{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T19:54:21Z","timestamp":1775678061648,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:00:00Z","timestamp":1596758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:00:00Z","timestamp":1596758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11277-020-07668-6","type":"journal-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T05:02:54Z","timestamp":1596776574000},"page":"2047-2061","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Dynamics of Epidemic Computer Virus Spreading Model with Delays"],"prefix":"10.1007","volume":"115","author":[{"given":"V.","family":"MadhuSudanan","sequence":"first","affiliation":[]},{"given":"R.","family":"Geetha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,7]]},"reference":[{"key":"7668_CR1","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1016\/j.mex.2018.10.005","volume":"5","author":"ChukwuNonso Nwokoye","year":"2018","unstructured":"Nwokoye, Chukwu Nonso, & Umeh, Ikechukwu. (2018). Analytic-agent cyber dynamical systems analysis and design method for modeling spatio-temporal factors of malware\u00a0propagation\u00a0in\u00a0wireless\u00a0sensor\u00a0networks. MethodsX, 5, 1373\u20131398. https:\/\/doi.org\/10.1016\/j.mex.2018.10.005.","journal-title":"MethodsX"},{"key":"7668_CR2","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.physa.2016.11.143","volume":"470","author":"T Zhang","year":"2017","unstructured":"Zhang, T., Yang, L. X., Yang, X., Wu, Y., & Tang, Y. Y. (2017). Dynamic malware containment under an epidemic model with alert. Physica A: Statistical Mechanics and its Applications, 470, 249\u2013260.","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"7668_CR3","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/842614","author":"Mei Peng","year":"2013","unstructured":"Peng, Mei, He, Xing, Huang, Junjian, & Dong, Tao. (2013). Modeling computer virus and its dynamics. Mathematical Problems in Engineering. https:\/\/doi.org\/10.1155\/2013\/842614.","journal-title":"Mathematical Problems in Engineering"},{"key":"7668_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/8609082","volume":"83","author":"Qingyi Zhu","year":"2017","unstructured":"Zhu, Qingyi, & Cen, Chen. (2017). A novel computer virus propagation model under security classification. Discrete Dynamics in Nature and Society, 83, 1\u201311. https:\/\/doi.org\/10.1155\/2017\/8609082.","journal-title":"Discrete Dynamics in Nature and Society"},{"issue":"9","key":"7668_CR5","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1080\/00207160.2017.1336550","volume":"95","author":"RK Upadhyay","year":"2018","unstructured":"Upadhyay, R. K., & Kumari, S. (2018). Bifurcation analysis of an e-epidemic model in wireless sensor network. International Journal of Computer Mathematics, 95(9), 1775\u20131805. https:\/\/doi.org\/10.1080\/00207160.2017.1336550.","journal-title":"International Journal of Computer Mathematics"},{"issue":"5","key":"7668_CR6","doi-asserted-by":"publisher","first-page":"396","DOI":"10.3390\/math7050396","volume":"7","author":"Z Zhang","year":"2019","unstructured":"Zhang, Z., Kundu, S., & Wei, R. (2019). A delayed epidemic model for propagation of malicious codes in wireless sensor network. Mathematics, 7(5), 396. https:\/\/doi.org\/10.3390\/math7050396.","journal-title":"Mathematics"},{"key":"7668_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1186\/s40249-020-00640-3","volume":"9","author":"C Tian-Mu","year":"2020","unstructured":"Tian-Mu, C., Jia, R., Qiu-Peng, W., Ze-Yu, Z., Jing-An, C., & Ling, Y. (2020). A mathematical model for simulating the phase-based transmissibility of a novel coronavirus. Infectious Diseases of Poverty, 9, 24. https:\/\/doi.org\/10.1186\/s40249-020-00640-3.","journal-title":"Infectious Diseases of Poverty"},{"key":"7668_CR8","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/319174","author":"Z Zizhen","year":"2013","unstructured":"Zizhen, Z., & Huizhong, Y. (2013). Stability and Hopf bifurcation in a delayed SEIRS worm model in computer network. Mathematical Problems in Engineering. https:\/\/doi.org\/10.1155\/2013\/319174.","journal-title":"Mathematical Problems in Engineering"},{"key":"7668_CR9","doi-asserted-by":"publisher","DOI":"10.1186\/s13662-017-1243-x","author":"Tao Zhao","year":"2017","unstructured":"Zhao, Tao, & Bi, Dianjie. (2017). Hopf bifurcation of