{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T19:25:20Z","timestamp":1771269920656,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T00:00:00Z","timestamp":1508889600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11277-017-4988-3","type":"journal-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T05:28:15Z","timestamp":1508909295000},"page":"2535-2551","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":68,"title":["Modeling and Analysis of Worm Propagation in Wireless Sensor Networks"],"prefix":"10.1007","volume":"98","author":[{"given":"Akansha","family":"Singh","sequence":"first","affiliation":[]},{"given":"Amit K.","family":"Awasthi","sequence":"additional","affiliation":[]},{"given":"Karan","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Pramod K.","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,25]]},"reference":[{"key":"4988_CR1","doi-asserted-by":"crossref","unstructured":"Hui, J. W., & Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on embedded networked sensor systems (pp. 8194). ACM.","DOI":"10.1145\/1031495.1031506"},{"key":"4988_CR2","doi-asserted-by":"crossref","unstructured":"Boyd, S., Ghosh, A., Prabhakar, B., & Shah, D. (2005). Gossip algorithms: Design, analysis and applications. In Proceedings IEEE 24th annual joint conference of the IEEE computer and communications societies (Vol. 3, pp. 16531664). IEEE.","DOI":"10.1109\/INFCOM.2005.1498447"},{"key":"4988_CR3","doi-asserted-by":"crossref","unstructured":"Kermack, W. O., & McKendrick, A. G. (1927). A contribution to the mathematical theory of epidemics. In Proceedings of the royal society of London A: mathematical, physical and engineering sciences (Vol. 115, pp. 700721). The Royal Society.","DOI":"10.1098\/rspa.1927.0118"},{"issue":"1","key":"4988_CR4","first-page":"89110","volume":"50","author":"JAP Heesterbeek","year":"1996","unstructured":"Heesterbeek, J. A. P., & Dietz, K. (1996). The concept of $$R_0$$ R 0 in epidemic theory. Statistica Neerlandica, 50(1), 89110.","journal-title":"Statistica Neerlandica"},{"key":"4988_CR5","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1093\/oso\/9780198545996.001.0001","volume-title":"Infectious diseases of humans: Dynamics and control","author":"R Anderson","year":"1991","unstructured":"Anderson, R., & May, R. (1991). Infectious diseases of humans: Dynamics and control (p. 757). Oxford: Oxford university press."},{"key":"4988_CR6","unstructured":"Staniford, S., Paxson, V., & Weaver, N., et al. (2002). How to own the internet in your spare time. In USENIX security symposium (pp. 149167)."},{"issue":"1","key":"4988_CR7","first-page":"2948","volume":"180","author":"P Driessche Van den","year":"2002","unstructured":"Van den Driessche, P., & Watmough, J. (2002). Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. Mathematical Biosciences, 180(1), 2948.","journal-title":"Mathematical Biosciences"},{"key":"4988_CR8","unstructured":"Khelil, A., Becker, C., Tian, J., & Rothermel, K. (2002). Directed-graph epidemiological models of computer viruses. In Proceedings of the 5th ACM international workshop on modeling analysis and simulation of wireless and mobile systems (pp. 5460)."},{"key":"4988_CR9","doi-asserted-by":"crossref","unstructured":"Khayam, S. A., & Radha, H. (2005). A topologically-aware worm propagation model for wireless sensor networks. In 25th IEEE international conference on distributed computing systems workshops (pp. 210216). IEEE.","DOI":"10.1109\/ICDCSW.2005.26"},{"issue":"13","key":"4988_CR10","first-page":"24502457","volume":"29","author":"M Akdere","year":"2006","unstructured":"Akdere, M., Bilgin, C. C., Gerdaneri, O., Korpeoglu, I., Ulusoy, O., & Cetintemel, U. (2006). A comparison of epidemic algorithms in wireless sensor networks. Computer Communications, 29(13), 24502457.","journal-title":"Computer Communications"},{"key":"4988_CR11","doi-asserted-by":"crossref","unstructured":"Zheng, H., Li, D., & Gao, Z. (2006). An epidemic model of mobile phone virus. In 2006 first international symposium on pervasive computing and applications (pp. 15). IEEE.","DOI":"10.1109\/SPCA.2006.297477"},{"key":"4988_CR12","doi-asserted-by":"crossref","unstructured":"De, P., Liu, Y., & Das, S. K. (2006). Modeling node compromise spread in wireless sensor networks using epidemic theory. In Proceedings of the 2006 international symposium on world of wireless, mobile and multimedia networks (pp. 237243). IEEE Computer Society.","DOI":"10.1109\/WOWMOM.2006.74"},{"key":"4988_CR13","doi-asserted-by":"crossref","unstructured":"Tang, S., & Mark, B. L. (2009). Analysis of virus spread in wireless sensor networks: An epidemic model. In 7th international workshop on design of reliable communication networks, 2009. DRCN 2009 (pp. 8691). IEEE.","DOI":"10.1109\/DRCN.2009.5340022"},{"issue":"4","key":"4988_CR14","doi-asserted-by":"crossref","first-page":"319326","DOI":"10.1007\/s10776-011-0147-z","volume":"18","author":"S Tang","year":"2011","unstructured":"Tang, S. (2011). A modified SI epidemic model for combating virus spread in wireless sensor networks. International Journal of Wireless Information Networks, 18(4), 319326.","journal-title":"International Journal of Wireless Information Networks"},{"issue":"1","key":"4988_CR15","first-page":"812","volume":"18","author":"X Wang","year":"2009","unstructured":"Wang, X., & Li, Y. (2009). An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks. Chinese Journal of Electronics, 18(1), 812.","journal-title":"Chinese Journal of Electronics"},{"issue":"6","key":"4988_CR16","doi-asserted-by":"crossref","first-page":"41034111","DOI":"10.1016\/j.apm.2012.09.025","volume":"37","author":"BK Mishra","year":"2013","unstructured":"Mishra, B. K., & Keshri, N. (2013). Mathematical model on the transmission of worms in wireless sensor network. Applied Mathematical Modelling, 37(6), 41034111.","journal-title":"Applied Mathematical Modelling"},{"key":"4988_CR17","doi-asserted-by":"publisher","unstructured":"Feng, L., Song, L., Zhao, Q., & Wang, H. (2015). Modeling and stability analysis of worm propagation in wireless sensor network. Mathematical Problems in Engineering. doi: 10.1155\/2015\/129598 .","DOI":"10.1155\/2015\/129598"},{"issue":"1","key":"4988_CR18","first-page":"747768","volume":"22","author":"L Zhu","year":"2015","unstructured":"Zhu, L., Zhao, H., & Wang, X. (2015). Bifurcation analysis of a delay reactiondiffusion malware propagation model with feedback control. Communications in Nonlinear Science and Numerical Simulation, 22(1), 747768.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4988-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4988-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4988-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T00:39:17Z","timestamp":1719535157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4988-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,25]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["4988"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4988-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,25]]}}}