{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:22:37Z","timestamp":1760955757732,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61572114"],"award-info":[{"award-number":["61572114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61379027"],"award-info":[{"award-number":["61379027"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61701048"],"award-info":[{"award-number":["61701048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"RFDP","award":["2016YFB0800605"],"award-info":[{"award-number":["2016YFB0800605"]}]},{"name":"YFCU","award":["2017XJZ31"],"award-info":[{"award-number":["2017XJZ31"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s12083-017-0616-y","type":"journal-article","created":{"date-parts":[[2017,11,5]],"date-time":"2017-11-05T20:44:06Z","timestamp":1509914646000},"page":"955-965","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Rumor spreading in interdependent social networks"],"prefix":"10.1007","volume":"11","author":[{"given":"Qiyi","family":"Han","sequence":"first","affiliation":[]},{"given":"Hong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,6]]},"reference":[{"key":"616_CR1","doi-asserted-by":"crossref","unstructured":"Leo Y, Karsai M, Sarraute C, Fleury E (2016) Correlations of consumption patterns in social-economic networks. In: Proceedings IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","DOI":"10.1109\/ASONAM.2016.7752280"},{"issue":"5","key":"616_CR2","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MC.2016.146","volume":"49","author":"O Niamut","year":"2016","unstructured":"Niamut O, Mu M, Denazis S, Race N (2016) Social telemedia: The relationship between social information and networked media. Computer 49(5):92\u201397","journal-title":"Computer"},{"issue":"4","key":"616_CR3","doi-asserted-by":"crossref","first-page":"2397","DOI":"10.1109\/COMST.2015.2453481","volume":"17","author":"A Vegni","year":"2015","unstructured":"Vegni A, Loscr V (2015) A survey on vehicular social networks. IEEE Commun Surv Tutorials 17 (4):2397\u20132419","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"9","key":"616_CR4","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/JSAC.2013.SUP.0513006","volume":"31","author":"H Wang","year":"2013","unstructured":"Wang H, Wang F, Liu J, lin C, Xu K, Wang C (2013) Accelerating peer-to-peer file sharing with social relations. IEEE J Sel Area Comm 31(9):66\u201374","journal-title":"IEEE J Sel Area Comm"},{"issue":"5","key":"616_CR5","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TKDE.2015.2508816","volume":"28","author":"WX Zhao","year":"2016","unstructured":"Zhao WX, Li S, He Y, Chang EY, Wen J, Li X (2016) Connecting social media to E-commerce: cold-start product recommendation using microblogging information. IEEE Trans Knowl Data Eng 28(5):1147\u20131159","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"616_CR6","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1038\/nature08932","volume":"464","author":"S Buldyrev","year":"2010","unstructured":"Buldyrev S, Parshani R, Paul G, Stanley H, Havlin S (2010) Catastrophic cascade of failures in interdependent networks. Nature 464:1025\u20131028","journal-title":"Nature"},{"key":"616_CR7","first-page":"1","volume":"3","author":"C Schneider","year":"1969","unstructured":"Schneider C, Yazdani N, Arajo N, Havlin S, Herrmann H (1969) Towards designing robust coupled networks. Sci Rep 3:1\u20137","journal-title":"Sci Rep"},{"issue":"7","key":"616_CR8","first-page":"1","volume":"87","author":"G Fu","year":"2014","unstructured":"Fu G, Dawson R, Khoury M, Bullock S (2014) Interdependent networks: Vulnerability analysis and strategies to limit cascading failure. Eur Phys J B 87(7):1\u201310","journal-title":"Eur Phys J B"},{"key":"616_CR9","doi-asserted-by":"crossref","unstructured":"Jamilah, Handayani PW (2016) Analysis on effects of brand community on brand loyalty in the social media: A case study of an online transportation (UBER). In: Proceedings IEEE International Conference on Advanced Computer Science and Information Systems (ICACSIS)","DOI":"10.1109\/ICACSIS.2016.7872746"},{"issue":"4","key":"616_CR10","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/s12083-013-0198-2","volume":"7","author":"Y Hu","year":"2014","unstructured":"Hu Y, Wang D, Zhong H, Wu F (2014) Socialtrust: Enabling long-term social cooperation in peer-to-peer services. Peer-to-Peer Netw Appl 7(4):525\u2013538","journal-title":"Peer-to-Peer Netw Appl"},{"key":"616_CR11","doi-asserted-by":"crossref","unstructured":"Li M, Alessio B, Zhou W (2010) OST: A transaction based online social trust model for social network and file sharing security. In: Proceedings IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)","DOI":"10.1109\/EUC.2010.128"},{"issue":"8","key":"616_CR12","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/CC.2014.6911086","volume":"11","author":"C Yi","year":"2014","unstructured":"Yi C, Bao Y, Jiang J, Xue Y (2014) Mitigation strategy against cascading failures on social networks. China Commun 