{"id":"https://openalex.org/W2108496189","doi":"https://doi.org/10.1155/2014/746803","title":"Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism","display_name":"Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2108496189","doi":"https://doi.org/10.1155/2014/746803","mag":"2108496189"},"language":"en","primary_location":{"id":"doi:10.1155/2014/746803","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/746803","pdf_url":"https://downloads.hindawi.com/journals/jam/2014/746803.pdf","source":{"id":"https://openalex.org/S190082376","display_name":"Journal of Applied Mathematics","issn_l":"1110-757X","issn":["1110-757X","1687-0042"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Applied Mathematics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/jam/2014/746803.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100377156","display_name":"Meng Wang","orcid":"https://orcid.org/0000-0002-3669-5591"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Wang","raw_affiliation_strings":["Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030776651","display_name":"Zhide Chen","orcid":"https://orcid.org/0000-0002-6130-9066"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhide Chen","raw_affiliation_strings":["Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109462501","display_name":"Li Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xu","raw_affiliation_strings":["Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100920412","display_name":"Huan Zhan","orcid":null},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan Zhan","raw_affiliation_strings":["Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China"],"affiliations":[{"raw_affiliation_string":"Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030776651"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":{"value":1025,"currency":"USD","value_usd":1025},"apc_paid":{"value":1025,"currency":"USD","value_usd":1025},"fwci":0.0,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.16987783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2014","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7404704689979553},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5936702489852905},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5344105958938599},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5052486062049866},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4910604953765869},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4826129376888275},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.42029818892478943},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3316573202610016},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20079833269119263}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7404704689979553},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5936702489852905},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5344105958938599},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5052486062049866},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4910604953765869},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4826129376888275},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.42029818892478943},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3316573202610016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20079833269119263},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1155/2014/746803","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/746803","pdf_url":"https://downloads.hindawi.com/journals/jam/2014/746803.pdf","source":{"id":"https://openalex.org/S190082376","display_name":"Journal of Applied Mathematics","issn_l":"1110-757X","issn":["1110-757X","1687-0042"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Applied Mathematics","raw_type":"journal-article"},{"id":"pmh:oai:CULeuclid:euclid.jam/1425306056","is_oa":false,"landing_page_url":"https://projecteuclid.org/euclid.jam/1425306056","pdf_url":null,"source":{"id":"https://openalex.org/S4306400787","display_name":"Project Euclid (Cornell University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:RePEc:hin:jnljam:746803","is_oa":false,"landing_page_url":"http://downloads.hindawi.com/journals/JAM/2014/746803.xml","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:59e60cc5cc6d455e8ca7be59c4e886f3","is_oa":true,"landing_page_url":"https://doaj.org/article/59e60cc5cc6d455e8ca7be59c4e886f3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Applied Mathematics, Vol 2014 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2014/746803","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/746803","pdf_url":"https://downloads.hindawi.com/journals/jam/2014/746803.pdf","source":{"id":"https://openalex.org/S190082376","display_name":"Journal of Applied Mathematics","issn_l":"1110-757X","issn":["1110-757X","1687-0042"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Applied Mathematics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2726356784","display_name":null,"funder_award_id":"2013-G-84","funder_id":"https://openalex.org/F4320316318","funder_display_name":"Fuzhou Science and Technology Bureau"},{"id":"https://openalex.org/G511810947","display_name":null,"funder_award_id":"IRTL1207","funder_id":"https://openalex.org/F4320326546","funder_display_name":"Fujian Normal University"}],"funders":[{"id":"https://openalex.org/F4320316318","display_name":"Fuzhou Science and Technology Bureau","ror":null},{"id":"https://openalex.org/F4320326546","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2108496189.pdf","grobid_xml":"https://content.openalex.org/works/W2108496189.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W1514368868","https://openalex.org/W1533814111","https://openalex.org/W1574779469","https://openalex.org/W1582350176","https://openalex.org/W1995783752","https://openalex.org/W2004067489","https://openalex.org/W2044330561","https://openalex.org/W2067482319","https://openalex.org/W2103174586","https://openalex.org/W2114960060","https://openalex.org/W2138926528","https://openalex.org/W2409664136","https://openalex.org/W2534754943"],"related_works":["https://openalex.org/W2382997850","https://openalex.org/W2390968135","https://openalex.org/W2382213751","https://openalex.org/W2351750670","https://openalex.org/W1597848696","https://openalex.org/W2354715126","https://openalex.org/W2388563748","https://openalex.org/W2375179084","https://openalex.org/W2366646518","https://openalex.org/W2370906336"],"abstract_inverted_index":{"Both":[0],"in":[1,6,74,115],"traditional":[2,34],"social":[3],"network":[4,8,61,121,186],"and":[5,16,53,77,83,132,159],"mobile":[7,31,42,75,90,117,146],"environment,":[9],"the":[10,22,28,70,79,98,116,120,127,138,141,145,150,157,161,170,185],"worm":[11,73,81,109,114,177],"is":[12,19,93,101,122,179],"a":[13,59],"serious":[14],"threat,":[15],"this":[17,65],"threat":[18],"growing":[20],"all":[21],"time.":[23],"Mobile":[24],"smartphones":[25],"generally":[26],"promote":[27],"development":[29,45],"of":[30,46,72,89,130,143,152,180],"network.":[32,147],"The":[33,44,86],"antivirus":[35],"technologies":[36],"have":[37],"become":[38,58],"powerless":[39],"when":[40,119],"facing":[41],"networks.":[43],"benign":[47,51,55,80,91,108,153,176],"worms,":[48,56],"especially":[49],"active":[50,107],"worms":[52,92],"passive":[54,134],"has":[57],"new":[60],"security":[62],"measure.":[63],"In":[64],"paper,":[66],"we":[67,155,165],"focused":[68],"on":[69],"spread":[71],"environment":[76,139],"proposed":[78],"control":[82,87,173,184],"repair":[84,103],"mechanism.":[85],"process":[88],"divided":[94],"into":[95],"two":[96],"stages:":[97],"first":[99],"stage":[100,129],"rapid":[102],"control,":[104],"which":[105],"uses":[106,133],"to":[110,136,168,183],"deal":[111],"with":[112],"malicious":[113],"network;":[118],"relatively":[123],"stable,":[124],"it":[125],"enters":[126],"second":[128],"postrepair":[131],"mode":[135],"optimize":[137],"for":[140,175],"purpose":[142],"controlling":[144],"Considering":[148],"whether":[149],"existence":[151],"worm,":[154],"simplified":[156],"model":[158],"analyzed":[160],"four":[162],"situations.":[163],"Finally,":[164],"use":[166],"simulation":[167],"verify":[169],"model.":[171],"This":[172],"mechanism":[174],"propagation":[178],"guiding":[181],"significance":[182],"security.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
