{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:32:12Z","timestamp":1742985132365,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030239459"},{"type":"electronic","value":"9783030239466"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-23946-6_15","type":"book-chapter","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T02:03:58Z","timestamp":1561428238000},"page":"133-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Review of SEIR-D Agent-Based Model"],"prefix":"10.1007","author":[{"given":"Farrah Kristel","family":"Batista","sequence":"first","affiliation":[]},{"given":"Angel Mart\u00edn","family":"del Rey","sequence":"additional","affiliation":[]},{"given":"Araceli","family":"Queiruga-Dios","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.cosrev.2017.03.001","volume":"24","author":"S Abar","year":"2017","unstructured":"Abar, S., Theodoropoulos, G.K., Lemarinier, P., O\u2019Hare, G.M.: Agent based modelling and simulation tools: a review of the state-of-art software. Comput. Sci. Rev. 24, 13\u201333 (2017)","journal-title":"Comput. Sci. Rev."},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ecolmodel.2018.10.008","volume":"389","author":"TM Anderson","year":"2018","unstructured":"Anderson, T.M., Dragi\u0107evi\u0107, S.: Network-agent based model for simulating the dynamic spatial network structure of complex ecological systems. Ecol. Modell. 389, 19\u201332 (2018)","journal-title":"Ecol. Modell."},{"key":"15_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/9781118964385","volume-title":"Spatial Agent-Based Simulation Modeling in Public Health: Design, Implementation, and Applications for Malaria Epidemiology","author":"SN Arifin","year":"2016","unstructured":"Arifin, S.N., Madey, G.R., Collins, F.H.: Spatial Agent-Based Simulation Modeling in Public Health: Design, Implementation, and Applications for Malaria Epidemiology. Wiley, New York (2016)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Bin\u00a0Karnain, A., Bin\u00a0Zakaria, Z.: A review on ZigBee security enhancement in smart home environment. In: 2nd International Conference on Information Science and Security (ICISS), pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/ICISSEC.2015.7370969"},{"issue":"4","key":"15_CR5","first-page":"159","volume":"6","author":"H Chizari","year":"2014","unstructured":"Chizari, H., Zulkurnain, A.U.: Modelling malware response in wireless sensor networks using stochastic cellular automata. J. Mobile Embed. Distrib. Syst. 6(4), 159\u2013166 (2014)","journal-title":"J. Mobile Embed. Distrib. Syst."},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.physa.2018.02.019","volume":"503","author":"Z Chu","year":"2018","unstructured":"Chu, Z., Yang, B., Ha, C.Y., Ahn, K.: Modeling GDP fluctuations with agent-based model. Physica A 503, 572\u2013581 (2018)","journal-title":"Physica A"},{"key":"15_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-3460-7","volume-title":"Secure Wireless Sensor Networks: Threats and Solutions","author":"M Conti","year":"2015","unstructured":"Conti, M.: Secure Wireless Sensor Networks: Threats and Solutions, vol. 65. Springer, New York (2015)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Feng, L., Song, L., Zhao, Q., Wang, H.: Modeling and stability analysis of worm propagation in wireless sensor network. Math. Probl. Eng. (2015)","DOI":"10.1155\/2015\/129598"},{"key":"15_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24004-1","volume-title":"Social Self-Organization: Agent-Based Simulations and Experiments to Study Emergent Social Behavior","author":"D Helbing","year":"2012","unstructured":"Helbing, D.: Social Self-Organization: Agent-Based Simulations and Experiments to Study Emergent Social Behavior. Springer, Heidelberg (2012)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Hu, J., Song, Y.: The model of malware propagation in wireless sensor networks with regional detection mechanism. In: China Conference on Wireless Sensor Networks, pp. 651\u2013662. Springer (2014)","DOI":"10.1007\/978-3-662-46981-1_61"},{"key":"15_CR11","first-page":"700","volume":"115","author":"WO Kermack","year":"1927","unstructured":"Kermack, W.O., Mckendrick, A.G.: A contribution to the mathematical theory of epidemics. Proc. R. Soc. Lond. 115, 700\u2013721 (1927)","journal-title":"Proc. R. Soc. Lond."},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"251","DOI":"10.14257\/ijgdc.2014.7.3.25","volume":"7","author":"N Keshri","year":"2014","unstructured":"Keshri, N., Mishra, B.K.: Optimal control model for attack of worms in wireless sensor network. Int. J. Grid Distrib. Comput. 7, 251\u2013272 (2014)","journal-title":"Int. J. Grid Distrib. Comput."