{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T12:16:48Z","timestamp":1774527408002,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s10588-025-09414-4","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T01:01:39Z","timestamp":1768784499000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling virus spread in computer networks: an extended SEIR approach using artificial neural networks with Levenberg-marquardt algorithm"],"prefix":"10.1007","volume":"32","author":[{"given":"Saktiprasad","family":"Mohanty","sequence":"first","affiliation":[]},{"given":"Chandrakanta","family":"Parida","sequence":"additional","affiliation":[]},{"given":"Prasant Kumar","family":"Nayak","sequence":"additional","affiliation":[]},{"given":"Ganeswar","family":"Mahanta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,19]]},"reference":[{"key":"9414_CR14","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.matcom.2024.04.034","volume":"223","author":"S Cacace","year":"2024","unstructured":"Cacace S, Oliviero A (2024) Reliable optimal controls for SEIR models in epidemiology. Math Comput Simul 223:523\u2013542","journal-title":"Math Comput Simul"},{"key":"9414_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.meegid.2022.105319","volume":"103","author":"H Dai","year":"2022","unstructured":"Dai H, Zhou N, Chen M, Li G, Yu X, Su Y et al (2022) Assess transmissibility of different influenza subtypes: based on a SEIABR model. Infect Genet Evol 103:105319","journal-title":"Infect Genet Evol"},{"key":"9414_CR1","doi-asserted-by":"crossref","unstructured":"Draief M, Ganesh A, Massouli\u00e9 L (2006) Thresholds for virus spread on networks. In: Proceedings of the 1st International Conference on Performance Evaluation Methodologies and Tools, pp 51\u2013es","DOI":"10.1145\/1190095.1190160"},{"issue":"12","key":"9414_CR25","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1093\/oxfordjournals.aje.a009409","volume":"147","author":"MS Duh","year":"1998","unstructured":"Duh MS, Walker AM, Ayanian JZ (1998) Epidemiologic interpretation of artificial neural networks. Am J Epidemiol 147(12):1112\u20131122","journal-title":"Am J Epidemiol"},{"key":"9414_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.watres.2022.118451","volume":"218","author":"G Jiang","year":"2022","unstructured":"Jiang G, Wu J, Weidhaas J, Li X, Chen Y, Mueller J et al (2022) Artificial neural network-based estimation of COVID-19 case numbers and effective reproduction rate using wastewater-based epidemiology. Water Res 218:118451","journal-title":"Water Res"},{"key":"9414_CR2","doi-asserted-by":"crossref","unstructured":"Kephart JO (1994) A biologically inspired immune system for computers. In: Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, Vol 247, pp 130\u2013139","DOI":"10.7551\/mitpress\/1428.003.0017"},{"key":"9414_CR3","first-page":"247","volume":"19","author":"P Kumar Nayak","year":"2016","unstructured":"Kumar Nayak P, Mishra D, Ram S (2016) Dynamic e-epidemic model for active infectious nodes in computer network. J Stat Manag Syst 19:247\u2013257","journal-title":"J Stat Manag Syst"},{"key":"9414_CR4","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-1-4613-0065-6_17","volume-title":"Mathematical approaches for emerging and reemerging infectious diseases: Models, Methods, and theory","author":"MY Li","year":"2002","unstructured":"Li MY, Wang L (2002) Global stability in some SEIR epidemic models. In: Ma Z, Wu J (eds) Mathematical approaches for emerging and reemerging infectious diseases: Models, Methods, and theory. Springer, New York, pp 295\u2013311"},{"issue":"1","key":"9414_CR22","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1137\/S0036139999359860","volume":"62","author":"MY Li","year":"2001","unstructured":"Li MY, Smith HL, Wang L (2001) Global dynamics of an SEIR epidemic model with vertical transmission. SIAM J Appl Math 62(1):58\u201369","journal-title":"SIAM J Appl Math"},{"key":"9414_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.04.156","volume":"536","author":"Y Lu","year":"2019","unstructured":"Lu Y, Liu J (2019) The impact of information dissemination strategies to epidemic spreading on complex networks. Physica A 536:120920","journal-title":"Physica A"},{"key":"9414_CR5","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/j.apm.2009.06.011","volume":"34","author":"BK Mishra","year":"2010","unstructured":"Mishra BK, Jha N (2010) Seiqrs model for the transmission of malicious objects in computer network. Appl Math Model 34:710\u2013715","journal-title":"Appl Math Model"},{"key":"9414_CR12","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1016\/j.apm.2012.09.025","volume":"37","author":"BK Mishra","year":"2013","unstructured":"Mishra BK, Keshri N (2013) Mathematical model on the transmission of worms in wireless sensor network. Appl Math Model 37:4103\u20134111","journal-title":"Appl Math Model"},{"key":"9414_CR15","doi-asserted-by":"crossref","unstructured":"Mohanty S, Nayak PK, Mohanty S (2022a) Optimal control of malicious codes in a computer network by quarantine and isolation strategy. In: International Conference on