{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T03:45:21Z","timestamp":1776483921632,"version":"3.51.2"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T00:00:00Z","timestamp":1776470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T00:00:00Z","timestamp":1776470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04949-y","type":"journal-article","created":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T03:14:39Z","timestamp":1776482079000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Impact of Abandon and Forensic State on the Stability of Internet of Things Against Malware Attacks"],"prefix":"10.1007","volume":"7","author":[{"given":"Om","family":"Prakash","sequence":"first","affiliation":[]},{"given":"Avadhesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Rudra Pratap","family":"Ojha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,18]]},"reference":[{"issue":"2","key":"4949_CR1","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"A Riahi Sfar","year":"2018","unstructured":"Riahi Sfar A, Natalizio E, Challal Y, Chtourou Z. A roadmap for security challenges in the Internet of Things. Digital Commun Networks. 2018;4(2):118\u201337.","journal-title":"Digital Commun Networks"},{"issue":"1","key":"4949_CR2","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/s11036-022-01937-3","volume":"28","author":"IH Sarker","year":"2022","unstructured":"Sarker IH, Khan AI, Abushark YB, Alsolami F. Internet of Things (IoT) Security intelligence: a comprehensive overview, machine learning solutions and research Directions. Mob Networks App. 2022;28(1):296\u2013312. https:\/\/doi.org\/10.1007\/s11036-022-01937-3.","journal-title":"Mob Networks App"},{"key":"4949_CR3","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0268-2","author":"S Kumar","year":"2019","unstructured":"Kumar S, Tiwari P, Zymbler M. Internet of things is a revolutionary approach for future technology enhancement: a review. J Big Data. 2019. https:\/\/doi.org\/10.1186\/s40537-019-0268-2.","journal-title":"J Big Data"},{"issue":"15","key":"4949_CR4","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G. The Internet of Things: A survey. Comput Netw. 2010;54(15):2787\u2013805.","journal-title":"Comput Netw"},{"key":"4949_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.clscn.2022.100065","volume":"4","author":"P Singh","year":"2022","unstructured":"Singh P, Elmi Z, Krishna Meriga V, Pasha J, Dulebenets MA. Internet of Things for sustainable railway transportation: Past, present, and future. Cleaner Logistics and Supply Chain. 2022;4:100065.","journal-title":"Cleaner Logistics and Supply Chain"},{"key":"4949_CR6","doi-asserted-by":"publisher","DOI":"10.3390\/s21041174","author":"YB Zikria","year":"2021","unstructured":"Zikria YB, Ali R, Afzal MK, Kim SW. Next-generation internet of Things (IoT): opportunities, challenges, and solutions. Sensors. 2021. https:\/\/doi.org\/10.3390\/s21041174.","journal-title":"Sensors"},{"key":"4949_CR7","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"M Mohamad Noor","year":"2019","unstructured":"Mohamad Noor M, Hassan WH. Current research on Internet of Things (IoT) security: A survey. Comput Netw. 2019;148:283\u201394.","journal-title":"Comput Netw"},{"issue":"6","key":"4949_CR8","doi-asserted-by":"publisher","first-page":"9610","DOI":"10.1109\/JIOT.2023.3324053","volume":"11","author":"Al Al-Fawa reh M, Abu-Khalaf J, Szewcz","year":"2024","unstructured":"Al-Fawa reh M, Abu-Khalaf J, Szewczyk P, Kang JJ. MalBoT-DRL: malware botnet detection using deep reinforcement learning in IoT networks. IEEE Internet Things J. 2024;11(6):9610\u201329. https:\/\/doi.org\/10.1109\/JIOT.2023.3324053.","journal-title":"IEEE Internet Things J"},{"key":"4949_CR9","doi-asserted-by":"publisher","unstructured":"Salini S, Ivy BPU. Chapter 3 - Digital twin and artificial intelligence in industries. In: Dhanaraj RK, Bashir AK, Rajasekar V, Balusamy B, Malik P. (eds.) Digital Twin for Smart Manufacturing, pp. 35\u201358. Academic