{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:02:11Z","timestamp":1747224131768,"version":"3.40.5"},"reference-count":14,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>This paper predicts the malicious object prone site from the set of multi business portals of an organization or company. Graph theory is used to solve this problem as the diverted traffic of customers is interdependent among all the business portals. At first the interconnected business portals are represented in the form of a graph and its corresponding adjacency matrix. Later the centrality and eigenvectors were computed to find the degree of a business portal to propagate the malicious information, helping to cure the business portal by taking available security measures to avoid further infection.<\/p>","DOI":"10.4018\/jwp.2011040102","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T16:56:34Z","timestamp":1319043394000},"page":"14-22","source":"Crossref","is-referenced-by-count":0,"title":["Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network"],"prefix":"10.4018","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2957-1491","authenticated-orcid":true,"given":"Hemraj","family":"Saini","sequence":"first","affiliation":[{"name":"Orissa Engineering College, India"}]},{"given":"Bimal Kumar","family":"Mishra","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology, MESRA, India"}]},{"given":"T. C.","family":"Panda","sequence":"additional","affiliation":[{"name":"Orissa Engineering College, India"}]}],"member":"2432","reference":[{"key":"jwp.2011040102-0","unstructured":"Anti-Phishing Working Group. (APWG). (2004). Phishing attack trends report. Retrieved from http:\/\/www.antiphishing.org\/APWG_Phishing_Attack_Report-Apr2004.pdf"},{"key":"jwp.2011040102-1","doi-asserted-by":"publisher","DOI":"10.1002\/047086107X.ch6"},{"issue":"1-3","key":"jwp.2011040102-2","first-page":"131","article-title":"Spreading on networks: A topographic view. Complexus: Modelling in Systems Biology, Social","volume":"3","author":"G.Canright","year":"2006","journal-title":"Cognitive and Information Sciences"},{"journal-title":"Corporate portals: Revolutionizing information access to increase productivity and drive the bottom line","year":"2001","author":"H.Collins","key":"jwp.2011040102-3"},{"key":"jwp.2011040102-4","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(01)00021-4"},{"key":"jwp.2011040102-5","unstructured":"Drake, C. E., Oliver, J. J., & Koontz, E. J. (2004). Anatomy of a phishing email. Retrieved from http:\/\/www.ceas.cc\/papers-2004\/114.pdf"},{"journal-title":"Lecture notes on graph theory (FIN-20014)","year":"2007","author":"T.Harju","key":"jwp.2011040102-6"},{"issue":"2","key":"jwp.2011040102-7","first-page":"7","article-title":"A behavioral theory of insider-threat risks: A system dynamics approach.","volume":"18","author":"J.Ignacio","year":"2008","journal-title":"ACM Transactions on Modeling and Computer Simulation"},{"key":"jwp.2011040102-8","first-page":"337","author":"G.James","year":"2001","journal-title":"Modern engineering mathematics"},{"key":"jwp.2011040102-9","unstructured":"Mishra, B. K., & Saini, H. (2009). Cyber attack classification using game theoretic weighted metrics approach. World Applied Science Journal, 206-215."},{"key":"jwp.2011040102-10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926503"},{"key":"jwp.2011040102-11","unstructured":"Rustam, A. H. (2006). Epidemic network and centrality. Unpublished doctoral dissertation, University of Oslo, Oslo, Norway."},{"key":"jwp.2011040102-12","unstructured":"Saini, H., & Saini, D. (2006, December 2-4). Cyber defense architecture in campus wide network. In Proceedings of the 3rd International Conference on Quality, Reliability and INFOCOM Technology on Trends and Future Directions, New Delhi, India."},{"key":"jwp.2011040102-13","doi-asserted-by":"publisher","DOI":"10.1145\/1410234.1410238"}],"container-title":["International Journal of Web Portals"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=55108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T03:13:09Z","timestamp":1654139589000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jwp.2011040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jwp.2011040102","relation":{},"ISSN":["1938-0194","1938-0208"],"issn-type":[{"type":"print","value":"1938-0194"},{"type":"electronic","value":"1938-0208"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}