{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T19:24:37Z","timestamp":1771269877085,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319473635","type":"print"},{"value":"9783319473642","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-47364-2_65","type":"book-chapter","created":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T12:41:56Z","timestamp":1475239316000},"page":"668-677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Miguel","family":"L\u00f3pez","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Peinado","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9s","family":"Ortiz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,1]]},"reference":[{"key":"65_CR1","first-page":"700","volume":"115","author":"WO Kermack","year":"1927","unstructured":"Kermack, W.O., McKendrick, A.G.: Contributions to the mathematical theory of epidemics, part I. Proc. Roy Soc Edin A 115, 700\u2013721 (1927)","journal-title":"Proc. Roy Soc Edin A"},{"key":"65_CR2","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 343\u2013359 (1991)","DOI":"10.1109\/RISP.1991.130801"},{"key":"65_CR3","unstructured":"Azni, A.H., Ahmad, R., Mohamad Noh, Z.A.: Correlated node behavior in wireless ad hoc networks: an epidemic model. In: Proceedings of 7th International Conference for Internet Technology and Secured Transactions, pp. 403\u2013410 (2012)"},{"key":"65_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1525856.1525861","volume":"3","author":"P De","year":"2009","unstructured":"De, P., Liu, Y., Das, S.K.: Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. ACM Trans. Sensor Networks 3, 1\u201333 (2009)","journal-title":"ACM Trans. Sensor Networks"},{"key":"65_CR5","doi-asserted-by":"publisher","first-page":"251","DOI":"10.14257\/ijgdc.2014.7.3.25","volume":"7","author":"N Keshri","year":"2014","unstructured":"Keshri, N., Mishra, B.K.: Optimal control model for attack of worms in wireless sensor network. Int. J. Grid Distrib. Comput. 7, 251\u2013272 (2014)","journal-title":"Int. J. Grid Distrib. Comput."},{"key":"65_CR6","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1016\/j.apm.2012.09.025","volume":"37","author":"BK Mishra","year":"2013","unstructured":"Mishra, B.K., Keshri, N.: Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model. 37, 4103\u20134111 (2013)","journal-title":"Appl. Math. Model."},{"key":"65_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCC.2014.2300855","volume":"2","author":"BK Mishra","year":"2014","unstructured":"Mishra, B.K., Srivastava, S.K.: A quarantine model on the spreading behavior of worms in wireless sensor network. Trans. IoT Cloud Comput. 2, 1\u201312 (2014)","journal-title":"Trans. IoT Cloud Comput."},{"key":"65_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10776-011-0147-z","volume":"18","author":"S Tang","year":"2011","unstructured":"Tang, S.: A modified epidemic model for virus spread control in wireless sensor networks. Int. J. Wirel. Inf. Networks 18, 319\u2013326 (2011)","journal-title":"Int. J. Wirel. Inf. Networks"},{"key":"65_CR9","first-page":"8","volume":"18","author":"W Xiaoming","year":"2009","unstructured":"Xiaoming, W., Yingshu, L.: An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks. Chin. J. Electron. 18, 8\u201312 (2009)","journal-title":"Chin. J. Electron."},{"issue":"15","key":"65_CR10","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1002\/sec.1186","volume":"8","author":"A Mart\u00edn del Rey","year":"2015","unstructured":"Mart\u00edn del Rey, A.: Mathematical modeling of the propagation of malware: a review. Secur. Commun. Networks 8(15), 2561\u20132579 (2015)","journal-title":"Secur. Commun. Networks"},{"key":"65_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.14257\/ijfgcn.2013.6.5.10","volume":"6","author":"M Chowdhury","year":"2013","unstructured":"Chowdhury, M., Kader, M.F.: Asaduzzaman: security issues in wireless sensor networks: a survey. Int. J. Future Gener. Commun. Networking 6, 97\u2013116 (2013)","journal-title":"Int. J. Future Gener. Commun. Networking"},{"key":"65_CR12","doi-asserted-by":"crossref","unstructured":"Francillon, A., Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 15\u201326. ACM (2008)","DOI":"10.1145\/1455770.1455775"},{"key":"65_CR13","doi-asserted-by":"crossref","unstructured":"Habibi, J., Gupta, A., Carlsony, S., Panicker, A., Bertino, E.: Mavr: code reuse stealthy attacks and mitigation on unmanned aerial vehicles. In: Distributed Computing Systems (ICDCS), pp. 642\u2013652. IEEE (2015)","DOI":"10.1109\/ICDCS.2015.71"},{"key":"65_CR14","doi-asserted-by":"crossref","unstructured":"Braden, K., Crane, S., Davi, L., Franz, M., Larsen, P., Liebchen, C., Sadeghi, A.R.: Leakage-resilient layout randomization for mobile devices. In: Network and Distributed Systems Security Symposium (NDSS) (2016)","DOI":"10.14722\/ndss.2016.23364"},{"key":"65_CR15","first-page":"1627","volume":"10","author":"H Modares","year":"2013","unstructured":"Modares, H., Moravejosharieh, A., Salleh, R., Lloret, J.: Security overview of wireless sensor network. Life Sci. J. 10, 1627\u20131632 (2013)","journal-title":"Life Sci. J."