{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:41:50Z","timestamp":1726044110702},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030312763"},{"type":"electronic","value":"9783030312770"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31277-0_17","type":"book-chapter","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T12:02:53Z","timestamp":1568376173000},"page":"267-274","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks"],"prefix":"10.1007","author":[{"given":"Mohamed Amine","family":"Rguibi","sequence":"first","affiliation":[]},{"given":"Najem","family":"Moussa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,14]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/11602613_30","volume-title":"Algorithms and Computation","author":"M Mavronicolas","year":"2005","unstructured":"Mavronicolas, M., Papadopoulou, V., Philippou, A., Spirakis, P.: Network game with attacker and protector entities. In: Deng, X., Du, D.-Z. (eds.) ISAAC 2005. LNCS, vol. 3827, pp. 288\u2013297. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11602613_30"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1007\/11600930_98","volume-title":"Internet and Network Economics","author":"M Mavronicolas","year":"2005","unstructured":"Mavronicolas, M., Papadopoulou, V., Philippou, A., Spirakis, P.: A graph-theoretic network security game. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 969\u2013978. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11600930_98"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Mavronicolas, M., Monien, B., Papadopoulou, V.G.: How many attackers can selfish defenders catch? In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), p. 470, IEEE, January 2008","DOI":"10.1109\/HICSS.2008.193"},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/SURV.2013.100913.00195","volume":"16","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Wen, S., Xiang, Y., Zhou, W.: Modeling the propagation of worms in networks: a survey. IEEE Commun. Surv. Tutorials 16(2), 942\u2013960 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"6","key":"17_CR5","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1007\/s12083-014-0306-y","volume":"8","author":"A Jafarabadi","year":"2015","unstructured":"Jafarabadi, A., Azgomi, M.A.: A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology. Peer-to-Peer Network. Appl. 8(6), 1008\u20131022 (2015)","journal-title":"Peer-to-Peer Network. Appl."},{"issue":"1702","key":"17_CR6","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1098\/rspb.2010.1107","volume":"278","author":"Feng Fu","year":"2010","unstructured":"Fu, F., Rosenbloom, D.I., Wang, L., Nowak, M.A.: Imitation dynamics of vaccination behaviour on social networks. Proc. R. Soc. B Biol. Sci. 278(1702), 42\u201349 (2010)","journal-title":"Proceedings of the Royal Society B: Biological Sciences"},{"issue":"4","key":"17_CR7","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1016\/j.cnsns.2013.08.028","volume":"19","author":"C Liu","year":"2014","unstructured":"Liu, C., Zhang, Z.K.: Information spreading on dynamic social networks. Commun. Nonlinear Sci. Numer. Simul. 19(4), 896\u2013904 (2014)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"7\u20138","key":"17_CR8","doi-asserted-by":"publisher","first-page":"2173","DOI":"10.1016\/j.apm.2013.10.046","volume":"38","author":"BK Mishra","year":"2014","unstructured":"Mishra, B.K., Pandey, S.K.: Dynamic model of worm propagation in computer network. Appl. Math. Model. 38(7\u20138), 2173\u20132179 (2014)","journal-title":"Appl. Math. Model."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Q., Chen, Z., Chen, C., Pissinou, N.: On the robustness of the botnet topology formed by worm infection. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, IEEE, pp. 1\u20136, December 2010","DOI":"10.1109\/GLOCOM.2010.5684002"},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TDSC.2010.13","volume":"8","author":"W Yu","year":"2011","unstructured":"Yu, W., Wang, X., Calyam, P., Xuan, D., Zhao, W.: Modeling and detection of camouflaging worm. IEEE Trans. Dependable Secure Comput. 8(3), 377\u2013390 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1103\/PhysRevE.58.69","volume":"58","author":"G Szab\u00f3","year":"1998","unstructured":"Szab\u00f3, G., T\u0151ke, C.: Evolutionary prisoner\u2019s dilemma game on a square lattice. Phys. Rev. E 58(1), 69 (1998)","journal-title":"Phys. Rev. E"},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.jtbi.2007.01.002","volume":"246","author":"A Traulsen","year":"2007","unstructured":"Traulsen, A., Pacheco, J.M., Nowak, M.A.: Pairwise comparison and selection temperature in evolutionary game dynamics. J. Theor. Biol. 246(3), 522\u2013529 (2007)","journal-title":"J. Theor. Biol."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chaos.2014.07.004","volume":"68","author":"E Fukuda","year":"2014","unstructured":"Fukuda, E., et al.: Risk assessment for infectious disease and its impact on voluntary vaccination behavior in social networks. Chaos Solitons Fractals 68, 1\u20139 (2014)","journal-title":"Chaos Solitons Fractals"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.physa.2014.07.073","volume":"415","author":"D Han","year":"2014","unstructured":"Han, D., Sun, M.: Can memory and conformism resolve the vaccination dilemma? Physica A Stat. Mech. Appl. 415, 95\u2013104 (2014)","journal-title":"Physica A Stat. Mech. Appl."},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.physa.2016.10.017","volume":"468","author":"G Ichinose","year":"2017","unstructured":"Ichinose, G., Kurisaku, T.: Positive and negative effects of social impact on evolutionary vaccination game in networks. Physica A Stat. Mech. Appl. 468, 84\u201390 (2017)","journal-title":"Physica A Stat. Mech. Appl."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Saha, S., Adiga, A., Vullikanti, A.K.S.: Equilibria in epidemic containment games. In: Twenty-Eighth AAAI Conference on Artificial Intelligence, June 2014","DOI":"10.1609\/aaai.v28i1.8819"},{"issue":"25","key":"17_CR17","doi-asserted-by":"publisher","first-page":"2340","DOI":"10.1021\/j100540a008","volume":"81","author":"DT Gillespie","year":"1977","unstructured":"Gillespie, D.T.: Exact stochastic simulation of coupled chemical reactions. J. Phys. Chem. 81(25), 2340\u20132361 (1977)","journal-title":"J. Phys. Chem."},{"issue":"5439","key":"17_CR18","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509\u2013512 (1999)","journal-title":"Science"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31277-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T17:11:23Z","timestamp":1664385083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31277-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030312763","9783030312770"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31277-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NETYS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Networked Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakech","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"netys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/netys.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.91","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.68","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}