{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:12:12Z","timestamp":1730203932866,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/ccoms.2019.8821631","type":"proceedings-article","created":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T21:45:06Z","timestamp":1567460706000},"page":"639-643","source":"Crossref","is-referenced-by-count":6,"title":["Modeling and Analysis of Antimalware Effect on Wireless Sensor Network"],"prefix":"10.1109","author":[{"given":"Pramod Kumar","family":"Srivastava","sequence":"first","affiliation":[]},{"given":"Satya Prakash","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Nishu","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Santar Pal","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Rudra Pratap","family":"Ojha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.11.143"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12190-016-1020-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2585591"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2174\/2210327908666180413154130"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.1598094"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/22\/4\/040206"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2009.5340022"},{"key":"ref17","first-page":"8","article-title":"An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks","volume":"18","author":"wang","year":"2009","journal-title":"Chinese Journal of Electronics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-008-9190-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.045228"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525861"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.115"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/IJISMD.2018010101"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2012.09.025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594130"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1016\/j.jnca.2014.09.011","article-title":"Epidemiological approach for data survivability in unattended wireless sensor networks","volume":"46","author":"jacques","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2687883"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-011-0147-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2013.054048"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2017.1336550"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2359333"},{"key":"ref24","first-page":"668","article-title":"A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks","author":"lpez","year":"2016","journal-title":"International Joint Conference SOCO16-CISIS16-ICEUTE16 Advances in Intelligent Systems and Computing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/129598"},{"key":"ref26","first-page":"96","article-title":"The stability of dynamical systems","author":"lasalle","year":"1976","journal-title":"CBMS-NSF Regional Conference Series in Applied Mathematics"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/S0025-5564(02)00108-6","article-title":"Reproduction numbers and subthreshold endemic equilibria for compartmental models of disease transmission","volume":"180","author":"driessche","year":"0","journal-title":"Mathematical Biosciences"}],"event":{"name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","start":{"date-parts":[[2019,2,23]]},"location":"Singapore","end":{"date-parts":[[2019,2,25]]}},"container-title":["2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8811523\/8821628\/08821631.pdf?arnumber=8821631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:21:43Z","timestamp":1657840903000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8821631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ccoms.2019.8821631","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}