{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T02:27:27Z","timestamp":1778812047670,"version":"3.51.4"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030239459","type":"print"},{"value":"9783030239466","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-23946-6_12","type":"book-chapter","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T02:03:58Z","timestamp":1561428238000},"page":"109-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Modeling the Spread of Malware on Complex Networks"],"prefix":"10.1007","author":[{"given":"A.","family":"Mart\u00edn del Rey","sequence":"first","affiliation":[]},{"given":"A.","family":"Queiruga Dios","sequence":"additional","affiliation":[]},{"given":"G.","family":"Hern\u00e1ndez","sequence":"additional","affiliation":[]},{"given":"A.","family":"Bustos Tabernero","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118762783","volume-title":"Propagation Dynamics on Complex Networks","author":"X Fu","year":"2014","unstructured":"Fu, X., Small, M., Chen, G.: Propagation Dynamics on Complex Networks. Wiley, Hoboken (2014)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez Guill\u00e9n, J.D., Mart\u00edn del Rey, A.: Modeling malware propagation using a carrier compartment. Commun. Nonlinear Sci. Numer. Simul. 56, 217\u2013226 (2018)","DOI":"10.1016\/j.cnsns.2017.08.011"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1177\/0037549716656060","volume":"92","author":"S Hosseini","year":"2016","unstructured":"Hosseini, S., Azgomi, M.A., Torkaman, A.R.: Agent-based simulation of the dynamics of malware propagation in scale-free networks. Simulation 92, 709\u2013722 (2016)","journal-title":"Simulation"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.comnet.2016.08.010","volume":"108","author":"S Hosseini","year":"2017","unstructured":"Hosseini, S., Azgomi, M.A.: A model for malware propagation in scale-free networks based on rumor spreading process. Comput. Netw. 108, 97\u2013107 (2017)","journal-title":"Comput. Netw."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.physa.2018.08.081","volume":"512","author":"S Hosseini","year":"2018","unstructured":"Hosseini, S., Azgomi, M.A.: The dynamics of a SEIRS-QV malware propagation model in heterogeneous networks. Phys. A 512, 803\u2013817 (2018)","journal-title":"Phys. A"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.cnsns.2018.04.003","volume":"63","author":"P Hu","year":"2018","unstructured":"Hu, P., Ding, L., Hadzibeganovic, T.: Individual-based optimal weight adaptation for heterogeneous epidemic spreading networks. Commun. Nonlinear Sci. Numer. Simul. 63, 339\u2013355 (2018)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1109\/TDSC.2012.72","volume":"9","author":"JT Jackson","year":"2012","unstructured":"Jackson, J.T., Creese, S.: Virus propagation in heterogeneous bluetooth networks with human behaviors. IEEE Trans. Dependable Secur. Comput. 9, 930\u2013943 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"12_CR8","volume-title":"Malware Diffusion Models for Modern Complex Networks","author":"V Karyotis","year":"2016","unstructured":"Karyotis, V., Khouzani, M.H.R.: Malware Diffusion Models for Modern Complex Networks. Morgan Kaufmann-Elsevier, Cambridge (2016)"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/LCOMM.2015.2399925","volume":"19","author":"V Karyotis","year":"2015","unstructured":"Karyotis, V., Papavassiliou, S.: Macroscopic malware propagation dynamics for complex networks with churm. IEEE Commun. Lett. 19, 577\u2013580 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.ins.2018.04.092","volume":"460","author":"J-Y Kim","year":"2018","unstructured":"Kim, J.-Y., Bu, S.-J., Cho, S.-B.: Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inform. Sci. 460, 83\u2013102 (2018)","journal-title":"Inform. Sci."},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TIFS.2018.2866319","volume":"14","author":"T Kim","year":"2019","unstructured":"Kim, T., Kang, B., Rho, M., Sezer, S., Im, E.G.: A multimodal deep learning method for Android malware detection using various features. IEEE Trans. Inf. Forensic Secur. 14, 773\u2013788 (2019)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1016\/j.physa.2018.04.015","volume":"505","author":"W Liu","year":"2018","unstructured":"Liu, W., Zhong, S.: A novel dynamic model for web malware spreading over scale-free networks. Phys. A 505, 848\u2013863 (2018)","journal-title":"Phys. A"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Mart\u00edn del Rey, A.: Mathematical modeling of the propagation of malware: a review. Secur. Commun. Netw. 8, 2561\u20132579 (2015)","DOI":"10.1002\/sec.1186"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Mart\u00edn del Rey, A., Rodr\u00edguez S\u00e1nchez, G.: A discrete mathematical model to simulate malware spreading. Int. J. Mod. Phys. C 23, 1\u201316 (2012). Article number 1250064","DOI":"10.1142\/S0129183112500647"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/COMST.2016.2636078","volume":"19","author":"EM Rudd","year":"2017","unstructured":"Rudd, E.M., Rozsa, A., G\u00fcnter, M., Boult, T.E.: A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions. IEEE Commun. Surv. Tutor. 19, 1145\u20131172 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/349194.349202","volume":"32","author":"P Sarkar","year":"2000","unstructured":"Sarkar, P.: A brief history of cellular automata. ACM Comput. Surv. 32, 80\u2013107 (2000)","journal-title":"ACM Comput. Surv."},{"key":"12_CR17","first-page":"204","volume":"15","author":"B Thomson","year":"2018","unstructured":"Thomson, B., Morris-King, J.: An agent-based modeling framework for cybersecurity in mobile tactical networks. J. Def. Model. Simulat. 15, 204\u2013218 (2018)","journal-title":"J. Def. Model. Simulat."},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.cose.2017.09.001","volume":"72","author":"W Tounsi","year":"2018","unstructured":"Tounsi, W., Rais, H.: A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput. Secur. 72, 212\u2013233 (2018)","journal-title":"Comput. Secur."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Winkler, I., Treu Gomes, A.: Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies. Syngress-Elsevier, Cambridge (2017)","DOI":"10.1016\/B978-0-12-809316-0.00002-6"}],"container-title":["Advances in Intelligent Systems and Computing","Distributed Computing and Artificial Intelligence, 16th International Conference, Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23946-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T15:06:03Z","timestamp":1729177563000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23946-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030239459","9783030239466"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23946-6_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u00c1vila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}