{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T17:00:45Z","timestamp":1772816445169,"version":"3.50.1"},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T00:00:00Z","timestamp":1545955200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s11432-018-9675-1","type":"journal-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T02:24:53Z","timestamp":1546482293000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On computer virus spreading using node-based model with time-delayed intervention strategies"],"prefix":"10.1007","volume":"62","author":[{"given":"Yi","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jiangping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,28]]},"reference":[{"key":"9675_CR1","first-page":"012107","volume":"58","author":"A S Li","year":"2015","unstructured":"Li A S, Li X C, Pan Y C, et al. Strategies for network security. Sci China Inf Sci, 2015, 58: 012107","journal-title":"Sci China Inf Sci"},{"key":"9675_CR2","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1126\/science.1095845","volume":"304","author":"J Balthrop","year":"2004","unstructured":"Balthrop J, Forrest S, Newman M E J, et al. Technological networks and the spread of computer viruses. Science, 2004, 304: 527\u2013529","journal-title":"Science"},{"key":"9675_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNET.2008.925623","volume":"17","author":"P V Mieghem","year":"2009","unstructured":"Mieghem P V, Omic J, Kooij R. Virus spread in networks. IEEE\/ACM Trans Netw, 2009, 17: 1\u201314","journal-title":"IEEE\/ACM Trans Netw"},{"key":"9675_CR4","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s12190-017-1109-0","volume":"57","author":"Z Z Zhang","year":"2018","unstructured":"Zhang Z Z, Wang Y G. SVEIRS epidemic model with delays and partial immunization for internet worms. J Appl Math Comput, 2018, 57: 333\u2013358","journal-title":"J Appl Math Comput"},{"key":"9675_CR5","first-page":"1","volume":"2017","author":"Z Z Zhang","year":"2017","unstructured":"Zhang Z Z, Wang Y G, Bi D J, et al. Stability and hopf bifurcation analysis for a computer virus propagation model with two delays and vaccination. Discrete Dyn Nat Soc, 2017, 2017: 1\u201317","journal-title":"Discrete Dyn Nat Soc"},{"key":"9675_CR6","volume-title":"The Art of Computer Virus Research and Defense","author":"P Szor","year":"2005","unstructured":"Szor P. The Art of Computer Virus Research and Defense. Boston: Addison-Wesley Professional, 2005"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9675-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-018-9675-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9675-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,27]],"date-time":"2019-12-27T19:21:49Z","timestamp":1577474509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-018-9675-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,28]]},"references-count":6,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["9675"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9675-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,28]]},"assertion":[{"value":"20 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"59201"}}