{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T16:01:05Z","timestamp":1760889665541},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/infcomw.2018.8406953","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T22:35:01Z","timestamp":1532385301000},"page":"21-26","source":"Crossref","is-referenced-by-count":4,"title":["A two layer model of malware propagation in a search engine context"],"prefix":"10.1109","author":[{"given":"Yijin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yuming","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Supeng","family":"Leng","sequence":"additional","affiliation":[]},{"given":"Yunkai","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Xiaosha","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Wormhole: The hidden virus propagation power of a search engine in social networks","author":"fu","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref11","article-title":"Sadi: A novel model to study the propagation of social worms in hierarchical networks","author":"wang","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.100830"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2375822"},{"key":"ref14","article-title":"Malware propagations in wireless ad hoc networks","author":"liu","year":"2016","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.006"},{"key":"ref16","article-title":"A markov random field framework for modeling malware propagation in complex communications networks","author":"karyotis","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320725"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/00107510500052444"},{"journal-title":"A First Course in Probability","year":"2002","author":"sheldon","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100913.00195"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.83"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.250"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2772787"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.115"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70230"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2455413"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.129"},{"journal-title":"SNAP Datasets Stanford large network dataset collection","year":"2014","author":"leskovec","key":"ref20"}],"event":{"name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2018,4,15]]},"location":"Honolulu, HI","end":{"date-parts":[[2018,4,19]]}},"container-title":["IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8401302\/8406774\/08406953.pdf?arnumber=8406953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:07:52Z","timestamp":1643209672000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2018.8406953","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}