95],"propose":[41],"models":[42],"the":[44,68,82,106,121,135,140,143,152],"interaction":[46],"approach":[47],"that":[48,131,162],"relies":[49],"upon":[50],"automated":[51],"beneficial":[52],"generation":[54],"alleviate":[56],"problems":[57],"of":[58,70,108],"networks.":[63,174],"study":[65],"analyze":[67],"impact":[69],"key":[71],"mobile":[72,126],"node":[73,76],"characteristics":[74],"including":[75],"cooperation,":[77],"immunization,":[78,102],"on-off":[79,112],"behavior":[80,113],"on":[81],"propagations":[84],"interactions.":[86],"validate":[88],"our":[89],"proposed":[90],"model":[91,141],"using":[92],"extensive":[93],"simulations.":[94],"also":[96],"find":[97,130],"that,":[98],"addition":[100],"cooperation":[103],"can":[104],"reduce":[105],"level":[107],"infection.":[110,123],"Furthermore,":[111],"linearly":[114],"impacts":[115],"only":[116],"timing":[117],"aspect":[118],"but":[119,142],"not":[120],"overall":[122],"realistic":[125],"measurements,":[128],"we":[129,163],"are":[133,137,145],"non-uniform,":[134],"trends":[136],"consistent":[138],"with":[139],"magnitudes":[144],"drastically":[146],"different.":[147],"Immunization":[148],"seems":[149],"be":[151],"most":[153],"effective":[154],"scenarios.":[157],"These":[158],"findings":[159],"provide":[160],"insight":[161],"hope":[164],"would":[165],"aid":[166],"develop":[168],"counter-worm":[169],"protocols":[170],"future":[172]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
