{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:25:27Z","timestamp":1743135927394,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_24","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"253-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Simulating Malware Propagation with Different Infection Rates"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6240-6418","authenticated-orcid":false,"given":"Jose Diamantino Hern\u00e1ndez","family":"Guill\u00e9n","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3600-0016","authenticated-orcid":false,"given":"Angel Mart\u00edn del","family":"Rey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"issue":"15","key":"24_CR1","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1002\/sec.1186","volume":"8","author":"AM dey Rey","year":"2015","unstructured":"dey Rey, A.M.: Mathematical modeling of the propagation of malware: a review. Secur. Commun. Netw. 8(15), 2561\u20132579 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"24_CR2","unstructured":"Odo, D., Hans, H, Tom, B.: Mathematical tools for understanding infectious disease dynamics, vol. 7. Princeton University Press (2012)"},{"issue":"16\u201317","key":"24_CR3","doi-asserted-by":"publisher","first-page":"8225","DOI":"10.1016\/j.apm.2013.03.051","volume":"37","author":"L Feng","year":"2013","unstructured":"Feng, L., Liao, X., Han, Q., Li, H.: Dynamical analysis and control strategies on malware propagation model. Appl. Math. Modell. 37(16\u201317), 8225\u20138236 (2013)","journal-title":"Appl. Math. Modell."},{"key":"24_CR4","unstructured":"Hern\u00e1ndez Guill\u00e9n, J.D., del Rey, A.M.: Modeling malware propagation using a carrier compartment. Commun. Nonlinear Sci. Numer. Simulat. 56, 217\u2013226 (2018)"},{"key":"24_CR5","unstructured":"Vasileios, K., Khouzani, M.H.R.: Malware Diffusion Models for Modern Complex Networks: Theory and Applications. Morgan Kaufmann (2016)"},{"issue":"4","key":"24_CR6","doi-asserted-by":"publisher","first-page":"3141","DOI":"10.1016\/j.apm.2015.09.105","volume":"40","author":"W Liu","year":"2016","unstructured":"Liu, W., Liu, C., Liu, X., Cui, S., Huang, X.: Modeling the spread of malware with the influence of heterogeneous immunization. Appl. math. modell. 40(4), 3141\u20133152 (2016)","journal-title":"Appl. math. modell."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"del Rey, A.M., Hern\u00e1ndez\u00a0Guill\u00e9n, J.D., Rodr\u00edguez\u00a0S\u00e1nchez, G.: Study of the malware scirs model with different incidence rates. Logic J. IGPL, 27(2), 202\u2013213 (2019)","DOI":"10.1093\/jigpal\/jzy033"},{"issue":"2","key":"24_CR8","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1109\/SURV.2013.070813.00214","volume":"16","author":"S Peng","year":"2013","unstructured":"Peng, S., Shui, Y., Yang, A.: Smartphone malware and its propagation modeling: a survey. IEEE Commun. Surv. Tutorials 16(2), 925\u2013941 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"den Driessche, P.V., Watmough, J.: Further notes on the basic reproduction number. In: Mathematical epidemiology, pp. 159\u2013178. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-78911-6_6"},{"key":"24_CR10","unstructured":"Stephen, W.: Introduction to Applied Nonlinear Dynamical Systems and Chaos, vol. 2, Springer (2003)"},{"key":"24_CR11","unstructured":"James, A.Y.: Invariance for ordinary differential equations. Math. Syst. Theory, 1(4), 353\u2013372 (1967)"},{"issue":"8","key":"24_CR12","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.camwa.2015.02.004","volume":"69","author":"L Zhu","year":"2015","unstructured":"Zhu, L., Zhao, H., Wang, X.: Stability and bifurcation analysis in a delayed reaction-diffusion malware propagation model. Comput. Math. Appl. 69(8), 852\u2013875 (2015)","journal-title":"Comput. Math. Appl."},{"issue":"12","key":"24_CR13","doi-asserted-by":"publisher","first-page":"5117","DOI":"10.1016\/j.cnsns.2012.05.030","volume":"17","author":"Q Zhu","year":"2012","unstructured":"Zhu, Q., Yang, X., Ren, J.: Modeling and analysis of the spread of computer virus. Commun. Nonlinear Sci. Numerical Simulat. 17(12), 5117\u20135124 (2012)","journal-title":"Commun. Nonlinear Sci. Numerical Simulat."}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:12:34Z","timestamp":1599477154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}