},{"key":"65_CR16","doi-asserted-by":"crossref","unstructured":"Znaidi, W., Minier, M., Babau, J.P.: An ontology for attacks in wireless sensor networks. Unit\u00e9 de recherche INRIA Rh\u00f4ne-Alpes, Rapport de recherche N\u00ba 6704, pp 1\u201313 (2008)","DOI":"10.1109\/PIMRC.2008.4699583"},{"key":"65_CR17","unstructured":"Sokullu, R., Korkmazy, I., Dagdevirenz, O., Mitsevax, A., Prasad, N.R.: An investigation on IEEE 802. 15. 4 MAC layer attacks. In: Proceedings of The 10th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2007)"},{"key":"65_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.05.004","volume":"88","author":"D Guglielmo","year":"2016","unstructured":"Guglielmo, D., Brienza, S., Anastasi, G.: IEEE 802.15.4e: A survey. Comput. Commun. 88, 1\u201324 (2016)","journal-title":"Comput. Commun."},{"key":"65_CR19","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"HW Hethecote","year":"2000","unstructured":"Hethecote, H.W.: The mathematics of infectious diseases. SIAM Rev. 42, 599\u2013653 (2000)","journal-title":"SIAM Rev."},{"key":"65_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78911-6","volume-title":"Mathematical Epidemiology","author":"F Brauer","year":"2008","unstructured":"Brauer, F., van den Driessche, P., Wu, J.: Mathematical Epidemiology. Springer, Heidelberg (2008)"},{"key":"65_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MSP.2016.13","volume":"14","author":"M Lichtman","year":"2016","unstructured":"Lichtman, M., Poston, J.D., Amuru, S., Shahriar, C., Clancy, T.C., Buehrer, R.M., Reed, J.H.: A communications jamming taxonomy. IEEE Secur. Priv. 14, 47\u201354 (2016)","journal-title":"IEEE Secur. Priv."},{"key":"65_CR22","unstructured":"Wei, Y., van Hoesel, L.L., Doumen, J., Hartel, P., Havinga, P.: Energy efficient link layer jamming attacks against wireless sensor network MAC protocols. In: SANS 2005 (2005)"},{"key":"65_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.5121\/jgraphhoc.2011.3103","volume":"3","author":"S Mohammadi","year":"2011","unstructured":"Mohammadi, S., Jadidoleslamy, V.: A comparison of link layer attacks on wireless sensor networks. Int. J. Appl. Graph Theory Wireless ad hoc Networks Sensor Networks 3, 35\u201356 (2011)","journal-title":"Int. J. Appl. Graph Theory Wireless ad hoc Networks Sensor Networks"},{"key":"65_CR24","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1016\/j.neucom.2014.08.060","volume":"149","author":"L Zhu","year":"2015","unstructured":"Zhu, L., Zhao, H.: Dynamical analysis and optimal control for a malware propagation model in an information network. Neurocomputing 149, 1370\u20131386 (2015)","journal-title":"Neurocomputing"},{"key":"65_CR25","doi-asserted-by":"crossref","unstructured":"Hirsch, M.W., Smale, S., Devaney, R.L.: Differential equations, dynamical systems, and an introduction to chaos. In: 3rd Ed., Academic Press (2012)","DOI":"10.1016\/B978-0-12-382010-5.00015-4"},{"key":"65_CR26","volume-title":"Differential Equations and Dynamical Systems","author":"L Perko","year":"2010","unstructured":"Perko, L.: Differential Equations and Dynamical Systems, 3rd edn. Springer, Heidelberg (2010)","edition":"3"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201916-CISIS\u201916-ICEUTE\u201916"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47364-2_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T22:08:58Z","timestamp":1749593338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-47364-2_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"ISBN":["9783319473635","9783319473642"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47364-2_65","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,1]]},"assertion":[{"value":"1 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on EUropean Transnational Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Sebasti\u00e1n","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceute2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}