{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:15:40Z","timestamp":1775229340060,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/reldis.2003.1238052","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"25-34","source":"Crossref","is-referenced-by-count":367,"title":["Epidemic spreading in real networks: an eigenvalue viewpoint"],"prefix":"10.1109","author":[{"family":"Yang Wang","sequence":"first","affiliation":[]},{"given":"D.","family":"Chakrabarti","sequence":"additional","affiliation":[]},{"family":"Chenxi Wang","sequence":"additional","affiliation":[]},{"given":"C.","family":"Faloutsos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1002\/3527602755.ch5"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.035108"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.035101"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.63.066117"},{"key":"13","article-title":"On the eigenvalue power law","author":"mihail","year":"2002","journal-title":"RANDOM 2002"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e20020122"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1017\/S0013091500034428"},{"key":"12","article-title":"Brite: Universal topology generation from a user's perspective","volume":"bucs tr2001 3","author":"medina","year":"2001","journal-title":"Technical Report"},{"key":"21","first-page":"57","article-title":"Mining the network value of customers","author":"richardson","year":"2001","journal-title":"Proceedings of the International Conference on Knowledge Discovery and Data Mining"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.036104"},{"key":"22","article-title":"Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design","volume":"6","author":"ripeanu","year":"2002","journal-title":"IEEE Internet Computing Journal"},{"key":"23","article-title":"How to Own the internet in your spare time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"24","year":"1999","journal-title":"Melissa Macro Virus"},{"key":"25","year":"2001","journal-title":"Continued Threat of the \"Code Red\" Worm"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1109\/ACSAC.2000.898879","article-title":"On computer viral infection and the effect of immunization","author":"wang","year":"2000","journal-title":"Proceedings of the 16th ACM Annual Computer Security Applications Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.047104"},{"key":"2","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"emergence of scaling in random networks","volume":"286","author":"baraba?si","year":"1999","journal-title":"Science"},{"key":"10","author":"martin","year":"2002","journal-title":"The Virus Bulletin Independent Anti-virus Advice"},{"key":"1","author":"bailey","year":"1975","journal-title":"The Mathematical Theory of Infectious Diseases and Its Applications"},{"key":"7","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1109\/RISP.1991.130801","article-title":"Directed-graph epidemiological models of computer viruses","author":"kephart","year":"1991","journal-title":"Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/316194.316229","article-title":"On power-law relationship of the internet topology","author":"faloutsos","year":"1999","journal-title":"Proceedings of ACM SIGCOMM 1999"},{"key":"5","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"erdo?s","year":"1960","journal-title":"publication"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.055103"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00040-7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287647"}],"event":{"name":"22nd International Symposium on Reliable Distributed Systems","location":"Florence, Italy","acronym":"RELDIS-03"},"container-title":["22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8774\/27777\/01238052.pdf?arnumber=1238052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:05:28Z","timestamp":1497585928000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/reldis.2003.1238052","relation":{},"subject":[]}}