11(8):37\u201346","journal-title":"China Commun"},{"issue":"4","key":"616_CR13","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","volume":"16","author":"M Fire","year":"2014","unstructured":"Fire M, Goldschmidt R, Elovici Y (2014) Online social networks: Threats and solutions. IEEE Commun Surv Tut 16(4):2019\u20132036","journal-title":"IEEE Commun Surv Tut"},{"key":"616_CR14","doi-asserted-by":"crossref","unstructured":"Han Q, Wen H, Feng G, Wang L, Pan F (2015) Secure interdependent networks for peer-to-peer and online social network. In: Proceedings IEEE Global Communications Conference (GLOBECOM)","DOI":"10.1109\/GLOCOM.2015.7417048"},{"key":"616_CR15","volume-title":"Epidemic modelling","author":"DJ Daley","year":"2000","unstructured":"Daley DJ, Gani J (2000) Epidemic modelling. Cambridge University Press, Cambridge"},{"key":"616_CR16","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/j.physa.2006.07.017","volume":"374","author":"M Nekovee","year":"2007","unstructured":"Nekovee M, Moreno Y, Bianconi G, Marsili M (2007) Theory of rumour spreading in complex social networks. Phys A 374:457\u2013470","journal-title":"Phys A"},{"key":"616_CR17","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.physa.2013.12.004","volume":"398","author":"J Wang","year":"2014","unstructured":"Wang J, Zhao L, Huang R (2014) SIRAru rumor spreading model in complex networks. Phys A 398:43\u201355","journal-title":"Phys A"},{"key":"616_CR18","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.physa.2014.03.021","volume":"405","author":"Y Zan","year":"2014","unstructured":"Zan Y, Wu J, Li P, Yu Q (2014) SICR rumor spreading model in complex networks: Counterattack and self-resistance. Phys A 405:159\u2013170","journal-title":"Phys A"},{"key":"616_CR19","doi-asserted-by":"crossref","unstructured":"Wang J, Wang W, Wang C (2016) How the anti-rumor kills the rumor: Conflicting information propagation in networks. In: Proceedings IEEE International Conference on Communications (ICC)","DOI":"10.1109\/ICC.2016.7511492"},{"key":"616_CR20","doi-asserted-by":"crossref","unstructured":"Dang A, Smit M, Moh\u2019d A, Minghim R, Milios E (2016) Toward understanding how users respond to rumours in social media. In: Proceedings IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","DOI":"10.1109\/ASONAM.2016.7752326"},{"issue":"2","key":"616_CR21","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1109\/TVT.2016.2553121","volume":"66","author":"L Wang","year":"2017","unstructured":"Wang L, Wu H, Stber GL (2017) Cooperative jamming aided secrecy enhancement in P2P communications with social interaction constraints. IEEE Trans Veh Technol 66(2):1144\u20131158","journal-title":"IEEE Trans Veh Technol"},{"key":"616_CR22","doi-asserted-by":"crossref","first-page":"n1","DOI":"10.1103\/PhysRevLett.105.048701","volume":"105","author":"R Parshani","year":"2010","unstructured":"Parshani R, Buldyrev S, Havlin S (2010) Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition. Phys Rev Lett 105:n1\u2013n4","journal-title":"Phys Rev Lett"},{"key":"616_CR23","doi-asserted-by":"crossref","unstructured":"Khamfroush H, Bartolini N, La Porta TF, Swami A, Dillman J (2016) On propagation of phenomena in interdependent networks. IEEE Trans Netw Sci Eng 3(4)","DOI":"10.1109\/TNSE.2016.2600033"},{"issue":"6684","key":"616_CR24","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D Wattsand","year":"1998","unstructured":"Wattsand D, Strogatz SH (1998) Collective dynamics of small-world networks. Nature 393(6684):440\u2013442","journal-title":"Nature"},{"issue":"5439","key":"616_CR25","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barabsi","year":"1999","unstructured":"Barabsi AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"key":"616_CR26","doi-asserted-by":"crossref","unstructured":"Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In: Proceedings 2nd ACM SIGCOMM Workshop on Social Networks (WOSN\u201909)","DOI":"10.1145\/1592665.1592675"},{"key":"616_CR27","doi-asserted-by":"crossref","unstructured":"He Z, Cai Z, Yu J, Wang X, Sun Y, Li Y (2017) Cost-efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks, IEEE Transactions on Vehicular Technolog, early access","DOI":"10.1109\/TVT.2016.2585591"},{"key":"616_CR28","doi-asserted-by":"crossref","unstructured":"Han Q, Wen H, Wu J, Ren M (2015) Rumor spreading and security monitoring in complex networks. In: Proceedings LNCS International Conference on Computational Social Networks (CSoNet)","DOI":"10.1007\/978-3-319-21786-4_5"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-017-0616-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0616-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0616-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T12:56:09Z","timestamp":1570280169000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-017-0616-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["616"],"URL":"https:\/\/doi.org\/10.1007\/s12083-017-0616-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2017,11,6]]}}}