Press, ??? (2023). https:\/\/doi.org\/10.1016\/B978-0-323-99205-3.00014-6","DOI":"10.1016\/B978-0-323-99205-3.00014-6"},{"key":"4949_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103332","volume":"201","author":"RU Rasool","year":"2022","unstructured":"Rasool RU, Ahmad HF, Rafique W, Qayyum A, Qadir J. Security and privacy of internet of medical things: a contemporary review in the age of surveillance, botnets, and adversarial ml. J Netw Comput Appl. 2022;201:103332. https:\/\/doi.org\/10.1016\/j.jnca.2022.103332.","journal-title":"J Netw Comput Appl"},{"key":"4949_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103096","volume":"127","author":"P Kumari","year":"2023","unstructured":"Kumari P, Jain AK. A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput Sec. 2023;127:103096. https:\/\/doi.org\/10.1016\/j.cose.2023.103096.","journal-title":"Comput Sec"},{"issue":"3","key":"4949_CR12","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1007\/s12083-023-01478-w","volume":"16","author":"R Victor,","year":"2023","unstructured":"Victor,. IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. Peer-to-Peer Networking App. 2023;16(3):1380\u2013431. https:\/\/doi.org\/10.1007\/s12083-023-01478-w.","journal-title":"Peer-to-Peer Networking App"},{"key":"4949_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109809","volume":"231","author":"A Alatram","year":"2023","unstructured":"Alatram A, Sikos LF, Johnstone M, Szewczyk P, Kang JJ. DoS\/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol. Comput Netw. 2023;231:109809. https:\/\/doi.org\/10.1016\/j.comnet.2023.109809.","journal-title":"Comput Netw"},{"key":"4949_CR14","unstructured":"Nokia.: Nokia threat intelligence report finds malicious Io T botnet activity has sharply increased. (Jun.\/Jul. 2023). https:\/\/www.nokia.com\/about-us\/news\/releases\/2023\/06\/07\/nokia-threat- intelligence-report-finds-malicious-iot-botnet-activity-has-sharply-increased\/"},{"key":"4949_CR15","doi-asserted-by":"crossref","unstructured":"Jerkins JA, Stupiansky J. Mitigating IoT insecurity with inoculation epidemics. In: Proceedings of the 2018 ACM Southeast Conference, pp. 1\u20136 (2018)","DOI":"10.1145\/3190645.3190678"},{"issue":"9","key":"4949_CR16","doi-asserted-by":"publisher","first-page":"2412","DOI":"10.1109\/TIFS.2019.2898817","volume":"14","author":"MJ Farooq","year":"2019","unstructured":"Farooq MJ, Zhu Q. Modeling, analysis, and mitigation of dynamic botnet formation in wireless iot networks. IEEE Trans Inf Forensics Secur. 2019;14(9):2412\u201326.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4949_CR17","doi-asserted-by":"publisher","DOI":"10.3390\/math12020250","author":"R Casado-Vara","year":"2024","unstructured":"Casado-Vara R, Severt M, D az-Longueira A, Rey nMd, Calvo-Rolle JL. Dynamic malware mtigation strategies for IoT networks: a mathematical epidemiology approach. Mathematics. 2024. https:\/\/doi.org\/10.3390\/math12020250.","journal-title":"Mathematics"},{"key":"4949_CR18","doi-asserted-by":"publisher","unstructured":"Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 7, 82721\u201382743 (2019); https:\/\/doi.org\/10.1109\/ACCESS.2019.2924045","DOI":"10.1109\/ACCESS.2019.2924045"},{"issue":"7","key":"4949_CR19","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J. DDoS in the IoT: Mirai and Other Botnets. Computer. 2017;50(7):80\u20134.","journal-title":"Computer"},{"key":"4949_CR20","unstructured":"B, B. New Hideseek IoT Botnet using Custom-Built Peer-to-Peer Communication Spotted in the Wild. (2018). https:\/\/www.bitdefender.com\/en-us\/blog\/labs\/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild"},{"key":"4949_CR21","doi-asserted-by":"publisher","first-page":"138508","DOI":"10.1109\/ACCESS.2020.3011919","volume":"8","author":"SMP Dinakarrao","year":"2020","unstructured":"Dinakarrao SMP, Guo X, Sayadi H, Nowzari C, Sasan A, Rafatirad S, et al. Cognitive and scalable Technique for Securing IoT Networks Against Malware Epidemics. IEEE Access. 