{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:15:47Z","timestamp":1775229347160,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s13198-021-01336-z","type":"journal-article","created":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T06:48:18Z","timestamp":1633762098000},"page":"752-760","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["SEIRS model with spatial correlation for analyzing dynamic of virus spreading in event-driven wireless sensor networks"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1569-129X","authenticated-orcid":false,"given":"Rajeev Kumar","family":"Shakya","sequence":"first","affiliation":[]},{"given":"Tadesse Hailu","family":"Ayane","sequence":"additional","affiliation":[]},{"given":"Feyissa Debo","family":"Diba","sequence":"additional","affiliation":[]},{"given":"Pushpa","family":"Mamoria","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,8]]},"reference":[{"key":"1336_CR1","doi-asserted-by":"crossref","unstructured":"Akyildiz IF, Vuran MC (2010) Wireless sensor networks. Wiley","DOI":"10.1002\/9780470515181"},{"issue":"1","key":"1336_CR2","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0025-5564(94)90025-6","volume":"124","author":"LJ Allen","year":"1994","unstructured":"Allen LJ (1994) Some discrete-time SI SIR and SIS epidemic models. Math Biosci J 124(1):83\u2013105. https:\/\/doi.org\/10.1016\/0025-5564(94)90025-6","journal-title":"Math Biosci J"},{"issue":"3","key":"1336_CR3","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3390\/math8030410","volume":"8","author":"FK Batista","year":"2020","unstructured":"Batista FK, Mart\u00edn del Rey A, Queiruga-Dios A (2020) A new individual-based model to simulate malware propagation in wireless sensor networks. Mathematics 8(3):410","journal-title":"Mathematics"},{"issue":"15","key":"1336_CR4","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1002\/sec.1186","volume":"8","author":"AM Del Ray","year":"2015","unstructured":"Del Ray AM (2015) Mathematical modeling of the propagation of malware: a review. J Secur Commun Netw 8(15):2561\u20132579","journal-title":"J Secur Commun Netw"},{"key":"1336_CR5","doi-asserted-by":"publisher","unstructured":"Feng L, Song L, Zhao Q, Wang H (2015) Modeling and stability analysis of worm propagation in wireless sensor network. Math Probl Eng Article ID 129598. https:\/\/doi.org\/10.1155\/2015\/129598","DOI":"10.1155\/2015\/129598"},{"key":"1336_CR6","doi-asserted-by":"crossref","unstructured":"Gao Q, Zhuang J (2020) Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model.\u00a0Appl Math Comput 368, Article 124584","DOI":"10.1016\/j.amc.2019.124584"},{"key":"1336_CR7","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s11277-020-08024-4","volume":"118","author":"R Geetha","year":"2021","unstructured":"Geetha R, Madhusudanan V, Srinivas MN (2021) Influence of clamor on the transmission of worms in remote sensor network. Wirel Pers Commun 118:461\u2013473","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"1336_CR8","first-page":"1476","volume":"188","author":"HJD Guilln","year":"2017","unstructured":"Guilln HJD, Del Rey AM (2017) SEIRS epidemic model with delay for transmission of malicious objects in computer network. Appl Math Comput 188(2):1476\u20131482","journal-title":"Appl Math Comput"},{"key":"1336_CR9","doi-asserted-by":"crossref","unstructured":"Guiyun L, Baihao P, Xiaojing Z, Xuejing L (2020) Differential games of rechargeable wireless sensor networks against malicious programs based on SILRD propagation model. Complexity, vol 2020, Article ID 5686413, 13","DOI":"10.1155\/2020\/5686413"},{"key":"1336_CR10","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez Guill\u00e9n JD, Mart\u00edn del Rey A (2019) A mathematical model for malware spread on WSNs with population dynamics. Stat Mech Its Appl Phys A 545","DOI":"10.1016\/j.physa.2019.123609"},{"key":"1336_CR11","doi-asserted-by":"crossref","unstructured":"Jiang L, Xu Q, Pan H, Dai Y, Tong J (2020) Virus propagation in wireless sensor networks with media access control mechanism.\u00a0Secur Commun Netw 11, Article ID 6513920","DOI":"10.1155\/2020\/6513920"},{"issue":"6","key":"1336_CR12","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1080\/00207217.2019.1570563","volume":"106","author":"RP Ojha","year":"2019","unstructured":"Ojha RP, Srivastava PK, Sanyal G (2019) Improving wireless sensor networks performance through epidemic model. Int J Electron 106(6):862\u2013879","journal-title":"Int J Electron"},{"key":"1336_CR13","doi-asserted-by":"publisher","first-page":"2525","DOI":"10.1007\/s11277-020-07809-x","volume":"116","author":"RP Ojha","year":"2021","unstructured":"Ojha RP, Srivastava PK, Sanyal G et al (2021) Improved model for the stability analysis of wireless sensor network against malware attacks. Wirel Pers Commun 116:2525\u20132548","journal-title":"Wirel Pers Commun"},{"key":"1336_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.physa.2016.12.077","volume":"472","author":"B Qu","year":"2017","unstructured":"Qu B, Wang H (2017) SIS epidemic spreading with correlated heterogeneous infection rates. Phys A 472:13\u201324","journal-title":"Phys A"},{"key":"1336_CR15","doi-asserted-by":"crossref","unstructured":"Rao