{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:16:27Z","timestamp":1767140187316,"version":"build-2238731810"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T00:00:00Z","timestamp":1538092800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100009043","name":"University of Patras","doi-asserted-by":"publisher","award":["C. Caratheodory Research Program E049"],"award-info":[{"award-number":["C. Caratheodory Research Program E049"]}],"id":[{"id":"10.13039\/100009043","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10115-018-1274-y","type":"journal-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T04:57:18Z","timestamp":1538110638000},"page":"807-836","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Virus propagation: threshold conditions for multiple profile networks"],"prefix":"10.1007","volume":"60","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7488-0483","authenticated-orcid":false,"given":"Angeliki","family":"Rapti","sequence":"first","affiliation":[]},{"given":"Kostas","family":"Tsichlas","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Sioutas","sequence":"additional","affiliation":[]},{"given":"Giannis","family":"Tzimas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,28]]},"reference":[{"key":"1274_CR1","volume-title":"Infectious diseases of humans","author":"R Anderson","year":"1992","unstructured":"Anderson R, May RM (1992) Infectious diseases of humans. Oxford University Press, Oxford"},{"issue":"6092","key":"1274_CR2","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1126\/science.1215842","volume":"337","author":"S Aral","year":"2012","unstructured":"Aral S, Walker D (2012) Identifying influential and susceptible members of social networks. Science 337(6092):337\u201341","journal-title":"Science"},{"key":"1274_CR3","volume-title":"The mathematical theory of infectious diseases and its applications","author":"N Bailey","year":"1975","unstructured":"Bailey N (1975) The mathematical theory of infectious diseases and its applications. Griffin, London"},{"key":"1274_CR4","unstructured":"Beutel A, Prakash BA, Rosenfeld R, Faloutsos C (2012) Interacting viruses in networks: Can both survive? In: Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201912. ACM, New York, pp 426\u2013434"},{"key":"1274_CR5","unstructured":"Boost. Boost c++ graph library. \n                    http:\/\/www.boost.org\/doc\/\n                    \n                  . Accessed 4 Apr 2016"},{"key":"1274_CR6","unstructured":"Chazelle B (2010) Analytical tools for natural algorithms. In: Innovations in computer science: ICS 2010, Tsinghua University, Beijing, China, January 5\u20137, 2010. Proceedings, pp 32\u201341. Tsinghua University Press"},{"key":"1274_CR7","doi-asserted-by":"crossref","unstructured":"Ganesh AJ, Massouli\u00e9 L, Towsley DF (2005) The effect of network topology on the spread of epidemics. In: INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies, 13\u201317 March 2005, Miami, FL, USA, pp 1455\u20131466","DOI":"10.1109\/INFCOM.2005.1498374"},{"key":"1274_CR8","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcmxp2z","volume-title":"Statistical and thermal physics: with computer applications","author":"H Gould","year":"2010","unstructured":"Gould H, Tobochnik J (2010) Statistical and thermal physics: with computer applications. Princeton University Press, Princeton"},{"issue":"4","key":"1274_CR9","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"HW Hethcote","year":"2000","unstructured":"Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42(4):599\u2013653","journal-title":"SIAM Rev"},{"key":"1274_CR10","volume-title":"Differential equations, dynamical systems and linear algebra","author":"MW Hirsch","year":"1974","unstructured":"Hirsch MW, Smale S (1974) Differential equations, dynamical systems and linear algebra. Academic Press, Cambridge"},{"key":"1274_CR11","unstructured":"Kephart JO, White SR (1993) Measuring and modeling computer virus prevalence. In: 1993 IEEE computer society symposium on research in security and privacy, Oakland, CA, USA, May 24\u201326, 1993, pp 2\u201315"},{"key":"1274_CR12","unstructured":"KONECT (May, 2016a) Dblp co-authorship network dataset. \n                    http:\/\/konect.uni-koblenz.de\/networks\/com-dblp\n                    \n                  . Accessed 4 May 2016"},{"key":"1274_CR13","unstructured":"KONECT (May, 2016b) Skitter network dataset. \n                    http:\/\/konect.uni-koblenz.de\/networks\/as-skitter\n                    \n                  . Accessed 4 May 2016"},{"issue":"1","key":"1274_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1217299.1217301","volume":"1","author":"J Leskovec","year":"2007","unstructured":"Leskovec J, Kleinberg J, Faloutsos C (2007) Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1(1):2","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"1","key":"1274_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2009","unstructured":"Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2009) Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math 6(1):29\u2013123","journal-title":"Internet Math"},{"issue":"98","key":"1274_CR16","doi-asserted-by":"publisher","first-page":"20140409","DOI":"10.1098\/rsif.2014.0409","volume":"11","author":"K Lum","year":"2014","unstructured":"Lum K, Swarup S, Eubank S, Hawdon J (2014) The contagious nature of imprisonment: an agent-based model to explain racial disparities in incarceration rates. J R Soc Interface 11(98):20140409","journal-title":"J R Soc Interface"},{"key":"1274_CR17","first-page":"98","volume":"14","author":"AG McKendrick","year":"2011","unstructured":"McKendrick AG (2011) Applications of mathematics to medical problems. Proc Edinb Math Soc 14:98\u2013130","journal-title":"Proc Edinb Math Soc"},{"key":"1274_CR18","doi-asserted-by":"publisher","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras R, Vespignani A (2001) Epidemic spreading in scale-free networks. Phys Rev Lett 86:3200\u20133203","journal-title":"Phys Rev Lett"},{"key":"1274_CR19","doi-asserted-by":"crossref","unstructured":"Prakash BA, Beutel A, Rosenfeld R, Faloutsos C (2012) Winner takes all: competing viruses or ideas on fair-play networks. In: Proceedings of the 21st international conference on world wide web, WWW \u201912. ACM, New York, pp 1037\u20131046","DOI":"10.1145\/2187836.2187975"},{"key":"1274_CR20","doi-asserted-by":"crossref","unstructured":"Prakash BA, Chakrabarti D, Faloutsos M, Valler N, Faloutsos C (2011) Threshold conditions for arbitrary cascade models on arbitrary networks. In: Proceedings of the 2011 IEEE 11th international conference on data mining, ICDM \u201911. IEEE Computer Society, Washington, pp 537\u2013546","DOI":"10.1109\/ICDM.2011.145"},{"key":"1274_CR21","doi-asserted-by":"crossref","unstructured":"Rapti A, Sioutas S, Tsichlas K, Tzimas G (2015) Virus propagation in multiple profile networks. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, Sydney, NSW, Australia, August 10\u201313, 2015, pp 975\u2013984","DOI":"10.1145\/2783258.2783386"},{"issue":"31","key":"1274_CR22","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1109\/JSAC.2013.130607","volume":"6","author":"X Wei","year":"2013","unstructured":"Wei X, Valler N, Prakash BA, Neamtiu I, Faloutsos M, Faloutsos C (2013) Competing memes propagation on networks: a case study of composite networks. IEEE J Sel Areas Commun 6(31):1049\u20131060","journal-title":"IEEE J Sel Areas Commun"},{"key":"1274_CR23","doi-asserted-by":"crossref","unstructured":"Yang J, Leskovec J (2012) Defining and evaluating network communities based on ground-truth. In: ACM SIGKDD workshop on mining data semantics. ACM, p\u00a03","DOI":"10.1145\/2350190.2350193"}],"updated-by":[{"DOI":"10.1007\/s10115-018-1277-8","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T00:00:00Z","timestamp":1545091200000}}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-018-1274-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-1274-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-1274-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T08:07:36Z","timestamp":1571990856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-018-1274-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,28]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1274"],"URL":"https:\/\/doi.org\/10.1007\/s10115-018-1274-y","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,28]]},"assertion":[{"value":"14 November 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2018","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"In the original publication, part figures were incorrectly positioned in Figure\u00a02. The correct figure is given below.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}