2020;8:138508\u201328.","journal-title":"IEEE Access"},{"key":"4949_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103172","volume":"129","author":"MH Nasir","year":"2023","unstructured":"Nasir MH, Arshad J, Khan MM. Collaborative device-level botnet detection for internet of things. Comput Sec. 2023;129:103172. https:\/\/doi.org\/10.1016\/j.cose.2023.103172.","journal-title":"Comput Sec"},{"key":"4949_CR23","doi-asserted-by":"publisher","unstructured":"Knysz M, Hu X, Zeng Y, Shin KG. Open WiFi networks: Lethal weapons for botnets? In: 2012 Proceedings IEEE INFOCOM, pp. 2631\u20132635 (2012); https:\/\/doi.org\/10.1109\/INFCOM.2012.6195668","DOI":"10.1109\/INFCOM.2012.6195668"},{"issue":"2","key":"4949_CR24","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","volume":"13","author":"K Pelechrinis","year":"2011","unstructured":"Pelechrinis K, Iliofotou M, Krishnamurthy SV. Denial of service attacks in wireless networks: the case of jammers. IEEE Commun Surv Tutor. 2011;13(2):245\u201357. https:\/\/doi.org\/10.1109\/SURV.2011.041110.00022.","journal-title":"IEEE Commun Surv Tutor"},{"key":"4949_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102143","volume":"116","author":"B Vignau","year":"2021","unstructured":"Vignau B, Khoury R, Hall S, Hamou-Lhadj A. The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. J Syst Architect. 2021;116:102143. https:\/\/doi.org\/10.1016\/j.sysarc.2021.102143.","journal-title":"J Syst Architect"},{"key":"4949_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/ett.5056","author":"M Asadi","year":"2024","unstructured":"Asadi M, Jamali MAJ, Heidari A, Navimipour NJ. Botnets unveiled: a comprehensive survey on evolving threats and defense strategies. Trans Emerg Telecommun Tech. 2024. https:\/\/doi.org\/10.1002\/ett.5056.","journal-title":"Trans Emerg Telecommun Tech"},{"key":"4949_CR27","doi-asserted-by":"crossref","unstructured":"Kermack WO, McKendrick AG . A Contribution to the Mathematical Theory of Epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character 115(772), 700\u2013721 (1927)","DOI":"10.1098\/rspa.1927.0118"},{"key":"4949_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2812810","volume":"16","author":"A Makhoul","year":"2016","unstructured":"Makhoul A, Guyeux C, Hakem M, Bahi J. Using an epidemiological approach to maximize data survival in the internet of things. ACM Trans Internet Technol. 2016;16:1\u201315. https:\/\/doi.org\/10.1145\/2812810.","journal-title":"ACM Trans Internet Technol"},{"key":"4949_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.109928","volume":"138","author":"BK Mishra","year":"2020","unstructured":"Mishra BK, Keshri AK, Rao YS, Mishra BK, Mahato B, Ayesha S, et al. COVID-19 created chaos across the globe: Three novel quarantine epidemic models. Chaos Solitons & Fractals. 2020;138:109928. https:\/\/doi.org\/10.1016\/j.chaos.2020.109928.","journal-title":"Chaos Solitons & Fractals"},{"key":"4949_CR30","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3745619","author":"D Acarali","year":"2019","unstructured":"Acarali D, Rajarajan M, Komninos N, Zarpel o BB. Modelling the Spread of Botnet Malware in Iot-Based Wireless Sensor Networks. Sec Commun Net. 2019. https:\/\/doi.org\/10.1155\/2019\/3745619.","journal-title":"Sec Commun Net"},{"key":"4949_CR31","doi-asserted-by":"publisher","unstructured":"Ji Y, Yao L, Liu S, Yao H, Ye Q, Wang R . The Study on the Botnet and its Prevention Policies in the Internet of Things. In: 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)), pp. 837\u2013842 (2018); https:\/\/doi.org\/10.1109\/CSCWD.2018.8465280","DOI":"10.1109\/CSCWD.2018.8465280"},{"issue":"3","key":"4949_CR32","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1007\/s11277-021-08320-7","volume":"119","author":"M Ibrahim","year":"2021","unstructured":"Ibrahim M, Abdullah MT, Abdullah A, Perumal T. The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation. Wireless Pers Commun. 