{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T17:27:53Z","timestamp":1725384473903},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ccis.2012.6664229","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T16:48:02Z","timestamp":1385570882000},"page":"524-528","source":"Crossref","is-referenced-by-count":0,"title":["A propagation model of passive social network worm"],"prefix":"10.1109","author":[{"given":"Wei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Bohou","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Mathematical Modeling of Epidemics","year":"2002","author":"medlock","key":"3"},{"journal-title":"Malware Evolution January-March","year":"2005","author":"gostev","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.46"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2011.01252"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.2006.A1626"},{"journal-title":"Fibonacci Modeling of Malware Propagation","year":"2008","author":"zhang","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287647"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2010.5583160"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"},{"year":"0","key":"11"}],"event":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2012,10,30]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,11,1]]}},"container-title":["2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637132\/6664224\/06664229.pdf?arnumber=6664229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:33:34Z","timestamp":1490222014000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6664229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ccis.2012.6664229","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}