{"id":"https://openalex.org/W2968999477","doi":"https://doi.org/10.1155/2019/6803801","title":"Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT","display_name":"Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT","publication_year":2019,"publication_date":"2019-08-18","ids":{"openalex":"https://openalex.org/W2968999477","doi":"https://doi.org/10.1155/2019/6803801","mag":"2968999477"},"language":"en","primary_location":{"id":"doi:10.1155/2019/6803801","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/6803801","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/6803801.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/6803801.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091913123","display_name":"Mingyong Yin","orcid":"https://orcid.org/0000-0003-4119-8052"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyong Yin","raw_affiliation_strings":["College of Computer Science and Technology, Sichuan University, Chengdu 610065, China","Institute of Computer Application, Mianyang 621900, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"Institute of Computer Application, Mianyang 621900, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059891662","display_name":"Xingshu Chen","orcid":"https://orcid.org/0000-0002-8705-2617"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingshu Chen","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu 610065, China","Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075417376","display_name":"Qixu Wang","orcid":"https://orcid.org/0000-0002-3970-9290"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qixu Wang","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu 610065, China","Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101593330","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0003-4088-5395"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I4210125143","https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100449192","display_name":"Yulong Wang","orcid":"https://orcid.org/0000-0001-8148-3099"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Wang","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu 610065, China","Institute of Computer Application, Mianyang 621900, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"Institute of Computer Application, Mianyang 621900, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5075417376"],"corresponding_institution_ids":["https://openalex.org/I24185976","https://openalex.org/I4210125143"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.5836,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.83763452,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7970532178878784},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7214529514312744},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5474893450737},{"id":"https://openalex.org/keywords/complex-network","display_name":"Complex network","score":0.49785804748535156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45188674330711365},{"id":"https://openalex.org/keywords/epidemic-model","display_name":"Epidemic model","score":0.44853267073631287},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.33502209186553955},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1863948106765747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7970532178878784},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7214529514312744},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5474893450737},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.49785804748535156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45188674330711365},{"id":"https://openalex.org/C1627819","wikidata":"https://www.wikidata.org/wiki/Q2572354","display_name":"Epidemic model","level":3,"score":0.44853267073631287},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.33502209186553955},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1863948106765747},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2019/6803801","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/6803801","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/6803801.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b9490347ba2e4d6f920698e93c0bb7ef","is_oa":true,"landing_page_url":"https://doaj.org/article/b9490347ba2e4d6f920698e93c0bb7ef","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/6803801","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/6803801","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/6803801.