{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:21:17Z","timestamp":1649064077178},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T00:00:00Z","timestamp":1482105600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s12083-016-0538-0","type":"journal-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T06:38:04Z","timestamp":1482129484000},"page":"397-408","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The impact of hesitation on passive worm spreading in P2P networks"],"prefix":"10.1007","volume":"11","author":[{"given":"Mohamed Amine","family":"Rguibi","sequence":"first","affiliation":[]},{"given":"Najem","family":"Moussa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,19]]},"reference":[{"key":"538_CR1","doi-asserted-by":"crossref","unstructured":"Wu J (ed) (2005) Handbook On Theoretical And Algorithmic Aspects Of Sensor, Ad Hoc Wireless, and Peer-toPeer Networks. Auerbach Publications, MA, USA","DOI":"10.1201\/9780203323687"},{"key":"538_CR2","unstructured":"Delgado R (2004) Law professors examine ethical controversies of peer-to-peer file sharing. Stanford Report, p 17"},{"key":"538_CR3","unstructured":"Ernesto (2015) BitTorrent still dominates internets upstream traffic. Sandvine Report, p 8"},{"key":"538_CR4","unstructured":"Bowden M (2011) Worm: The first digital world war. Grove\/Atlantic, Inc."},{"key":"538_CR5","doi-asserted-by":"crossref","unstructured":"Yu W, Zhang N, Zhao W (2006) SelfAdaptive Worms and Countermeasures. In: 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems","DOI":"10.1007\/978-3-540-49823-0_38"},{"key":"538_CR6","doi-asserted-by":"crossref","unstructured":"Chen ZS, Gao LX, Kwiat K (2003) Modeling the spread of active worms. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), San Francisco, CA","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"538_CR7","unstructured":"Staniford S, Paxson V, Weaver N (2002) How to own the internet in your spare time. In: Proceedings of the 11-th USENIX Security Symposium, San Francisco, CA"},{"key":"538_CR8","doi-asserted-by":"crossref","unstructured":"Thommes RW, Coates MJ (2005) Modeling virus propagation in peer-to-peer networks. In: Proceedings Fifth International Conference on Information, Communications and Signal Processing, p 981","DOI":"10.1109\/ICICS.2005.1689197"},{"issue":"7","key":"538_CR9","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1016\/j.cose.2009.06.007","volume":"28","author":"W Fangwei","year":"2009","unstructured":"Fangwei W, Zhang Y, Ma J (2009) Defending passive worms in unstructured P2P networks based on healthy file dissemination. Comput Secur 28(7):628\u2013636","journal-title":"Comput Secur"},{"key":"538_CR10","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s12083-013-0242-2","volume":"8","author":"M Elnaz","year":"2015","unstructured":"Elnaz M, Azgomi M (2015) Modeling the propagation of topology-aware P2P worms considering temporal parameters. Peer-to-Peer Netw Appl 8:171","journal-title":"Peer-to-Peer Netw Appl"},{"key":"538_CR11","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.future.2013.06.025","volume":"36","author":"C Ting","year":"2014","unstructured":"Ting C, Zhang X, Wu Y (2014) FPM: four-factors propagation model for passive P2P worms. Fut Gener Comput Syst 36:133","journal-title":"Fut Gener Comput Syst"},{"key":"538_CR12","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.simpat.2014.11.004","volume":"51","author":"F Chao-sheng","year":"2015","unstructured":"Chao-sheng F, Yang J, Qin Z, Yuan D, Cheng H (2015) Modeling and analysis of passive worm propagation in the P2P file-sharing network. Simul Modell Pract Theory 51:87","journal-title":"Simul Modell Pract Theory"},{"key":"538_CR13","doi-asserted-by":"crossref","first-page":"2173","DOI":"10.1016\/j.apm.2013.10.046","volume":"38","author":"BK Mishra","year":"2014","unstructured":"Mishra BK, Pandey SK (2014) Dynamic model of worm propagation in computer network. Appl Math Modell 38:2173","journal-title":"Appl Math Modell"},{"key":"538_CR14","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1007\/s12083-014-0306-y","volume":"8","author":"A Jafarabadi","year":"2015","unstructured":"Jafarabadi A, Azgomi MA (2015) A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology. Peer-to-Peer Netw Appl 8:1008","journal-title":"Peer-to-Peer Netw Appl"},{"key":"538_CR15","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1098\/rstb.1997.0026","volume":"352","author":"CA Gilligan","year":"1997","unstructured":"Gilligan CA, Gubbins S, Simons SA (1997) Analysis and fitting of an SIR model with host response to infection load for a plant disease. Philos Trans R Soc Lond B Biol Sci 352:353","journal-title":"Philos Trans R Soc Lond B Biol Sci"},{"key":"538_CR16","doi-asserted-by":"crossref","first-page":"4302","DOI":"10.1128\/JVI.02284-09","volume":"84","author":"NK Vaidya","year":"2010","unstructured":"Vaidya NK et al (2010) Viral dynamics during primary simian immunodeficiency virus infection: effect of time-dependent virus infectivity. J Virol 84:4302","journal-title":"J Virol"},{"key":"538_CR17","first-page":"P05012","volume":"2012","author":"N Crokidakis","year":"2012","unstructured":"Crokidakis N, De Menezes MA (2012) Critical behavior of the SIS epidemic model with time-dependent infection rate. J Stat Mech: Theory Exper 2012:P05012","journal-title":"J Stat Mech: Theory Exper"},{"key":"538_CR18","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.simpat.2014.11.004","volume":"51","author":"C-s Feng","year":"2015","unstructured":"Feng C-s et al (2015) Modeling and analysis of passive worm propagation in the P2P file-sharing network. Simul Modell Pract Theory 51:87\u201399","journal-title":"Simul Modell Pract Theory"},{"key":"538_CR19","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019 networks. Nature 393:440","journal-title":"Nature"},{"key":"538_CR20","doi-asserted-by":"crossref","unstructured":"Zhu Y, Zhang F, Guo W (2014) An immunization strategy based on propagation mechanism. Discr Dyn Nat Soc 2014","DOI":"10.1155\/2014\/971497"},{"key":"538_CR21","doi-asserted-by":"crossref","unstructured":"Zou CC, Gong W, Towsley D (2002) Code red worm propagation modeling and analysis. Proceedings of the 9th ACM conference on Computer and communications security. ACM","DOI":"10.1145\/586110.586130"},{"key":"538_CR22","doi-asserted-by":"crossref","unstructured":"Wang F et al (2009) On the performance of passive worms over unstructured P2P networks. In: 2009. ICINIS\u201909. Second International Conference on Intelligent Networks and Intelligent Systems. IEEE","DOI":"10.1109\/ICINIS.2009.50"},{"key":"538_CR23","doi-asserted-by":"crossref","unstructured":"Ramachandran K, Sikdar B (2006) Modeling malware propagation in Gnutella type peer-to-peer networks. Proceedings 20th IEEE International Parallel & Distributed Processing Symposium. IEEE","DOI":"10.1109\/IPDPS.2006.1639704"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-016-0538-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0538-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0538-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T18:05:24Z","timestamp":1568657124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-016-0538-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,19]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["538"],"URL":"https:\/\/doi.org\/10.1007\/s12083-016-0538-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,19]]}}}