{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:06:30Z","timestamp":1768435590674,"version":"3.49.0"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/tifs.2018.2838084","type":"journal-article","created":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T18:59:34Z","timestamp":1526669974000},"page":"3137-3152","source":"Crossref","is-referenced-by-count":19,"title":["Cyber-Threat Mitigation Exploiting the Birth\u2013Death\u2013Immigration Model"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2046-4027","authenticated-orcid":false,"given":"Vincenzo","family":"Matta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6574-2601","authenticated-orcid":false,"given":"Mario","family":"Di Mauro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8325-4003","authenticated-orcid":false,"given":"Maurizio","family":"Longo","sequence":"additional","affiliation":[]},{"given":"Alfonso","family":"Farina","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.es.09.110178.001543"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0025-5564(76)90105-X"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-51866-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70230"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320725"},{"key":"ref30","first-page":"149","article-title":"How to 0wn the Internet in your spare time","author":"staniford","year":"2002","journal-title":"Proc Usenix Secur Symp"},{"key":"ref37","first-page":"149","article-title":"Deterministic and stochastic epidemics in closed populations","volume":"4","author":"kendall","year":"1956","journal-title":"Proc Berkeley Symp on Math Statist and Prob"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2257765"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.mbs.2012.05.010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.03.052"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2399925"},{"key":"ref27","volume":"1","author":"kleinrock","year":"1975","journal-title":"Queueing Systems Theory"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498374"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2007335"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/35.1-2.6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"ref22","author":"bailey","year":"1964","journal-title":"The Elements of Stochastic Processes with Applications to the Natural Sciences"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9781119269540"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref23","author":"karyotis","year":"2016","journal-title":"Malware Diffusion Models for Modern Complex Networks Theory and Applications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2183642"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857113"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176343062"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/61.1.71"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731541"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730285"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2448061"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5320-4"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"3373","DOI":"10.1109\/TSP.2010.2044249","article-title":"Distributed detection of multi-hop information flows with fusion capacity constraints","volume":"58","author":"he","year":"2010","journal-title":"IEEE Trans Signal Process"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.03.015"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1981.tb00222.x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2227672"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2237397"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639361"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2325571"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2806742"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692685"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EUSIPCO.2016.7760651"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081594"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2012.2233193"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2415757"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-015-0796-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2257913"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.928537"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921660"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2013.866565"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929944"},{"key":"ref46","author":"malthus","year":"1798","journal-title":"An Essay on the Principle of Population"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2307\/3214975"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-4708-5","author":"gut","year":"2013","journal-title":"Probability A Graduate Course"},{"key":"ref47","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref42","author":"abramowitz","year":"1964","journal-title":"Handbook of Mathematical Functions"},{"key":"ref41","volume":"1","author":"johnson","year":"1994","journal-title":"Continuous Univariate Distributions"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2307\/3212691"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1007\/b97553","author":"shao","year":"2003","journal-title":"Mathematical Statistics"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8372863\/08361050.pdf?arnumber=8361050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T03:52:00Z","timestamp":1643169120000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8361050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":55,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2838084","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]}}}