a computer virus spreading model in the network with limited anti-virus ability. Advances in Difference Equations. https:\/\/doi.org\/10.1186\/s13662-017-1243-x.","journal-title":"Advances in Difference Equations"},{"issue":"2","key":"7668_CR10","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/0167-4048(88)90327-6","volume":"7","author":"WH Murray","year":"1998","unstructured":"Murray, W. H. (1998). The application of epidemiology to computer viruses. Computers & Security, 7(2), 130\u2013150. https:\/\/doi.org\/10.1016\/0167-4048(88)90327-6.","journal-title":"Computers & Security"},{"issue":"3\u20134","key":"7668_CR11","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/S0375-9601(02)00152-4","volume":"297","author":"L Billings","year":"2002","unstructured":"Billings, L., Spears, W. M., & Schwartz, I. B. (2002). A unified prediction of computer virus spread in connected networks. Physics Letters A, 297(3\u20134), 261\u2013266. https:\/\/doi.org\/10.1016\/S0375-9601(02)00152-4.","journal-title":"Physics Letters A"},{"issue":"1","key":"7668_CR12","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.nonrwa.2011.07.048","volume":"13","author":"J Ren","year":"2012","unstructured":"Ren, J., Yang, X., Zhu, Q., Yang, L. X., & Zhang, C. (2012). A novel computer virus model and its dynamics. Nonlinear Analysis: Real World Applications, 13(1), 376\u2013384. https:\/\/doi.org\/10.1016\/j.nonrwa.2011.07.048.","journal-title":"Nonlinear Analysis: Real World Applications"},{"issue":"12","key":"7668_CR13","doi-asserted-by":"publisher","first-page":"5117","DOI":"10.1016\/j.cnsns.2012.05.030","volume":"17","author":"Q Zhu","year":"2012","unstructured":"Zhu, Q., Yang, X., & Ren, J. (2012). Modeling and analysis of the spread of computer virus. Communications in Nonlinear Science and Numerical Simulation, 17(12), 5117\u20135124. https:\/\/doi.org\/10.1016\/j.cnsns.2012.05.030.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"10","key":"7668_CR14","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.physa.2014.05.034","volume":"4","author":"C Lijuan","year":"2014","unstructured":"Lijuan, C., & Jitao, S. (2014). Global stability and optimal control of an SIRS epidemic model on hetergeneous networks. Physica A, 4(10), 196\u2013204. https:\/\/doi.org\/10.1016\/j.physa.2014.05.034.","journal-title":"Physica A"},{"issue":"1","key":"7668_CR15","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.chaos.2011.10.003","volume":"45","author":"J Ren","year":"2012","unstructured":"Ren, J., Yang, X., Yang, L.-X., Xu, Y., & Yang, F. (2012). A delayed computer virus propagation model and its dynamics. Chaos, Solitons & Fractals, 45(1), 74\u201379. https:\/\/doi.org\/10.1016\/j.chaos.2011.10.003.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"7\u20138","key":"7668_CR16","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.mcm.2011.12.010","volume":"56","author":"L Feng","year":"2012","unstructured":"Feng, L., Liao, X., Li, H., & Han, Q. (2012). Hopf bifurcation analysis of a delayed viral infection model in computer networks. Mathematical and Computer Modelling, 56(7\u20138), 167\u2013179. https:\/\/doi.org\/10.1016\/j.mcm.2011.12.010.","journal-title":"Mathematical and Computer Modelling"},{"issue":"23","key":"7668_CR17","doi-asserted-by":"publisher","first-page":"11613","DOI":"10.1016\/j.amc.2012.04.092","volume":"218","author":"Q Zhu","year":"2012","unstructured":"Zhu, Q., Yang, X., Yang, L.-X., & Zhang, C. (2012). Optimal control of computer virus under a delayed model. Applied Mathematics and Computation, 218(23), 11613\u201311619. https:\/\/doi.org\/10.1016\/j.amc.2012.04.092.","journal-title":"Applied Mathematics and Computation"},{"key":"7668_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/106950","volume-title":"Propagation of computer virus under human intervention: A dynamical model","author":"C Gan","year":"2012","unstructured":"Gan, C., Yang, X., Liu, W., Zhu, Q., & Zhang, X. (2012). Propagation of computer virus under human intervention: A dynamical model. Discret: Discrete Dynamics in Nature and Society. https:\/\/doi.org\/10.1155\/2012\/106950."