{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T11:39:45Z","timestamp":1762429185076,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_63","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"619-629","source":"Crossref","is-referenced-by-count":6,"title":["A CA Model for Mobile Malware Spreading Based on Bluetooth Connections"],"prefix":"10.1007","author":[{"given":"\u00c1ngel Mart\u00edn","family":"del Rey","sequence":"first","affiliation":[]},{"given":"Gerardo Rodr\u00edguez","family":"S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"63_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L. Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Comput. Netw.\u00a054(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"issue":"1","key":"63_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/LCOMM.2010.01.100830","volume":"15","author":"S.M. Cheng","year":"2011","unstructured":"Cheng, S.M., Ao, W.C., Chen, P.Y., Chen, K.C.: On Modeling Malware Propagation in Generalized Social Networks. IEEE Commun. Lett.\u00a015(1), 25\u201327 (2011)","journal-title":"IEEE Commun. Lett."},{"key":"63_CR3","unstructured":"International Data Corporation (IDC), \n                    http:\/\/www.idc.com\/"},{"issue":"6","key":"63_CR4","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1109\/TDSC.2012.72","volume":"9","author":"J.T. Jackson","year":"2012","unstructured":"Jackson, J.T., Creese, S.: Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors. IEEE T. Depend. Secure\u00a09(6), 930\u2013943 (2012)","journal-title":"IEEE T. Depend. Secure"},{"key":"63_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1080793.1080806","volume-title":"Proc. of the 4th ACM Workshop on Wireless Security","author":"J.W. Mickens","year":"2005","unstructured":"Mickens, J.W., Noble, B.D.: Modeling Epidemic Spreading in Mobile Environments. In: Proc. of the 4th ACM Workshop on Wireless Security, pp. 77\u201386. ACM Press, NY (2005)"},{"issue":"5","key":"63_CR6","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1016\/j.jcss.2012.11.007","volume":"79","author":"S. Peng","year":"2013","unstructured":"Peng, S., Wang, G., Yu, S.: Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. J. Comput. System Sci.\u00a079(5), 586\u2013595 (2013)","journal-title":"J. Comput. System Sci."},{"key":"63_CR7","doi-asserted-by":"crossref","unstructured":"Ramachandran, K., Sikdar, B.: On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics. In: Proc. of the 2007 IEEE International Conference on Communications, pp. 6169\u20136174. IEEE Press (2007)","DOI":"10.1109\/ICC.2007.1021"},{"key":"63_CR8","doi-asserted-by":"crossref","unstructured":"Ramachandran, K., Sikdar, B.: Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics. In: Proc. of the 26th IEEE International Conference on Computer Communications, pp. 2516\u20132520. IEEE Press (2007)","DOI":"10.1109\/INFCOM.2007.312"},{"key":"63_CR9","doi-asserted-by":"publisher","first-page":"6837","DOI":"10.1016\/j.physa.2008.09.017","volume":"387","author":"C.J. Rhodes","year":"2008","unstructured":"Rhodes, C.J., Nekovee, M.: The opportunistic transmission of wireless worms between mobile devices. Physica A\u00a0387, 6837\u20136844 (2008)","journal-title":"Physica A"},{"key":"63_CR10","unstructured":"Sathyan, J., Anoop, N., Narayan, N., Vallathai, S.K.: A Comprohensive Guide to Enterprise Mobility. CRC Press (2012)"},{"issue":"2","key":"63_CR11","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/S1005-8885(08)60085-0","volume":"15","author":"X. Wei","year":"2008","unstructured":"Wei, X., Zhao-Hui, L., Zeng-Qiang, C., Zhu-Zhi, Y.: Commwarrior worm propagation model for smart phone networks. J. China U Posts Telecommun.\u00a015(2), 60\u201366 (2008)","journal-title":"J. China U Posts Telecommun."},{"key":"63_CR12","volume-title":"A New Kind of Science","author":"S. Wolfram","year":"2002","unstructured":"Wolfram, S.: A New Kind of Science. Wolfram Media Inc., Champaign (2002)"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:09:47Z","timestamp":1676819387000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_63","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}