{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:17:28Z","timestamp":1767982648643,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10586-024-04855-z","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:29:35Z","timestamp":1737440975000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Worm propagation modeling considering green worm defense mechanism in complex networks"],"prefix":"10.1007","volume":"28","author":[{"given":"Elham","family":"Asadi","sequence":"first","affiliation":[]},{"given":"Soodeh","family":"Hosseini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"issue":"2","key":"4855_CR1","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1007\/s11277-022-09636-8","volume":"125","author":"CH Nwokoye","year":"2022","unstructured":"Nwokoye, C.H., Madhusudanan, V.: Epidemic models of malicious-code propagation and control in wireless sensor networks: an in-depth review. Wirel. Pers. Commun. 125(2), 1827\u20131856 (2022)","journal-title":"Wirel. Pers. Commun."},{"key":"4855_CR2","doi-asserted-by":"crossref","unstructured":"Xiehua, Y., Shaozi, L.: Analysis of a worm virus propagation model based on differential equation. In: 2021 11th International Conference on Information Technology in Medicine and Education (ITME), 2021. IEEE (2021)","DOI":"10.1109\/ITME53901.2021.00057"},{"issue":"6","key":"4855_CR3","first-page":"958","volume":"44","author":"H Zhou","year":"2007","unstructured":"Zhou, H., Zhao, H.: Modeling and analysis of active-benign worms and hybrid-benign worms. Jisuanji Yanjiu Yu Fazhan (Comput. Res. Dev.) 44(6), 958\u2013964 (2007)","journal-title":"Jisuanji Yanjiu Yu Fazhan (Comput. Res. Dev.)"},{"issue":"2","key":"4855_CR4","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/SURV.2013.100913.00195","volume":"16","author":"Y Wang","year":"2013","unstructured":"Wang, Y., et al.: Modeling the propagation of worms in networks: a survey. IEEE Commun. Surv. Tutor. 16(2), 942\u2013960 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4855_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780356","volume-title":"Complex Networks: Structure, Robustness and Function","author":"R Cohen","year":"2010","unstructured":"Cohen, R., Havlin, S.: Complex Networks: Structure, Robustness and Function. Cambridge University Press, Cambridge (2010)"},{"issue":"772","key":"4855_CR6","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1098\/rspa.1927.0118","volume":"115","author":"WO Kermack","year":"1927","unstructured":"Kermack, W.O., McKendrick, A.G.: A contribution to the mathematical theory of epidemics. Proc. R. Soc. Lond. A 115(772), 700\u2013721 (1927)","journal-title":"Proc. R. Soc. Lond. A"},{"key":"4855_CR7","unstructured":"Kim, J., Radhakrishnan, S., Dhall, S.K.: Measurement and analysis of worm propagation on Internet network topology. In: Proceedings of the 13th International Conference on Computer Communications and Networks (IEEE Cat. No. 04EX969), 2004. IEEE (2004)"},{"issue":"2","key":"4855_CR8","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1007\/s13198-021-01336-z","volume":"13","author":"RK Shakya","year":"2022","unstructured":"Shakya, R.K., et al.: SEIRS model with spatial correlation for analyzing the dynamic of the virus spreading in event-driven wireless sensor networks. Int. J. Syst. Assur. Eng. Manag. 13(2), 752\u2013760 (2022)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"4855_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, W., Lu, J.: SEIR-based botnet propagation model. In: 2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA), 2021. IEEE (2021)","DOI":"10.1109\/ICSGEA53208.2021.00106"},{"key":"4855_CR10","doi-asserted-by":"publisher","first-page":"183","DOI":"10.37394\/23204.2023.22.18","volume":"22","author":"YS Rao","year":"2023","unstructured":"Rao, Y.S., et al.: Mathematical model on distributed denial of service attack in the computer network. WSEAS Trans. Commun. 22, 183\u2013191 (2023)","journal-title":"WSEAS Trans. Commun."