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G176525455","display_name":null,"funder_award_id":"SCU2018D022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G480574630","display_name":null,"funder_award_id":"SCU2018D018","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5038653329","display_name":null,"funder_award_id":"SCU2018D018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5351475047","display_name":null,"funder_award_id":"SCU2018D022","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5352759081","display_name":null,"funder_award_id":"61802271","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5997664158","display_name":null,"funder_award_id":"61272447","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6398364802","display_name":null,"funder_award_id":"61802271","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8517145707","display_name":null,"funder_award_id":"61272447","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2968999477.pdf","grobid_xml":"https://content.openalex.org/works/W2968999477.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1878853999","https://openalex.org/W1980421658","https://openalex.org/W1986252988","https://openalex.org/W2003741412","https://openalex.org/W2053648942","https://openalex.org/W2053835659","https://openalex.org/W2058105398","https://openalex.org/W2065850218","https://openalex.org/W2067919779","https://openalex.org/W2114696370","https://openalex.org/W2140984072","https://openalex.org/W2235204058","https://openalex.org/W2312202804","https://openalex.org/W2532423614","https://openalex.org/W2552931950","https://openalex.org/W2586432806","https://openalex.org/W2594736069","https://openalex.org/W2733765803","https://openalex.org/W2752484645","https://openalex.org/W2765509587","https://openalex.org/W2784865102","https://openalex.org/W2793319693","https://openalex.org/W2805010728","https://openalex.org/W2808669017","https://openalex.org/W2906719522","https://openalex.org/W2914511918","https://openalex.org/W2919839278","https://openalex.org/W3098082599","https://openalex.org/W3099414328","https://openalex.org/W3099836846","https://openalex.org/W3121812901","https://openalex.org/W4242087913"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2616994865","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2883616266","https://openalex.org/W186576250"],"abstract_inverted_index":{"With":[0],"the":[1,9,15,39,75,83,91,113,130,134,139,147,179,190,207,220,225,260],"rapid":[2],"development":[3],"of":[4,6,11,44,54,77,133,227,252],"Internet":[5],"things":[7],"technology,":[8],"application":[10],"intelligent":[12],"devices":[13,22,55],"in":[14,87,195,202,215,243],"medical":[16],"industry":[17],"has":[18],"become":[19],"ubiquitous.":[20],"Connected":[21],"have":[23],"revolutionized":[24],"clinicians":[25],"and":[26,60,145,170,181,187,199,238,245],"patient":[27],"care":[28],"but":[29],"also":[30,188],"made":[31],"modern":[32],"hospitals":[33],"vulnerable":[34],"to":[35,51,73,106],"cyber":[36],"attacks.":[37],"Among":[38],"security":[40],"risks,":[41],"botnets":[42],"are":[43],"particular":[45],"concern,":[46],"which":[47,80],"can":[48,81],"be":[49],"used":[50],"control":[52,160],"thousands":[53,251],"for":[56,100],"remote":[57],"data":[58],"theft":[59],"equipment":[61],"destruction.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66,94,116,127,177],"propose":[67],"a":[68,104,118,228],"non-Markovian":[69],"spread":[70,98],"dynamics":[71],"model":[72],"understand":[74],"effects":[76],"botnet":[78],"propagation,":[79,102],"characterize":[82],"hybrid":[84,154,192,217,236],"contagion":[85,218],"situation":[86],"reality.":[88],"Based":[89],"on":[90,173,184,209],"Susceptible-Adopted-Recovered":[92],"model,":[93,115],"introduce":[95],"nonredundant":[96],"memory":[97],"mechanism":[99],"global":[101,158],"as":[103],"tuner":[105],"adjust":[107],"spreading":[108],"rate":[109],"difference.":[110],"For":[111],"describing":[112],"proposed":[114],"extend":[117],"heterogeneous":[119],"edge-based":[120],"compartmental":[121],"theory.":[122],"Through":[123,248],"extensive":[124],"numerical":[125,246,261],"simulations,":[126],"reveal":[128],"that":[129],"growth":[131],"pattern":[132],"final":[135,148,210,221],"adoption":[136,149,211,222],"size":[137,150,223],"versus":[138,234],"information":[140,166],"transmission":[141],"probability":[142],"is":[143,151,240],"discontinuous":[144],"how":[146],"affected":[152],"by":[153,231,250],"ratio":[155],"\u03b1":[156],",":[157,163,169],"scope":[159],"factor":[161],"\u03f5":[162],"accumulated":[164],"received":[165],"threshold":[167],"T":[168],"other":[171],"parameters":[172],"ER":[174],"network.":[175],"Furthermore,":[176],"give":[178],"theory":[180,244,256],"simulation":[182],"result":[183],"BA":[185],"network":[186],"compare":[189],"two":[191],"methods\u2014single":[193],"infection":[194],"one":[196,203],"time":[197,204],"slice":[198],"double":[200],"infections":[201],"slice\u2014to":[205],"evaluate":[206],"influence":[208],"size.":[212],"We":[213],"found":[214],"SIOT":[216],"scenario":[219],"shows":[224],"phenomenon":[226],"decline":[229],"followed":[230],"an":[232],"increase":[233],"different":[235],"ratio,":[237],"it":[239],"both":[241],"verified":[242],"simulation.":[247],"validation":[249],"experiments,":[253],"our":[254],"developed":[255],"agrees":[257],"well":[258],"with":[259],"simulations.":[262]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":6}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
