{"id":"https://openalex.org/W2914511918","doi":"https://doi.org/10.1155/2019/3745619","title":"Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks","display_name":"Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks","publication_year":2019,"publication_date":"2019-02-03","ids":{"openalex":"https://openalex.org/W2914511918","doi":"https://doi.org/10.1155/2019/3745619","mag":"2914511918"},"language":"en","primary_location":{"id":"doi:10.1155/2019/3745619","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3745619","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3745619.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/3745619.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081367006","display_name":"Dilara Acarali","orcid":"https://orcid.org/0000-0003-1787-6300"},"institutions":[{"id":"https://openalex.org/I180825142","display_name":"City, University of London","ror":"https://ror.org/04489at23","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I180825142"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Dilara Acarali","raw_affiliation_strings":["School of Mathematics, Computer Science and Engineering, City, University of London, UK"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Computer Science and Engineering, City, University of London, UK","institution_ids":["https://openalex.org/I180825142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059640195","display_name":"Muttukrishnan Rajarajan","orcid":"https://orcid.org/0000-0001-5814-9922"},"institutions":[{"id":"https://openalex.org/I180825142","display_name":"City, University of London","ror":"https://ror.org/04489at23","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I180825142"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muttukrishnan Rajarajan","raw_affiliation_strings":["School of Mathematics, Computer Science and Engineering, City, University of London, UK"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Computer Science and Engineering, City, University of London, UK","institution_ids":["https://openalex.org/I180825142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007288843","display_name":"Nikos Komninos","orcid":"https://orcid.org/0000-0003-2776-1283"},"institutions":[{"id":"https://openalex.org/I180825142","display_name":"City, University of London","ror":"https://ror.org/04489at23","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I180825142"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nikos Komninos","raw_affiliation_strings":["School of Mathematics, Computer Science and Engineering, City, University of London, UK"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Computer Science and Engineering, City, University of London, UK","institution_ids":["https://openalex.org/I180825142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011873799","display_name":"Bruno Bogaz Zarpel\ufffd\u00e3o","orcid":"https://orcid.org/0000-0001-9172-3578"},"institutions":[{"id":"https://openalex.org/I127110123","display_name":"Universidade Estadual de Londrina","ror":"https://ror.org/01585b035","country_code":"BR","type":"education","lineage":["https://openalex.org/I127110123"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"B. B. Zarpel\u00e3o","raw_affiliation_strings":["Computer Science Department, State University of Londrina, Brazil"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, State University of Londrina, Brazil","institution_ids":["https://openalex.org/I127110123"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011873799"],"corresponding_institution_ids":["https://openalex.org/I127110123"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":7.0736,"has_fulltext":true,"cited_by_count":68,"citation_normalized_percentile":{"value":0.97312096,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9128109216690063},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8027016520500183},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7355554103851318},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5611891746520996},{"id":"https://openalex.org/keywords/epidemic-model","display_name":"Epidemic model","score":0.5261076092720032},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5150585174560547},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5005991458892822},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4571499824523926},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42844870686531067},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32400307059288025},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19381332397460938}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9128109216690063},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8027016520500183},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7355554103851318},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5611891746520996},{"id":"https://openalex.org/C1627819","wikidata":"https://www.wikidata.org/wiki/Q2572354","display_name":"Epidemic model","level":3,"score":0.5261076092720032},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5150585174560547},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5005991458892822},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4571499824523926},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42844870686531067},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32400307059288025},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19381332397460938},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2019/3745619","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3745619","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3745619.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:openaccess.city.ac.uk:21380","is_oa":false,"landing_page_url":"https://openaccess.city.ac.uk/view/creators_id/m=2Erajarajan.html>,","pdf_url":null,"source":{"id":"https://openalex.org/S4306401940","display_name":"City Research Online (City University London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I180825142","host_organization_name":"City, University of London","host_organization_lineage":["https://openalex.org/I180825142"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:99ae9427c5a34b3aa587374e5607db44","is_oa":true,"landing_page_url":"https://doaj.org/article/99ae9427c5a34b3aa587374e5607db44","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/3745619","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3745619","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3745619.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2914511918.pdf","grobid_xml":"https://content.openalex.org/works/W2914511918.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W1519581288","https://openalex.org/W1969419441","https://openalex.org/W1980418933","https://openalex.org/W2473377542","https://openalex.org/W2573648581","https://openalex.org/W2733765803","https://openalex.org/W2765509587"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2616994865","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2929621094","https://openalex.org/W1996006176"],"abstract_inverted_index":{"The":[0,18],"propagation":[1,20,50,64,107],"approach":[2],"of":[3,13,30,90,97,113,128,143,158],"a":[4,11,105,129],"botnet":[5,63],"largely":[6],"dictates":[7],"its":[8],"formation,":[9],"establishing":[10],"foundation":[12],"bots":[14],"for":[15],"future":[16],"exploitation.":[17],"chosen":[19],"method":[21,152],"determines":[22],"the":[23,28,36,40,88,111,126,141,149,155],"attack":[24,42],"surface":[25],"and,":[26],"consequently,":[27],"degree":[29],"network":[31],"penetration,":[32],"as":[33,35],"well":[34,67],"overall":[37],"size":[38],"and":[39,52,122,148],"eventual":[41],"potency.":[43],"It":[44],"is":[45,65,137],"therefore":[46],"essential":[47],"to":[48,57,79,93,139,153],"understand":[49],"behaviours":[51],"influential":[53],"factors":[54],"in":[55],"order":[56],"better":[58],"secure":[59],"vulnerable":[60],"systems.":[61],"Whilst":[62],"generally":[66],"studied,":[68],"newer":[69],"technologies":[70],"like":[71,116],"IoT":[72,94],"have":[73],"unique":[74],"characteristics":[75,115],"which":[76,109],"are":[77],"yet":[78],"be":[80],"thoroughly":[81],"explored.":[82],"In":[83],"this":[84,135],"paper,":[85],"we":[86],"apply":[87],"principles":[89],"epidemic":[91],"modelling":[92],"networks":[95],"consisting":[96],"wireless":[98],"sensor":[99],"nodes.":[100],"We":[101],"build":[102],"IoT-SIS":[103],",":[104],"novel":[106],"model":[108,136],"considers":[110],"impact":[112],"IoT-specific":[114],"limited":[117],"processing":[118],"power,":[119],"energy":[120],"restrictions,":[121],"node":[123],"density":[124],"on":[125,132],"formation":[127],"botnet.":[130],"Focusing":[131],"worm-based":[133],"propagation,":[134],"used":[138],"explore":[140],"dynamics":[142],"spread":[144],"using":[145],"numerical":[146],"simulations":[147],"Monte":[150],"Carlo":[151],"discuss":[154],"real-life":[156],"implications":[157],"our":[159],"findings.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
