{"id":"https://openalex.org/W2017061969","doi":"https://doi.org/10.4018/jwp.2011040102","title":"Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network","display_name":"Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network","publication_year":2011,"publication_date":"2011-04-01","ids":{"openalex":"https://openalex.org/W2017061969","doi":"https://doi.org/10.4018/jwp.2011040102","mag":"2017061969"},"language":"en","primary_location":{"id":"doi:10.4018/jwp.2011040102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jwp.2011040102","pdf_url":null,"source":{"id":"https://openalex.org/S141275348","display_name":"International Journal of Web Portals","issn_l":"1938-0194","issn":["1938-0194","1938-0208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web Portals","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069998960","display_name":"Hemraj Saini","orcid":"https://orcid.org/0000-0003-2957-1491"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hemraj Saini","raw_affiliation_strings":["Orissa Engineering College, India"],"affiliations":[{"raw_affiliation_string":"Orissa Engineering College, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028294001","display_name":"Bimal Kumar Mishra","orcid":"https://orcid.org/0000-0002-7979-4995"},"institutions":[{"id":"https://openalex.org/I115715567","display_name":"Birla Institute of Technology, Mesra","ror":"https://ror.org/028vtqb15","country_code":"IN","type":"education","lineage":["https://openalex.org/I115715567"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bimal Kumar Mishra","raw_affiliation_strings":["Birla Institute of Technology, MESRA, India","Birla Institute of Technology, Mesra, India"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology, MESRA, India","institution_ids":["https://openalex.org/I115715567"]},{"raw_affiliation_string":"Birla Institute of Technology, Mesra, India","institution_ids":["https://openalex.org/I115715567"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046071690","display_name":"T. C. Panda","orcid":"https://orcid.org/0000-0002-5260-6990"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"T. C. Panda","raw_affiliation_strings":["Orissa Engineering College, India"],"affiliations":[{"raw_affiliation_string":"Orissa Engineering College, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069998960"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2394,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5529946,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":"2","first_page":"14","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6756751537322998},{"id":"https://openalex.org/keywords/business-information","display_name":"Business information","score":0.6139132976531982},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.5757890343666077},{"id":"https://openalex.org/keywords/adjacency-matrix","display_name":"Adjacency matrix","score":0.5514644980430603},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4899982511997223},{"id":"https://openalex.org/keywords/adjacency-list","display_name":"Adjacency list","score":0.4897215664386749},{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.4683240056037903},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.431984543800354},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.42083805799484253},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.41580989956855774},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2847074568271637},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.27068257331848145},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13395759463310242}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6756751537322998},{"id":"https://openalex.org/C2776574205","wikidata":"https://www.wikidata.org/wiki/Q1391314","display_name":"Business information","level":2,"score":0.6139132976531982},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.5757890343666077},{"id":"https://openalex.org/C180356752","wikidata":"https://www.wikidata.org/wiki/Q727035","display_name":"Adjacency matrix","level":3,"score":0.5514644980430603},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4899982511997223},{"id":"https://openalex.org/C110484373","wikidata":"https://www.wikidata.org/wiki/Q264398","display_name":"Adjacency list","level":2,"score":0.4897215664386749},{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.4683240056037903},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.431984543800354},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.42083805799484253},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.41580989956855774},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2847074568271637},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.27068257331848145},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13395759463310242},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jwp.2011040102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jwp.2011040102","pdf_url":null,"source":{"id":"https://openalex.org/S141275348","display_name":"International Journal of Web Portals","issn_l":"1938-0194","issn":["1938-0194","1938-0208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web Portals","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jwp000:v:3:y:2011:i:2:p:14-22","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jwp.2011040102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W130021640","https://openalex.org/W749126478","https://openalex.org/W2001479375","https://openalex.org/W2037800903","https://openalex.org/W2060821979","https://openalex.org/W2111239149","https://openalex.org/W2134598092","https://openalex.org/W2186009751","https://openalex.org/W4253945214","https://openalex.org/W6605295362","https://openalex.org/W6627112411"],"related_works":["https://openalex.org/W2002495609","https://openalex.org/W4213150077","https://openalex.org/W2195864695","https://openalex.org/W2498207809","https://openalex.org/W1954735964","https://openalex.org/W2369410163","https://openalex.org/W2982430984","https://openalex.org/W2078477160","https://openalex.org/W2059018062","https://openalex.org/W2604585036"],"abstract_inverted_index":{"This":[0],"paper":[1],"predicts":[2],"the":[3,9,29,38,43,50,61,69,77,83],"malicious":[4,78],"object":[5],"prone":[6],"site":[7],"from":[8],"set":[10],"of":[11,15,32,52,71],"multi":[12],"business":[13,39,45,73,84],"portals":[14,46],"an":[16],"organization":[17],"or":[18],"company.":[19],"Graph":[20],"theory":[21],"is":[22,34],"used":[23],"to":[24,67,75,81,91],"solve":[25],"this":[26],"problem":[27],"as":[28],"diverted":[30],"traffic":[31],"customers":[33],"interdependent":[35],"among":[36],"all":[37],"portals.":[40],"At":[41],"first":[42],"interconnected":[44],"are":[47],"represented":[48],"in":[49],"form":[51],"a":[53,72],"graph":[54],"and":[55,63],"its":[56],"corresponding":[57],"adjacency":[58],"matrix.":[59],"Later":[60],"centrality":[62],"eigenvectors":[64],"were":[65],"computed":[66],"find":[68],"degree":[70],"portal":[74,85],"propagate":[76],"information,":[79],"helping":[80],"cure":[82],"by":[86],"taking":[87],"available":[88],"security":[89],"measures":[90],"avoid":[92],"further":[93],"infection.":[94]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
