{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T16:04:43Z","timestamp":1760889883816},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icc.2019.8761351","type":"proceedings-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:16:31Z","timestamp":1563236191000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["On Modeling Malware Propagation in Interest-Based Overlapping Communities"],"prefix":"10.1109","author":[{"given":"Yunkai","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yue","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Supeng","family":"Leng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2581305"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455413"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.83"},{"key":"ref13","first-page":"1","article-title":"Wormhole: The hidden virus propagation power of a search engine in social networks","author":"fu","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406953"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.100830"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2687918"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2453342"},{"article-title":"Qq group worm infects 20,000 computers one day","year":"2013","author":"center","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422244"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741145"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320725"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100913.00195"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817508"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2280884"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389824"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2520206"},{"key":"ref9","first-page":"1","article-title":"A markov random field framework for modeling malware propagation in complex communications networks","author":"karyotis","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"journal-title":"Epidemic Modelling An Introduction","year":"2001","key":"ref20"},{"article-title":"SNAP Datasets: Stanford large network dataset collection","year":"2014","author":"leskovec","key":"ref21"}],"event":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","start":{"date-parts":[[2019,5,20]]},"location":"Shanghai, China","end":{"date-parts":[[2019,5,24]]}},"container-title":["ICC 2019 - 2019 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8753818\/8761046\/08761351.pdf?arnumber=8761351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:13:57Z","timestamp":1657854837000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8761351\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2019.8761351","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}