},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.chaos.2014.08.006","volume":"68","author":"N Keshri","year":"2014","unstructured":"Keshri, N., Mishra, B.K.: Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network. Chaos Solitons Fractals 68, 151\u2013158 (2014)","journal-title":"Chaos Solitons Fractals"},{"issue":"6","key":"15_CR14","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1007\/s11424-014-1178-1","volume":"27","author":"Q Li","year":"2014","unstructured":"Li, Q., Zhang, B., Cui, L., Fan, Z., Athanasios, V.V.: Epidemics on small worlds of tree-based wireless sensor networks. J. Syst. Sci. Complex 27(6), 1095\u20131120 (2014)","journal-title":"J. Syst. Sci. Complex"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"O\u2019Mahony, G.D., Harris, P.J., Murphy, C.C.: Analyzing the vulnerability of wireless sensor networks to a malicious matched protocol attack. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/CCST.2018.8585681"},{"key":"15_CR16","unstructured":"Project Mesa Team: Mesa: Agent-Based Modeling in Python 3+ (2018). https:\/\/github.com\/projectmesa\/mesa\/"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jnca.2016.08.022","volume":"75","author":"MFA Razak","year":"2016","unstructured":"Razak, M.F.A., Anuar, N.B., Salleh, R., Firdaus, A.: The rise of \u201cmalware\u201d: bibliometric analysis of malware study. J. Netw. Comput. Appl. 75, 58\u201376 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"del Rey, A.M., Guill\u00e9n, J.H., S\u00e1nchez, G.R.: Modeling malware propagation in wireless sensor networks with individual-based models. In: Conference of the Spanish Association for Artificial Intelligence, pp. 194\u2013203. Springer (2016)","DOI":"10.1007\/978-3-319-44636-3_18"},{"issue":"6","key":"15_CR19","doi-asserted-by":"publisher","first-page":"855","DOI":"10.3390\/s16060855","volume":"16","author":"S Shen","year":"2016","unstructured":"Shen, S., Huang, L., Liu, J., Champion, A.C., Yu, S., Cao, Q.: Reliability evaluation for clustered WSNs under malware propagation. Sensors 16(6), 855 (2016)","journal-title":"Sensors"},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.jnca.2017.05.003","volume":"91","author":"S Shen","year":"2017","unstructured":"Shen, S., Ma, H., Fan, E., Hu, K., Yu, S., Liu, J., Cao, Q.: A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous wsns with malware diffusion. J. Netw. Comput. Appl. 91, 26\u201335 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Siegfried, R.: Modeling and Simulation of Complex Systems: A Framework for Efficient Agent-Based Modeling and Simulation. Springer, Berlin (2014)","DOI":"10.1007\/978-3-658-07529-3"},{"issue":"1","key":"15_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3390\/s17010139","volume":"17","author":"T Wang","year":"2017","unstructured":"Wang, T., Wu, Q., Wen, S., Cai, Y., Tian, H., Chen, Y., Wang, B.: Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks. Sensors 17(1), 139 (2017)","journal-title":"Sensors"},{"issue":"3","key":"15_CR23","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1049\/iet-net.2017.0070","volume":"7","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Li, D., Dong, N.: Cellular automata malware propagation model for WSN based on multi-player evolutionary game. IET Netw. 7(3), 129\u2013135 (2017)","journal-title":"IET Netw."},{"key":"15_CR24","volume-title":"Agent-based Modeling and Aimulation in Archaeology","author":"G Wurzer","year":"2015","unstructured":"Wurzer, G., Kowarik, K., Reschreiter, H.: Agent-based Modeling and Aimulation in Archaeology. Springer, Cham (2015)"},{"issue":"1","key":"15_CR25","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1186\/1687-1847-2014-295","volume":"2014","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Si, F.: Dynamics of a delayed SEIRS-V model on the transmission of worms in a wireless sensor network. Adv. Differ. Equations 2014(1), 295 (2014)","journal-title":"Adv. Differ. Equations"},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1016\/j.neucom.2014.08.060","volume":"149","author":"L Zhu","year":"2015","unstructured":"Zhu, L., Zhao, H.: Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 149, 1370\u20131386 (2015)","journal-title":"Neurocomputing"},{"issue":"8","key":"15_CR27","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.camwa.2015.02.004","volume":"69","author":"L Zhu","year":"2015","unstructured":"Zhu, L., Zhao, H., Wang, X.: Stability and bifurcation analysis in a delayed reaction-diffusion malware propagation model. Comput. Math. Appl. 69(8), 852\u2013875 (2015)","journal-title":"Comput. Math. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Distributed Computing and Artificial Intelligence, 16th International Conference, Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23946-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T15:05:43Z","timestamp":1729177543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23946-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030239459","9783030239466"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23946-6_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u00c1vila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}