2021;119(3):2093\u2013105. https:\/\/doi.org\/10.1007\/s11277-021-08320-7.","journal-title":"Wireless Pers Commun"},{"key":"4949_CR33","doi-asserted-by":"publisher","unstructured":"Giannetsos T, Dimitriou T, Prasad NR. Self-propagating worms in wireless sensor networks. In: Proceedings of the 5th International Student Workshop on Emerging Networking Experiments and Technologies, pp. 31\u201332. ACM, ??? (2009); https:\/\/doi.org\/10.1145\/1658997.1659015","DOI":"10.1145\/1658997.1659015"},{"key":"4949_CR34","doi-asserted-by":"publisher","first-page":"61764","DOI":"10.1109\/ACCESS.2019.2916717","volume":"7","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis N, Moustafa N, Sitnikova E. Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions. IEEE Access. 2019;7:61764\u201385. https:\/\/doi.org\/10.1109\/ACCESS.2019.2916717.","journal-title":"IEEE Access"},{"key":"4949_CR35","unstructured":"Gardner MT, Beard C, Medhi D. Using SEIRS Epidemic Models for IoT Botnets Attacks. In: DRCN 2017 - Design of Reliable Communication Networks; 13th International Conference, pp. 1\u20138 (2017);"},{"key":"4949_CR36","doi-asserted-by":"publisher","unstructured":"MacDermott A, Baker T, Shi Q. IoT Forensics: Challenges for the Ioa Era. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/NTMS.2018.8328748","DOI":"10.1109\/NTMS.2018.8328748"},{"key":"4949_CR37","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.diin.2019.01.012","volume":"28","author":"F Servida","year":"2019","unstructured":"Servida F, Casey E. IoT forensic challenges and opportunities for digital traces. Digit Investig. 2019;28:22\u20139. https:\/\/doi.org\/10.1016\/j.diin.2019.01.012.","journal-title":"Digit Investig"},{"key":"4949_CR38","unstructured":"Alur R, Berger E, Drobnis AW, Fix L, Fu K, Hager GD, Lopresti D, Nahrstedt K, Mynatt E, Patel S, Rexford J, Stankovic JA, Zorn B. Systems Computing Challenges in the Internet of Things (2016); https:\/\/arxiv.org\/abs\/1604.02980"},{"issue":"2","key":"4949_CR39","first-page":"74","volume":"2","author":"M Ibrahim","year":"2025","unstructured":"Ibrahim M. Epidemic Based Modelling For the Mitigation of IoT Botnet Propagation at Equilibrium Point. KASU JOURNAL OF MATHEMATICAL SCIENCE (Maths Access). 2025;2(2):74\u201383.","journal-title":"KASU JOURNAL OF MATHEMATICAL SCIENCE (Maths Access)"},{"key":"4949_CR40","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-024-00310-z","author":"L Quiroga-S\u00e1nchez","year":"2025","unstructured":"Quiroga-S\u00e1nchez L, Montoya GA, Lozano-Garzon CA. The SEIRS-NIMFA epidemiological model for malware propagation analysis in iot networks. Cybersecurity. 2025. . https:\/\/doi.org\/10.1186\/s42400-024-00310-z","journal-title":"Cybersecurity"},{"key":"4949_CR41","doi-asserted-by":"publisher","first-page":"106945","DOI":"10.1016\/j.comnet.2019.106945","volume":"165","author":"L pez","year":"2019","unstructured":"pez L, Peinado MA, Ortiz A. An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against iot wireless networks. Comput Netw. 2019;165:106945. . https:\/\/doi.org\/10.1016\/j.comnet.2019.106945","journal-title":"Comput Netw"},{"key":"4949_CR42","doi-asserted-by":"publisher","first-page":"63349","DOI":"10.1109\/ACCESS.2025.3559146","volume":"13","author":"BSN Murthy","year":"2025","unstructured":"Murthy BSN, Madhusudanan V, Srinivas MN, Guerrini L, Zeb A, Dao N-N, et al. Analytical Optimal Control of Delayed Worm Propagation Model in Heterogeneous IoT Systems. IEEE Access. 2025;13:63349\u201366.","journal-title":"IEEE Access"},{"key":"4949_CR43","doi-asserted-by":"publisher","unstructured":"Tuyishimire E, Bagula BA. Modelling and analysis of interference diffusion in the internet of things: an epidemic model. In: 2020 Conference on Information Communications Technology and Society (ICTAS), pp. 1\u20136 (2020); https:\/\/doi.org\/10.1109\/ICTAS47918.2020.233984","DOI":"10.1109\/ICTAS47918.2020.233984"},{"key":"4949_CR44","doi-asserted-by":"publisher","first-page":"116042","DOI":"10.1016\/j.apm.2025.116042","volume":"144","author":"H Cao","year":"2025","unstructured":"Cao H, Peng D-T, Yu D. Modeling and controlling spatiotemporal malware propagation in mobile Internet of Things. Appl Math Model. 