YS, Keshri AK, Mishra BK, Panda TC (2020) Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a differential e-epidemic model. Phys A Stat Mech Its Appl, Elsevier, 540(C)","DOI":"10.1016\/j.physa.2019.123240"},{"issue":"4","key":"1336_CR16","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1049\/iet-wss.2012.0094","volume":"3","author":"RK Shakya","year":"2013","unstructured":"Shakya RK, Singh YN, Verma NK (2013) Generic correlation model for wireless sensor network applications. J IET Wirel Sens Syst 3(4):266\u2013276","journal-title":"J IET Wirel Sens Syst"},{"issue":"3","key":"1336_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-019-06473-0","volume":"106","author":"RK Shakya","year":"2019","unstructured":"Shakya RK, Rana K, Gaurav A, Mamoria P, Srivastava PK (2019) Stability analysis of epidemic modeling based on spatial correlation for wireless sensor networks. Int J Wirel Personal Commun Springer 106(3):1\u201315. https:\/\/doi.org\/10.1007\/s11277-019-06473-0","journal-title":"Int J Wirel Personal Commun Springer"},{"key":"1336_CR18","doi-asserted-by":"publisher","first-page":"92881","DOI":"10.1109\/ACCESS.2019.2927220","volume":"7","author":"S Shen","year":"2019","unstructured":"Shen S, Zhou H, Feng S, Liu J, Cao Q (2019) SNIRD: disclosing rules of malware spread in heterogeneous wireless sensor networks. IEEE Access 7:92881\u201392892","journal-title":"IEEE Access"},{"issue":"3","key":"1336_CR19","doi-asserted-by":"publisher","first-page":"2535","DOI":"10.1007\/s11277-017-4988-3","volume":"98","author":"A Singh","year":"2018","unstructured":"Singh A, Awasthi AK, Singh K, Srivastava PK (2018) Modeling and analysis of worm propagation in wireless sensor networks. Wirel Pers Commun 98(3):2535\u20132551","journal-title":"Wirel Pers Commun"},{"key":"1336_CR20","doi-asserted-by":"crossref","unstructured":"Srivastava PK, Pandey SP, Gupta N, Singh SP, Ojha RP (2019) Modeling and analysis of antimalware effect on wireless sensor network.\u00a0IEEE 4th International conference on computer and communication systems (ICCCS), pp 639\u2013643","DOI":"10.1109\/CCOMS.2019.8821631"},{"key":"1336_CR21","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10776-011-0147-z","volume":"18","author":"S Tang","year":"2011","unstructured":"Tang S (2011) A modified SI epidemic model for combating virus spread in wireless sensor networks. Int J Wirel Inf Netw 18:319\u2013326. https:\/\/doi.org\/10.1007\/s10776-011-0147-z","journal-title":"Int J Wirel Inf Netw"},{"issue":"2","key":"1336_CR22","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1504\/IJWMC.2013.054048","volume":"6","author":"S Tang","year":"2013","unstructured":"Tang S, Myers D, Yuan J (2013) Modified SIS epidemic model for analysis of virus spread in wireless sensor networks. Int J Wirel Mob Comput 6(2):99\u2013108. https:\/\/doi.org\/10.1504\/IJWMC.2013.054048","journal-title":"Int J Wirel Mob Comput"},{"issue":"1","key":"1336_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s17010081","volume":"17","author":"T Wang","year":"2017","unstructured":"Wang T, Wu Q, Wen S et al (2017) Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks. Sensors 17(1):1\u201317","journal-title":"Sensors"},{"issue":"8","key":"1336_CR24","first-page":"33","volume":"27","author":"S Xiao-Ping","year":"2011","unstructured":"Xiao-Ping S, Yu-Rong SJ (2011) A malware propagation model in wireless sensor networks with cluster structure of GAF. J Telecommun Sci 27(8):33\u201338","journal-title":"J Telecommun Sci"},{"key":"1336_CR25","doi-asserted-by":"crossref","unstructured":"Yonghua Z, Jianhua Z, Chaoan L (2020) A SEIQR Model considering the Effects of Different Quarantined Rates on Worm Propagation in Mobile Internet. Math Probl Eng, Article ID 8161595, 16 pages","DOI":"10.1155\/2020\/8161595"},{"issue":"5","key":"1336_CR26","doi-asserted-by":"publisher","first-page":"396","DOI":"10.3390\/math7050396","volume":"7","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Kundu S, Wei R (2019) A delayed epidemic model for propagation of malicious codes in wireless sensor network. Mathematics 7(5):396","journal-title":"Mathematics"},{"key":"1336_CR27","doi-asserted-by":"crossref","unstructured":"Zhang Z, Zou J, Ranjit Kumar U, Ghaus ur Rahman (2020) An epidemic model with multiple delays for the propagation of worms in wireless sensor networks. J Results Phys 19","DOI":"10.1016\/j.rinp.2020.103424"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01336-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-021-01336-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-021-01336-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T04:26:46Z","timestamp":1650860806000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-021-01336-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,8]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["1336"],"URL":"https:\/\/doi.org\/10.1007\/s13198-021-01336-z","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,8]]},"assertion":[{"value":"27 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Rajeev Kumar Shakya, Tadesse Hailu Ayane, Feyissa Debo Diba, and Pushpa Mamoria declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}