{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T17:41:18Z","timestamp":1778002878533,"version":"3.51.4"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tnse.2024.3401081","type":"journal-article","created":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T17:35:46Z","timestamp":1715708146000},"page":"4758-4773","source":"Crossref","is-referenced-by-count":7,"title":["Automated Hubs-Patching: Protection Against Malware Spread Through Reduced Scale-Free Networks and External Storage Devices"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4432-6531","authenticated-orcid":false,"given":"Mohamed","family":"Essouifi","sequence":"first","affiliation":[{"name":"Condensed Matter Physics Team, Department of physics, Faculty of sciences, Abdelmalek Essa&#x00E2;di University, T&#x00E9;touan, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2528-2732","authenticated-orcid":false,"given":"Ahmed","family":"Lachgar","sequence":"additional","affiliation":[{"name":"Condensed Matter Physics Team, Department of physics, Faculty of sciences, Abdelmalek Essa&#x00E2;di University, T&#x00E9;touan, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9148-1350","authenticated-orcid":false,"given":"Madhusudanan","family":"Vasudevan","sequence":"additional","affiliation":[{"name":"Department of Mathematics, S.A. Engineering College, Chennai, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4232-350X","authenticated-orcid":false,"given":"Cheikhna","family":"B'ayir","sequence":"additional","affiliation":[{"name":"Condensed Matter Physics Team, Department of physics, Faculty of sciences, Abdelmalek Essa&#x00E2;di University, T&#x00E9;touan, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8974-8338","authenticated-orcid":false,"given":"Abdelfattah","family":"Achahbar","sequence":"additional","affiliation":[{"name":"Condensed Matter Physics Team, Department of physics, Faculty of sciences, Abdelmalek Essa&#x00E2;di University, T&#x00E9;touan, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7131-3755","authenticated-orcid":false,"given":"Jamal","family":"Elkhamkhami","sequence":"additional","affiliation":[{"name":"Condensed Matter Physics Team, Department of physics, Faculty of sciences, Abdelmalek Essa&#x00E2;di University, T&#x00E9;touan, Morocco"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Net losses: Estimating the global cost of cybercrime","author":"CSIS","year":"2014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/s1353-4858(19)30032-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7249\/rr2299"},{"issue":"1","key":"ref4","first-page":"63","article-title":"Cybersecurity indices and cybercrime annual loss and economic impacts","volume":"32","author":"Farahbod","year":"2020","journal-title":"J. Bus. Behav. Sci."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.07.032"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref7","article-title":"Obfuscation of stuxnet and flame malware","volume":"150","author":"Goyal","year":"2012","journal-title":"Latest Trends Appl. Inform. Comput."},{"key":"ref8","article-title":"Internet security threat report 2013","volume":"18","year":"2012"},{"key":"ref9","first-page":"1","article-title":"Computer worms: Past, present, and future","volume-title":"East Carolina Univ.","volume":"8","author":"Fosnock","year":"2005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/0894439306292346"},{"key":"ref11","article-title":"An analysis of confickers logic and rendezvous points","author":"Porras","year":"2009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5260\/cca.199373"},{"key":"ref13","first-page":"5","article-title":"Impact of the stuxnet virus on industrial control systems","volume-title":"Proc. XIII Int. Forum Modern Inf. Soc. Formation-Prob., Perspectives, Innov. Approaches","author":"Combs","year":"2012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.36"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/6.275061"},{"key":"ref16","first-page":"985","article-title":"Biologically inspired defenses against computer viruses","volume-title":"Proc. Int. Joint Conf. Artif. Intell.","author":"Kephart","year":"1995"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11631-5_20"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/106950"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.11.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.07.059"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183117501145"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2020.109353"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2012.10.027"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.09.038"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/info6030536"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6694098"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/nphys177"},{"key":"ref29","article-title":"On the use of intrusion technologies to distribute non-malicious programs to vulnerable computers","author":"Kara","year":"2001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844105"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.47"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103634"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"ref34","article-title":"Distributed interaction between computer virus and patch: A modeling study","author":"Yang","year":"2017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594130"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s19020262"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07959-y"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/896187"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2364034"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2015.7146207"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2003.817098"},{"key":"ref42","article-title":"The spread of internet worms and the optimal patch release strategies","volume-title":"Proc. Conf. Human Scale. 11th Amer. Conf. Inf. Syst.","author":"Han","year":"2005"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-0874-z"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.08.024"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0137858"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2016.10.028"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.08.085"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2885254"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2874446"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.04.192"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2315627"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9408942"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8859883"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8814319"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref57","first-page":"47","article-title":"Albert-lszlb","volume":"74","author":"Rka","year":"2002","journal-title":"Statist. Mechanics Complex Netw."},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1515\/9781400841356.507"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.63.062101"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2011.05.029"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.31.1.24"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088459-9\/50007-8"},{"key":"ref63","article-title":"Markovian and stochastic differential equation based approaches to computer virus propagation dynamics and some models for survival distributions","author":"Xu","year":"2011"},{"key":"ref64","article-title":"Hybrid epidemic spreading-from internet worms to HIV infection","author":"Zhang","year":"2015"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.86.066114"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865028"},{"key":"ref67","article-title":"The decline and fall of slammer?","author":"Gostev","year":"2011"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/10637788\/10530389.pdf?arnumber=10530389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T05:34:55Z","timestamp":1723786495000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10530389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":67,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2024.3401081","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}