},{"key":"4855_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.123240","volume":"540","author":"YS Rao","year":"2020","unstructured":"Rao, Y.S., et al.: Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a differential e-epidemic model. Physica A 540, 123240 (2020)","journal-title":"Physica A"},{"issue":"1","key":"4855_CR12","doi-asserted-by":"publisher","first-page":"58","DOI":"10.4018\/IJBDCN.2017010105","volume":"13","author":"YS Rao","year":"2017","unstructured":"Rao, Y.S., et al.: Mathematical model for cyber attack in computer network. Int. J. Bus. Data Commun. Netw. 13(1), 58\u201365 (2017)","journal-title":"Int. J. Bus. Data Commun. Netw."},{"key":"4855_CR13","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.physa.2017.03.023","volume":"479","author":"JH Guill\u00e9n","year":"2017","unstructured":"Guill\u00e9n, J.H., Del Rey, A.M., Encinas, L.H.: Study of the stability of a SEIRS model for computer worm propagation. Physica A 479, 411\u2013421 (2017)","journal-title":"Physica A"},{"issue":"1","key":"4855_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.4018\/IJISP.2019010102","volume":"13","author":"YS Rao","year":"2019","unstructured":"Rao, Y.S., et al.: Behavioral modeling of malicious objects in a highly infected network under quarantine defense. Int. J. Inf. Secur. Priv. 13(1), 17\u201329 (2019)","journal-title":"Int. J. Inf. Secur. Priv."},{"key":"4855_CR15","doi-asserted-by":"publisher","first-page":"2056","DOI":"10.1016\/j.matpr.2021.11.263","volume":"57","author":"R Kishore","year":"2022","unstructured":"Kishore, R., et al.: Epidemic model on rumor propagation in e-commerce. Mater. Today Proc. 57, 2056\u20132060 (2022)","journal-title":"Mater. Today Proc."},{"key":"4855_CR16","doi-asserted-by":"publisher","first-page":"2535","DOI":"10.1007\/s11277-017-4988-3","volume":"98","author":"A Singh","year":"2018","unstructured":"Singh, A., et al.: Modeling and analysis of worm propagation in wireless sensor networks. Wirel. Pers. Commun. 98, 2535\u20132551 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"4855_CR17","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.cnsns.2016.07.012","volume":"43","author":"X Xiao","year":"2017","unstructured":"Xiao, X., et al.: Design and analysis of SEIQR worm propagation model in mobile Internet. Commun. Nonlinear Sci. Numer. Simul. 43, 341\u2013350 (2017)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"4855_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2022.127207","volume":"597","author":"Z Yu","year":"2022","unstructured":"Yu, Z., et al.: SEI2RS malware propagation model considering two infection rates in cyber\u2013physical systems. Physica A 597, 127207 (2022)","journal-title":"Physica A"},{"issue":"3","key":"4855_CR19","doi-asserted-by":"publisher","first-page":"3846","DOI":"10.1109\/JSYST.2023.3269158","volume":"17","author":"X Zhu","year":"2023","unstructured":"Zhu, X., Huang, J., Qi, C.: Modeling and analysis of malware propagation for IoT heterogeneous devices. IEEE Syst. J. 17(3), 3846\u20133857 (2023)","journal-title":"IEEE Syst. J."},{"key":"4855_CR20","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1007\/s11071-019-05371-1","volume":"99","author":"W Lv","year":"2020","unstructured":"Lv, W., Ke, Q., Li, K.: Dynamical analysis and control strategies of a SIVS epidemic model with imperfect vaccination on scale-free networks. Nonlinear Dyn. 99, 1507\u20131523 (2020)","journal-title":"Nonlinear Dyn."},{"key":"4855_CR21","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Li, D., Zhang, F.: Modeling the SIS immunization epidemic on finite size of BA network. In: 2013 International Conference on Communications, Circuits, and Systems (ICCCAS), 2013. IEEE (2013)","DOI":"10.1109\/ICCCAS.2013.6765294"},{"key":"4855_CR22","unstructured":"Wu, D., et al.: Modeling and analysis of worm and killer-worm propagation using the divide-and-conquer strategy. In: Distributed and Parallel Computing: 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2\u20133, 2005. Proceedings, vol. 6. Springer (2005)"},{"issue":"1","key":"4855_CR23","volume":"2014","author":"M Wang","year":"2014","unstructured":"Wang, M., et al.: Spread and control of mobile benign worm based on two-stage repairing mechanism. J. Appl. Math. 2014(1), 746803 (2014)","journal-title":"J. Appl. Math."