{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T02:42:02Z","timestamp":1772764922593,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02312-z","type":"journal-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T09:02:15Z","timestamp":1699434135000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Study of the Dissemination of Malware and the Enhancement of the Lifespan of Rechargeable Wireless Sensor Networks: An Epidemiological Approach"],"prefix":"10.1007","volume":"4","author":[{"given":"Shashank","family":"Awasthi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1783-5859","authenticated-orcid":false,"given":"Pramod Kumar","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Naresh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Rudra Pratap","family":"Ojha","sequence":"additional","affiliation":[]},{"given":"Ashok Kumar","family":"Yadav","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,8]]},"reference":[{"issue":"6","key":"2312_CR1","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1016\/j.apm.2012.09.025","volume":"37","author":"BK Mishra","year":"2013","unstructured":"Mishra BK, Keshri N. Mathematical model on the transmission of worms in wireless sensor network. Appl Math Model. 2013;37(6):4103\u201311.","journal-title":"Appl Math Model."},{"issue":"4","key":"2312_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1080\/09720529.2019.1637156","volume":"22","author":"LJB Andrews","year":"2019","unstructured":"Andrews LJB, Raja L, Shanmugasundaram S. Mobile android-based remote patient monitoring system through wearable sensors. J Discrete Math Sci Cryptography. 2019;22(4):557\u201368.","journal-title":"J Discrete Math Sci Cryptography"},{"issue":"10","key":"2312_CR3","doi-asserted-by":"publisher","first-page":"4124","DOI":"10.1002\/ett.4124","volume":"33","author":"GS Rawat","year":"2022","unstructured":"Rawat GS, Singh K. Joint beacon frequency and beacon transmission power adaptation for internet of vehicles. Trans Emerging Telecommun Technol. 2022;33(10):4124.","journal-title":"Trans Emerging Telecommun Technol."},{"issue":"2\u20133","key":"2312_CR4","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1504\/IJICA.2021.113750","volume":"12","author":"T Khan","year":"2021","unstructured":"Khan T, Singh K. Tasrp: a trust aware secure routing protocol for wireless sensor networks. Int J Innovative Comput Appl. 2021;12(2\u20133):108\u201322.","journal-title":"Int J Innovative Comput Appl."},{"issue":"2","key":"2312_CR5","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1080\/09720502.2020.1731952","volume":"23","author":"AM Abbas","year":"2020","unstructured":"Abbas AM. Analysis of error for anchor-based localization in wireless sensor networks. J Interdisciplinary Math. 2020;23(2):393\u2013401.","journal-title":"J Interdisciplinary Math."},{"issue":"4","key":"2312_CR6","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1080\/09720529.2020.1753301","volume":"24","author":"D Arivudainambi","year":"2021","unstructured":"Arivudainambi D, Pavithra R, Kalyani P. Cuckoo search algorithm for target coverage and sensor scheduling with adjustable sensing range in wireless sensor network. J Discrete Math Sci Cryptography. 2021;24(4):975\u201396.","journal-title":"J Discrete Math Sci Cryptography"},{"issue":"2","key":"2312_CR7","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1080\/09720529.2018.1459436","volume":"21","author":"C-L Tang","year":"2018","unstructured":"Tang C-L, Li M. Location of wireless sensor networks based on port management system. J Discrete Math Sci Cryptography. 2018;21(2):595\u20139.","journal-title":"J Discrete Math Sci Cryptography."},{"issue":"2","key":"2312_CR8","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1080\/09720529.2020.1729511","volume":"23","author":"P Manju Bhambu","year":"2020","unstructured":"Manju Bhambu P, Kumar S. Target k-coverage problem in wireless sensor networks. J Discrete Math Sci Cryptography. 2020;23(2):651\u20139.","journal-title":"J Discrete Math Sci Cryptography."},{"issue":"2","key":"2312_CR9","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1080\/09720502.2020.1731950","volume":"23","author":"A Gambhir","year":"2020","unstructured":"Gambhir A, Payal A, Arya R. Water cycle algorithm based optimized clustering protocol for wireless sensor network. J Interdisciplinary Math. 2020;23(2):367\u201377.","journal-title":"J Interdisciplinary Math."},{"issue":"1","key":"2312_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1080\/13691180500519407","volume":"9","author":"B Sandywell","year":"2006","unstructured":"Sandywell B. Monsters in cyberspace cyberphobia and cultural panic in the information age. Inform Commun Soc. 2006;9(1):39\u201361.","journal-title":"Inform Commun Soc."