{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:43:39Z","timestamp":1743075819165,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811587597"},{"type":"electronic","value":"9789811587603"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-8760-3_20","type":"book-chapter","created":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T10:03:27Z","timestamp":1601287407000},"page":"272-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Node Isolated Strategy Based on Network Performance Gain Function: Security Defense Trade-Off Strategy Between Information Transmission and Information Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9996-7291","authenticated-orcid":false,"given":"Gang","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6600-1300","authenticated-orcid":false,"given":"Shiwei","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0851-2209","authenticated-orcid":false,"given":"Yun","family":"Feng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9091-3177","authenticated-orcid":false,"given":"Wenbin","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9497-7175","authenticated-orcid":false,"given":"Runnian","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"issue":"3","key":"20_CR1","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/TNET.2009.2034047","volume":"18","author":"H Yu","year":"2010","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., et al.: SybilLimit: a near-optimal social network defense against sybil attacks. IEEE\/ACM Trans. Netw. 18(3), 885\u2013898 (2010)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"20_CR2","unstructured":"Wang, G., Mohanlal, M., Wilson, C., et al.: Social turing tests: crowdsourcing sybil detection (2012). Eprint Arxiv \nhttps:\/\/arxiv.org\/abs\/1205.3856\n\n. Accessed 7 Dec 2012"},{"issue":"8","key":"20_CR3","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jnca.2016.11.030","volume":"79","author":"KS Adewole","year":"2017","unstructured":"Adewole, K.S., Anuar, N.B., Kamsin, A., et al.: Malicious accounts: dark of the social networks. J. Netw. Comput. Appl. 79(1), 41\u201367 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/972352","volume":"2013","author":"SM Cheng","year":"2013","unstructured":"Cheng, S.M., Vasileios, K., Chen, P.Y., et al.: Diffusion models for information dissemination dynamics in wireless complex communication networks. J. Complex Syst. 2013, 1\u201313 (2013)","journal-title":"J. Complex Syst."},{"issue":"1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"016105","DOI":"10.1103\/PhysRevE.82.016105","volume":"82","author":"J Zhao","year":"2010","unstructured":"Zhao, J., Wu, J., Xu, K.: Weak ties: subtle role of information diffusion in online social networks. Phys. Rev. E 82(1), 016105 (2010). \nhttps:\/\/doi.org\/10.1103\/PhysRevE.82.016105","journal-title":"Phys. Rev. E"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/j.physa.2016.11.119","volume":"469","author":"L Zhu","year":"2016","unstructured":"Zhu, L., Wang, Y.: Rumor spreading model with noise interference in complex social networks. Phys. A: Stat. Mech. Appl. 469, 750\u2013760 (2016)","journal-title":"Phys. A: Stat. Mech. Appl."},{"issue":"3","key":"20_CR8","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1016\/j.jss.2012.11.027","volume":"86","author":"CY Huang","year":"2013","unstructured":"Huang, C.Y., Lee, C.L., Wen, T.H., et al.: A computer virus spreading model based on resource limitations and interaction costs. J. Syst. Softw. 86(3), 801\u2013808 (2013)","journal-title":"J. Syst. Softw."},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TNSE.2017.2734075","volume":"5","author":"LX Yang","year":"2017","unstructured":"Yang, L.X., Yang, X., Tang, Y.: A bi-virus competing spreading model with generic infection rates. IEEE Trans. Netw. Sci. Eng. 5, 2\u201313 (2017)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.cnsns.2016.12.025","volume":"48","author":"D Xu","year":"2017","unstructured":"Xu, D., Xu, X., Xie, Y., et al.: Optimal control of an SIVRS epidemic spreading model with virus variation based on complex networks. Commun. Nonlinear Sci. Numer. Simul. 48, 200\u2013210 (2017)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"20_CR11","first-page":"1","volume":"2018","author":"CM Zhang","year":"2018","unstructured":"Zhang, C.M.: Global behavior of a computer virus propagation model on multilayer networks. Secur. Commun. Netw. 2018, 1\u20139 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13662-018-1672-1","volume":"2018","author":"J Ali","year":"2018","unstructured":"Ali, J., Saeed, M., Rafiq, M., Iqbal, S.: Numerical treatment of nonlinear model of virus propagation in computer networks: an innovative evolutionary Pad\u00e9 approximation scheme. Adv. Differ. Equ. 2018(1), 1\u201318 (2018). \nhttps:\/\/doi.org\/10.1186\/s13662-018-1672-1","journal-title":"Adv. Differ. Equ."