},{"issue":"1","key":"4855_CR24","first-page":"3578390","volume":"2020","author":"J Lai","year":"2020","unstructured":"Lai, J., et al.: Impulsive switching epidemic model with benign worm defense and quarantine strategy. Complexity 2020(1), 3578390 (2020)","journal-title":"Complexity"},{"issue":"5","key":"4855_CR25","doi-asserted-by":"publisher","first-page":"133","DOI":"10.3390\/technologies11050133","volume":"11","author":"M Severt","year":"2023","unstructured":"Severt, M., Casado-Vara, R., Mart\u00edn del Rey, A.: A comparison of Monte Carlo-based and PINN parameter estimation methods for malware identification in IoT networks. Technologies 11(5), 133 (2023)","journal-title":"Technologies"},{"issue":"1","key":"4855_CR26","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.jde.2018.07.054","volume":"266","author":"X Zhang","year":"2019","unstructured":"Zhang, X., et al.: Complex dynamics of epidemic models on adaptive networks. J. Differ. Equ. 266(1), 803\u2013832 (2019)","journal-title":"J. Differ. Equ."},{"key":"4855_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.110746","volume":"145","author":"AA Thirthar","year":"2021","unstructured":"Thirthar, A.A., et al.: Modeling and analysis of a SI1I2R epidemic model with nonlinear incidence and general recovery functions of I1. Chaos Solitons Fractals 145, 110746 (2021)","journal-title":"Chaos Solitons Fractals"},{"key":"4855_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103063","volume":"125","author":"R Wang","year":"2023","unstructured":"Wang, R., Xue, Y.: Stability analysis and optimal control of worm propagation model with saturated incidence rate. Comput. Secur. 125, 103063 (2023)","journal-title":"Comput. Secur."},{"key":"4855_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103608","volume":"214","author":"G Wu","year":"2023","unstructured":"Wu, G., et al.: STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things. J. Netw. Comput. Appl. 214, 103608 (2023)","journal-title":"J. Netw. Comput. Appl."},{"key":"4855_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103504","volume":"160","author":"G Wu","year":"2024","unstructured":"Wu, G., et al.: SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network. Ad Hoc Netw. 160, 103504 (2024)","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"4855_CR31","first-page":"288","volume":"2","author":"P Van den Driessche","year":"2017","unstructured":"Van den Driessche, P.: Reproduction numbers of infectious disease models. Infect. Dis. Model. 2(3), 288\u2013303 (2017)","journal-title":"Infect. Dis. Model."},{"key":"4855_CR32","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s11576-006-0058-2","volume":"48","author":"O Hein","year":"2006","unstructured":"Hein, O., Schwind, M., K\u00f6nig, W.: Scale-free networks: the impact of fat tailed degree distribution on diffusion and communication processes. Wirtschaftsinformatik 48, 267\u2013275 (2006)","journal-title":"Wirtschaftsinformatik"},{"key":"4855_CR33","unstructured":"https:\/\/networkrepository.com"},{"issue":"1","key":"4855_CR34","doi-asserted-by":"publisher","first-page":"2849196","DOI":"10.1155\/2019\/2849196","volume":"2019","author":"L Zheng","year":"2019","unstructured":"Zheng, L., Tang, L.: A node-based SIRS epidemic model with infective media on complex networks. Complexity 2019(1), 2849196 (2019)","journal-title":"Complexity"},{"issue":"5","key":"4855_CR35","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1016\/j.camwa.2020.04.015","volume":"80","author":"E Gonz\u00e1lez","year":"2020","unstructured":"Gonz\u00e1lez, E., Villena, M.J.: On the spatial dynamics of vaccination: a spatial SIRS-V model. Comput. Math. Appl. 80(5), 733\u2013743 (2020)","journal-title":"Comput. Math. Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04855-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04855-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04855-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:51:57Z","timestamp":1747777917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04855-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,21]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["4855"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04855-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,21]]},"assertion":[{"value":"18 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"148"}}