},{"key":"2312_CR11","doi-asserted-by":"crossref","unstructured":"Jr GL. Not teaching viruses and worms is harmful. Communications of the ACM. 2005;48(1):144.","DOI":"10.1145\/1039539.1039575"},{"issue":"3","key":"2312_CR12","first-page":"1","volume":"9","author":"S Venkatraman","year":"2017","unstructured":"Venkatraman S. Autonomic framework for it security governance. Int J Manag Inform Technol. 2017;9(3):1\u201311.","journal-title":"Int J Manag Inform Technol."},{"issue":"2","key":"2312_CR13","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.1109\/TSG.2017.2776325","volume":"10","author":"G Liang","year":"2017","unstructured":"Liang G, Weller SR, Zhao J, Luo F, Dong ZY. A framework for cyber-topology attacks: Line-switching and new attack scenarios. IEEE Trans Smart Grid. 2017;10(2):1704\u201312.","journal-title":"IEEE Trans Smart Grid."},{"key":"2312_CR14","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s12190-016-1020-0","volume":"54","author":"RK Upadhyay","year":"2017","unstructured":"Upadhyay RK, Kumari S, Misra A. Modeling the virus dynamics in computer network with sveir model and nonlinear incident rate. J Appl Math Comput. 2017;54:485\u2013509.","journal-title":"J Appl Math Comput."},{"issue":"6","key":"2312_CR15","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1080\/00207217.2019.1570563","volume":"106","author":"RP Ojha","year":"2019","unstructured":"Ojha RP, Srivastava PK, Sanyal G. Improving wireless sensor networks performance through epidemic model. Int J Electron. 2019;106(6):862\u201379.","journal-title":"Int J Electron."},{"key":"2312_CR16","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10776-011-0147-z","volume":"18","author":"S Tang","year":"2011","unstructured":"Tang S. A modified si epidemic model for combating virus spread in wireless sensor networks. Int J Wirel Inform Netw. 2011;18:319\u201326.","journal-title":"Int J Wirel Inform Netw."},{"issue":"1","key":"2312_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10878-008-9190-9","volume":"20","author":"X Wang","year":"2010","unstructured":"Wang X, Li Q, Li Y. Eisirs: a formal model to analyze the dynamics of worm propagation in wireless sensor networks. J Combinatorial Opt. 2010;20(1):47\u201362.","journal-title":"J Combinatorial Opt."},{"key":"2312_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.chaos.2014.08.006","volume":"68","author":"N Keshri","year":"2014","unstructured":"Keshri N, Mishra BK. Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network. Chaos Solitons Fractals. 2014;68:151\u20138.","journal-title":"Chaos Solitons Fractals."},{"key":"2312_CR19","doi-asserted-by":"crossref","unstructured":"Mo L, You P, Cao X, Song Y.-Q, Chen J. Decentralized multi-charger coordination for wireless rechargeable sensor networks. In: 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20138 (2015). IEEE","DOI":"10.1109\/PCCC.2015.7410283"},{"key":"2312_CR20","doi-asserted-by":"crossref","unstructured":"Liu G, Peng B, Zhong X, Lan X. Differential games of rechargeable wireless sensor networks against malicious programs based on silrd propagation model. Complexity. 2020;2020:","DOI":"10.1155\/2020\/5686413"},{"key":"2312_CR21","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/BF00178324","volume":"28","author":"O Diekmann","year":"1990","unstructured":"Diekmann O, Heesterbeek JAP, Metz JA. On the definition and the computation of the basic reproduction ratio r 0 in models for infectious diseases in heterogeneous populations. J Math Biol. 1990;28:365\u201382.","journal-title":"J Math Biol."},{"key":"2312_CR22","doi-asserted-by":"crossref","unstructured":"La Salle JP. The Stability of Dynamical Systems. SIAM, ??? (1976)","DOI":"10.1137\/1.9781611970432"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02312-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02312-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02312-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T16:58:57Z","timestamp":1730480337000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02312-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,8]]},"references-count":22,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2023,11]]}},"alternative-id":["2312"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02312-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,8]]},"assertion":[{"value":"14 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The manuscript has been approved by all authors and has never been published, or under consideration for publication elsewhere. We have not submitted our manuscript to a preprint server prior to submission on SN Computer Science.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"851"}}