2025;144:116042. . https:\/\/doi.org\/10.1016\/j.apm.2025.116042","journal-title":"Appl Math Model"},{"key":"4949_CR45","doi-asserted-by":"crossref","unstructured":"Miyoshi K, Miura H, Kimura T, Hirata K. A consideration of deterministic epidemic modeling incorporating attackers movement strategies. In: 2025 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), pp. 27\u201328 (2025).","DOI":"10.1109\/ICCE-Taiwan66881.2025.11207760"},{"key":"4949_CR46","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1515\/nleng-2017-0094","volume":"8","author":"B Mishra","year":"2018","unstructured":"Mishra B, Keshri A, Mallick D, Mishra B. Mathematical model on distributed denial of service attack through internet of things in a network. Nonlinear Engineering. 2018;8:486\u201395. https:\/\/doi.org\/10.1515\/nleng-2017-0094.","journal-title":"Nonlinear Engineering"},{"key":"4949_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/6803801","volume":"2019","author":"M Yin","year":"2019","unstructured":"Yin M, Chen X, Wang Q, Wang W, Wang Y. Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT. Security and Communication Networks. 2019;2019:1\u201314. https:\/\/doi.org\/10.1155\/2019\/6803801.","journal-title":"Security and Communication Networks"},{"issue":"8","key":"4949_CR48","doi-asserted-by":"publisher","first-page":"7470","DOI":"10.1109\/JIOT.2020.2984662","volume":"7","author":"H Xia","year":"2020","unstructured":"Xia H, Li L, Cheng X, Cheng X, Qiu T. Modeling and Analysis Botnet Propagation in social Internet of Things. IEEE Internet Things J. 2020;7(8):7470\u201381. https:\/\/doi.org\/10.1109\/JIOT.2020.2984662.","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"4949_CR49","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","volume":"22","author":"M Stoyanova","year":"2020","unstructured":"Stoyanova M, Nikoloudakis Y, Panagiotakis S, Pallis E, Markakis EK. A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues. IEEE Communications Surveys & Tutorials. 2020;22(2):1191\u2013221. https:\/\/doi.org\/10.1109\/COMST.2019.2962586.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"4949_CR50","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/cati2p208","author":"M Ibrahim","year":"2020","unstructured":"Ibrahim M, Abdullah MT, Abdullah A, Perumal T. An Epidemic Based Model for the Predictions of OOFI in an IoT Platform. Int J Eng Trends Technol. 2020. . https:\/\/doi.org\/10.14445\/22315381\/cati2p208","journal-title":"Int J Eng Trends Technol"},{"issue":"1","key":"4949_CR51","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/S0025-5564(02)00108-6","volume":"180","author":"P Van den Driessche","year":"2002","unstructured":"Van den Driessche P, Watmough J. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. Math Biosci. 2002;180(1):29\u201348. https:\/\/doi.org\/10.1016\/S0025-5564(02)00108-6.","journal-title":"Math Biosci"},{"key":"4949_CR52","doi-asserted-by":"publisher","unstructured":"LaSalle JP. The stability of dynamical systems. In: CBMS-NSF Regional Conference Series in Applied Mathematics, pp. 96\u2013106 (1976); https:\/\/doi.org\/10.1137\/1.9781611970432","DOI":"10.1137\/1.9781611970432"},{"key":"4949_CR53","unstructured":"Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma Z, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y. Understanding the Mirai Botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093\u20131110. USENIX Association, Vancouver, BC (2017); https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04949-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04949-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04949-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T03:14:44Z","timestamp":1776482084000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04949-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,18]]},"references-count":53,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2026,6]]}},"alternative-id":["4949"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04949-y","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,18]]},"assertion":[{"value":"2 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This study did not require ethics approval because it did not include human tissue, animal, data, or participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"368"}}