},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.procs.2018.04.195","volume":"131","author":"T Li","year":"2018","unstructured":"Li, T., Wang, S., Li, B.: Research on suppression strategy of social network information based on effective isolation. Procedia Comput. Sci. 131, 131\u2013138 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"20_CR14","unstructured":"Soini, M., Kukkurainen, J., Lauri, S.: Security and performance trade-off in KILAVI wireless sensor network. In: WSEAS International Conference on Computers. World Scientific and Engineering Academy and Society (WSEAS) (2010)"},{"issue":"1","key":"20_CR15","first-page":"1","volume":"2009","author":"C Lin","year":"2009","unstructured":"Lin, C., Jean, L.: Research article on multipath routing in multihop wireless networks: security, performance, and their tradeoff. Eurasip J. Wirel. Commun. Netw. 2009(1), 1\u201313 (2009)","journal-title":"Eurasip J. Wirel. Commun. Netw."},{"issue":"1","key":"20_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2018.2840488","volume":"14","author":"X Lei","year":"2019","unstructured":"Lei, X., Jiang, C.X., Han, Z., et al.: Trust-based collaborative privacy management in online social networks. IEEE Trans. Inf. Forensics Secur. 14(1), 48\u201360 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"20_CR17","doi-asserted-by":"publisher","first-page":"113","DOI":"10.12785\/amis\/070112","volume":"7","author":"S Chen","year":"2013","unstructured":"Chen, S., Jiang, J., Pang, S., et al.: Modeling and optimization of train scheduling network based on invulnerability analysis. Appl. Math. Inf. Sci. 7(1), 113\u2013119 (2013)","journal-title":"Appl. Math. Inf. Sci."},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"6700","DOI":"10.1109\/ACCESS.2017.2769964","volume":"6","author":"X Gao","year":"2017","unstructured":"Gao, X., Keqiu, L.I., et al.: Invulnerability measure of a military heterogeneous network based on network structure entropy. IEEE Access 6, 6700\u20136708 (2017). \nhttps:\/\/doi.org\/10.1109\/ACCESS.2017.2769964","journal-title":"IEEE Access"},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cnsns.2013.06.018","volume":"19","author":"C Gan","year":"2014","unstructured":"Gan, C., Yang, X., Liu, W., Zhu, Q.: A propagation model of computer virus with nonlinear vaccination probability. Commun. Nonlinear Sci. Number Simul. 19, 92\u2013100 (2014)","journal-title":"Commun. Nonlinear Sci. Number Simul."},{"key":"20_CR20","first-page":"2413","volume":"17","author":"H Guo","year":"2017","unstructured":"Guo, H., Li, M.: Impacts of migration and immigration on disease transmission dynamics in heterogeneous populations. Discret. Contin. Dyn. Syst.-Ser. B 17, 2413\u20132430 (2017)","journal-title":"Discret. Contin. Dyn. Syst.-Ser. B"},{"issue":"3","key":"20_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0120567","volume":"10","author":"P Holme","year":"2015","unstructured":"Holme, P., Masuda, N.: The basic reproduction number as a predictor for epidemic outbreaks in temporal networks. PLoS ONE 10(3), 1\u201315 (2015)","journal-title":"PLoS ONE"},{"key":"20_CR22","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/j.physa.2016.01.045","volume":"450","author":"T Li","year":"2016","unstructured":"Li, T., Liu, X., Wu, J., et al.: An epidemic spreading model on adaptive scale-free networks with feedback mechanism. Phys. A: Stat. Mech. Appl. 450, 649\u2013656 (2016)","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"20_CR23","unstructured":"Muchnik, L.: Complex networks package for MATLAB. \nhttp:\/\/www.levmuchnik.net\/Content\/Networks\/ComplexNetworksPackage.html\n\n (2013)"}],"container-title":["Communications in Computer and Information Science","Recent Advances in Data Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-8760-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T10:36:33Z","timestamp":1601289393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-8760-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811587597","9789811587603"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-8760-3_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDMB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International conference on Data Science, Medicine and Bioinformatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanning","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idmb2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.idmb-net.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}