{"id":"https://openalex.org/W4406113500","doi":"https://doi.org/10.1186/s42400-024-00310-z","title":"The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks","display_name":"The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks","publication_year":2025,"publication_date":"2025-01-06","ids":{"openalex":"https://openalex.org/W4406113500","doi":"https://doi.org/10.1186/s42400-024-00310-z"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00310-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00310-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00310-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00310-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115788729","display_name":"Laura Quiroga-S\u00e1nchez","orcid":null},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":true,"raw_author_name":"Laura Quiroga-S\u00e1nchez","raw_affiliation_strings":["Systems and Computing Engineering Department, Universidad de los Andes, Bogota, 111711, Colombia"],"affiliations":[{"raw_affiliation_string":"Systems and Computing Engineering Department, Universidad de los Andes, Bogota, 111711, Colombia","institution_ids":["https://openalex.org/I162096671"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088804187","display_name":"Germ\u00e1n A. Montoya","orcid":"https://orcid.org/0000-0003-0841-2184"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Germ\u00e1n A. Montoya","raw_affiliation_strings":["Systems and Computing Engineering Department, Universidad de los Andes, Bogota, 111711, Colombia"],"affiliations":[{"raw_affiliation_string":"Systems and Computing Engineering Department, Universidad de los Andes, Bogota, 111711, Colombia","institution_ids":["https://openalex.org/I162096671"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090149937","display_name":"Carlos Lozano-Garz\u00f3n","orcid":"https://orcid.org/0000-0003-2920-6320"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Carlos Lozano-Garzon","raw_affiliation_strings":["Systems and Computing Engineering Department, Universidad de los Andes, Bogota, 111711, Colombia"],"affiliations":[{"raw_affiliation_string":"Systems and Computing Engineering Department, Universidad de los Andes, Bogota, 111711, Colombia","institution_ids":["https://openalex.org/I162096671"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115788729"],"corresponding_institution_ids":["https://openalex.org/I162096671"],"apc_list":null,"apc_paid":null,"fwci":15.1421,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.98807323,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7748298645019531},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7452441453933716},{"id":"https://openalex.org/keywords/epidemic-model","display_name":"Epidemic model","score":0.5839241147041321},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.5317201614379883},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.5180752277374268},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4215102195739746},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3750446140766144},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32475197315216064},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.20803481340408325},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09848576784133911},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.09480446577072144}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7748298645019531},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7452441453933716},{"id":"https://openalex.org/C1627819","wikidata":"https://www.wikidata.org/wiki/Q2572354","display_name":"Epidemic model","level":3,"score":0.5839241147041321},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.5317201614379883},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.5180752277374268},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4215102195739746},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3750446140766144},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32475197315216064},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.20803481340408325},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09848576784133911},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.09480446577072144},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00310-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00310-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00310-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b35fba3126e24560894a0a64694df8c1","is_oa":true,"landing_page_url":"https://doaj.org/article/b35fba3126e24560894a0a64694df8c1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-37 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00310-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00310-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00310-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Good health and well-being","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406113500.pdf","grobid_xml":"https://content.openalex.org/works/W4406113500.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W2169397725","https://openalex.org/W3043467336","https://openalex.org/W3083788054","https://openalex.org/W3112196665","https://openalex.org/W4200403620","https://openalex.org/W4247209083","https://openalex.org/W4304944610","https://openalex.org/W4311794909","https://openalex.org/W4313216104","https://openalex.org/W4316039105","https://openalex.org/W4363647901","https://openalex.org/W4385243326","https://openalex.org/W4405496503"],"related_works":["https://openalex.org/W2341492732","https://openalex.org/W2097492617","https://openalex.org/W3187193180","https://openalex.org/W106542691","https://openalex.org/W1699080303","https://openalex.org/W4297799326","https://openalex.org/W3116064965","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,15,43,78,83,92,98,109],"rapid":[3],"advancement":[4],"of":[5,7,17,20,45],"Internet":[6],"Things":[8],"networks":[9],"and":[10,36,66,81,87,104,134],"its":[11,135],"significant":[12],"cybersecurity":[13],"challenges,":[14],"proposal":[16,119,133],"models":[18],"capable":[19],"studying":[21],"malware":[22,46],"propagation":[23,93],"within":[24],"these":[25],"structures":[26],"has":[27],"become":[28],"highly":[29],"relevant.":[30],"This":[31],"paper":[32,74],"aims":[33],"to":[34,41,96,139],"formulate":[35],"implement":[37],"an":[38,58,63],"SEIRS-NIMFA":[39],"model":[40,61,89],"analyze":[42],"dissemination":[44],"infections":[47],"with":[48],"a":[49],"latency":[50],"period.":[51],"To":[52],"accomplish":[53],"this,":[54],"we":[55,107],"mathematically":[56],"articulated":[57],"SEIRS":[59],"epidemiological":[60],"using":[62,69],"individual-based":[64],"approach":[65],"implemented":[67],"it":[68],"Python.":[70],"In":[71],"addition,":[72],"this":[73],"examines":[75],"how":[76],"varying":[77],"network":[79],"size":[80],"density,":[82],"initially":[84],"infected":[85],"device,":[86],"several":[88],"parameters":[90],"influence":[91],"dynamics.":[94],"Moreover,":[95],"address":[97],"Markov":[99],"chain":[100],"approach\u2019s":[101],"high":[102],"temporal":[103],"spatial":[105],"complexity,":[106],"use":[108],"n-intertwined":[110],"mean-field":[111],"approximation":[112],"method.":[113],"Our":[114],"findings":[115],"demonstrate":[116],"that":[117],"our":[118,132],"can":[120],"effectively":[121],"aid":[122],"decision-making":[123],"in":[124,128],"implementing":[125],"security":[126],"measures":[127],"real-world":[129],"situations.":[130],"Finally,":[131],"implementation":[136],"are":[137],"open":[138],"further":[140],"enhancements,":[141],"broadening":[142],"their":[143],"potential":[144],"applications.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":8}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