},{"issue":"1","key":"7668_CR19","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.amc.2013.07.055","volume":"222","author":"C Gan","year":"2013","unstructured":"Gan, C., Yang, X., Liu, W., Zhu, Q., & Zhang, X. (2013). An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate. Applied Math and Computation, 222(1), 265\u2013274. https:\/\/doi.org\/10.1016\/j.amc.2013.07.055.","journal-title":"Applied Math and Computation"},{"issue":"1","key":"7668_CR20","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cnsns.2013.06.018","volume":"19","author":"C Gan","year":"2014","unstructured":"Gan, C., Yang, X., Liu, W., & Zhu, Q. (2014). A propagation model of computer viruswith nonlinear vaccination probability. Communications in Nonlinear Science and Numerical Simulation, 19(1), 92\u2013100. https:\/\/doi.org\/10.1016\/j.cnsns.2013.06.018.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"7668_CR21","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/735327","author":"C Gan","year":"2014","unstructured":"Gan, C., Yang, X., & Zhu, Q. (2014). Global stability of a computer virus propagation model with two kinds of generic nonlinear probabilities. Abstract and Applied Analysis. https:\/\/doi.org\/10.1155\/2014\/735327.","journal-title":"Abstract and Applied Analysis"},{"key":"7668_CR22","doi-asserted-by":"publisher","DOI":"10.1186\/s13662-018-1698-4","author":"T Zhao","year":"2018","unstructured":"Zhao, T., Zhang, Z., & Upadhyay, R. K. (2018). Delay-induced Hopf bifurcation of an SVEIR computer virus model with nonlinear incidence rate. Advances in Difference Equations. https:\/\/doi.org\/10.1186\/s13662-018-1698-4.","journal-title":"Advances in Difference Equations"},{"issue":"1","key":"7668_CR23","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s12190-016-1020-0","volume":"54","author":"RK Upadhyay","year":"2017","unstructured":"Upadhyay, R. K., Kumari, S., & Misra, A. K. (2017). Modeling the virus dynamics in computer network with SVEIR model and nonlinear incident rate. Journal of Applied Mathematics and Computing, 54(1), 485\u2013509. https:\/\/doi.org\/10.1007\/s12190-016-1020-0.","journal-title":"Journal of Applied Mathematics and Computing"},{"issue":"3","key":"7668_CR24","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/j.apm.2009.06.011","volume":"34","author":"BK Mishra","year":"2010","unstructured":"Mishra, B. K., & Saini, D. K. (2010). SEIQRS model for the transmission of malicious objects in computer network. Applied Mathematical Modelling, 34(3), 710\u2013715. https:\/\/doi.org\/10.1016\/j.apm.2009.06.011.","journal-title":"Applied Mathematical Modelling"},{"issue":"12","key":"7668_CR25","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5815\/ijitcs.2017.12.04","volume":"9","author":"CH Nwokoye","year":"2017","unstructured":"Nwokoye, C. H., & Umeh, I. I. (2017). The SEIQR\u2013V model: On a more accurate analytical characterization of malicious threat defense. International Journal of Information Technology and Computer Science, 9(12), 28\u201337. https:\/\/doi.org\/10.5815\/ijitcs.2017.12.04.","journal-title":"International Journal of Information Technology and Computer Science"},{"key":"7668_CR26","doi-asserted-by":"publisher","DOI":"10.1186\/s13662-016-0793-7","author":"W Chunlei","year":"2016","unstructured":"Chunlei, W., & Shouxia, C. (2016). Hopf bifurcation of an SEIRS epidemic model with delays and vertical transmission in the network. Advances in Difference Equations. https:\/\/doi.org\/10.1186\/s13662-016-0793-7.","journal-title":"Advances in Difference Equations"},{"key":"7668_CR27","doi-asserted-by":"publisher","DOI":"10.1142\/S021987621850055X","author":"A Kumar Nilam","year":"2018","unstructured":"Kumar Nilam, A. (2018). Stability of a time delayed SIR epidemic model along with nonlinear incidence rate and holling type-II treatment rate. International Journal of Computational Methods. https:\/\/doi.org\/10.1142\/S021987621850055X.","journal-title":"International Journal of Computational Methods"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07668-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07668-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07668-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T23:19:07Z","timestamp":1628291947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07668-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,7]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7668"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07668-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,7]]},"assertion":[{"value":"7 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}