Energy Systems, Drives and Automations. Springer Nature, Singapore, pp 333\u2013344","DOI":"10.1007\/978-981-97-0154-4_26"},{"key":"9414_CR17","doi-asserted-by":"crossref","unstructured":"Mohanty S, Nayak PK, Mohanty S (2022b) Quarantine approach to defend against malicious codes in a traditional antivirus computer network. In: International Conference on Energy Systems, Drives and Automations. Springer Nature, Singapore, pp 345\u2013353","DOI":"10.1007\/978-981-97-0154-4_27"},{"key":"9414_CR6","doi-asserted-by":"crossref","unstructured":"Mohanty S, Nayak PK, Paul AK, Basantia A (2023a) Mathematical modeling for understanding computer virus behavior in a network and its stability analysis. In: 2023 OITS International Conference on Information Technology (OCIT), pp 720\u2013725. IEEE","DOI":"10.1109\/OCIT59427.2023.10430627"},{"key":"9414_CR7","doi-asserted-by":"crossref","unstructured":"Mohanty S, Nayak PK, Paul AK, Basantia A (2023b) SIQTRS e-epidemic model: a comprehensive framework for analyzing and managing computer virus propagation in networks. In: 2023 OITS International Conference on Information Technology (OCIT), pp 726\u2013731. IEEE","DOI":"10.1109\/OCIT59427.2023.10430952"},{"key":"9414_CR8","doi-asserted-by":"publisher","first-page":"035101","DOI":"10.1103\/PhysRevE.66.035101","volume":"66","author":"ME Newman","year":"2002","unstructured":"Newman ME, Forrest S, Balthrop J (2002) Email networks and the spread of computer viruses. Phys Rev E 66:035101","journal-title":"Phys Rev E"},{"key":"9414_CR9","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/940526","volume":"2008","author":"JR Piqueira","year":"2008","unstructured":"Piqueira JR, Cesar FB (2008) Dynamical models for computer viruses propagation. Math Probl Eng 2008:940526","journal-title":"Math Probl Eng"},{"key":"9414_CR10","doi-asserted-by":"crossref","unstructured":"Ram S, Nayak PK, Mishra D (2020) Mathematical modelling, analysis involving behaviour of infectious nodes in a computer network. In: 2020 International Conference on Renewable Energy Integration into Smart Grids: A Multidisciplinary Approach to Technology Modelling and Simulation (ICREISG), pp 234\u2013238. IEEE","DOI":"10.1109\/ICREISG49226.2020.9174559"},{"key":"9414_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/axioms13020079","volume":"13","author":"C Rodr\u00edguez Lucatero","year":"2024","unstructured":"Rodr\u00edguez Lucatero C (2024) Analysis of epidemic models in complex networks and node isolation strategie proposal for reducing virus propagation. Axioms 13:79","journal-title":"Axioms"},{"issue":"1\u20132","key":"9414_CR18","first-page":"12","volume":"7","author":"P Shahrear","year":"2018","unstructured":"Shahrear P, Chakraborty AK, Islam MA, Habiba U (2018) Analysis of computer virus propagation based on compartmental model. Appl Comput Math 7(1\u20132):12\u201321","journal-title":"Appl Comput Math"},{"issue":"6","key":"9414_CR24","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1111\/j.1365-3016.2004.00592.x","volume":"18","author":"A Sherriff","year":"2004","unstructured":"Sherriff A, Ott J, ALSPAC Study Team (2004) Artificial neural networks as statistical tools in epidemiological studies: analysis of risk factors for early infant wheeze. Paediatr Perinat Epidemiol 18(6):456\u2013463","journal-title":"Paediatr Perinat Epidemiol"},{"key":"9414_CR16","doi-asserted-by":"publisher","first-page":"4958","DOI":"10.1109\/ACCESS.2024.3349660","volume":"12","author":"M Sulaiman","year":"2024","unstructured":"Sulaiman M, Waseem M, Ali AN, Laouini G, Alshammari FS (2024) Defense strategies for epidemic cyber security threats: modeling and analysis by using a machine learning approach. IEEE Access 12:4958\u20134984","journal-title":"IEEE Access"},{"issue":"1","key":"9414_CR20","doi-asserted-by":"publisher","first-page":"471","DOI":"10.3390\/e17010471","volume":"17","author":"L Xia","year":"2015","unstructured":"Xia L, Jiang G, Song Y, Song B (2015) Modeling and analyzing the interaction between network rumors and authoritative information. Entropy 17(1):471\u2013482","journal-title":"Entropy"},{"key":"9414_CR11","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1017\/S144618110000345X","volume":"48","author":"P Yan","year":"2006","unstructured":"Yan P, Liu S (2006) SEIR epidemic model with delay. ANZIAM J 48:119\u2013134","journal-title":"ANZIAM J"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-025-09414-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10588-025-09414-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-025-09414-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:22:05Z","timestamp":1774524125000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10588-025-09414-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,19]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["9414"],"URL":"https:\/\/doi.org\/10.1007\/s10588-025-09414-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-6278658\/v1","asserted-by":"object"}]},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,19]]},"assertion":[{"value":"21 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"1"}}