{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:15:43Z","timestamp":1775229343279,"version":"3.50.1"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["CCR-0208853ANI-0326472IIS-0083148IIS-0209107IIS-0205224INT-0318547IIS-0326322CNS-0433540IIS-0534205"],"award-info":[{"award-number":["CCR-0208853ANI-0326472IIS-0083148IIS-0209107IIS-0205224INT-0318547IIS-0326322CNS-0433540IIS-0534205"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006227","name":"Lawrence Livermore National Laboratory, Office of Science","doi-asserted-by":"publisher","award":["W-7405-ENG-48"],"award-info":[{"award-number":["W-7405-ENG-48"]}],"id":[{"id":"10.13039\/100006227","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCR-0208853ANI-0326472IIS-0083148IIS-0209107IIS-0205224INT-0318547IIS-0326322CNS-0433540IIS-0534205"],"award-info":[{"award-number":["CCR-0208853ANI-0326472IIS-0083148IIS-0209107IIS-0205224INT-0318547IIS-0326322CNS-0433540IIS-0534205"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CCR-0208853ANI-0326472IIS-0083148IIS-0209107IIS-0205224INT-0318547IIS-0326322CNS-0433540IIS-0534205"],"award-info":[{"award-number":["CCR-0208853ANI-0326472IIS-0083148IIS-0209107IIS-0205224INT-0318547IIS-0326322CNS-0433540IIS-0534205"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2008,1]]},"abstract":"<jats:p>How will a virus propagate in a real network? How long does it take to disinfect a network given particular values of infection rate and virus death rate? What is the single best node to immunize? Answering these questions is essential for devising network-wide strategies to counter viruses. In addition, viral propagation is very similar in principle to the spread of rumors, information, and \u201cfads,\u201d implying that the solutions for viral propagation would also offer insights into these other problem settings. We answer these questions by developing a nonlinear dynamical system (<jats:italic>NLDS<\/jats:italic>) that accurately models viral propagation in any<jats:italic>arbitrary<\/jats:italic>network, including real and synthesized network graphs. We propose a general epidemic threshold condition for the<jats:italic>NLDS<\/jats:italic>system: we prove that the epidemic threshold for a network is exactly the inverse of the largest eigenvalue of its adjacency matrix. Finally, we show that below the epidemic threshold, infections die out at an exponential rate. Our epidemic threshold model subsumes many known thresholds for special-case graphs (e.g., Erd\u00f6s--R\u00e9nyi, BA powerlaw, homogeneous). We demonstrate the predictive power of our model with extensive experiments on real and synthesized graphs, and show that our threshold condition holds for arbitrary graphs. Finally, we show how to utilize our threshold condition for practical uses: It can dictate which nodes to immunize; it can assess the effects of a throttling policy; it can help us design network topologies so that they are more resistant to viruses.<\/jats:p>","DOI":"10.1145\/1284680.1284681","type":"journal-article","created":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T15:32:16Z","timestamp":1202484736000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":561,"title":["Epidemic thresholds in real networks"],"prefix":"10.1145","volume":"10","author":[{"given":"Deepayan","family":"Chakrabarti","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Jurij","family":"Leskovec","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2008,1]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Anderson R. M. and May R. M. 2002. Infectious diseases of humans: Dynamics and control. Oxford Press Oxford. Anderson R. M. and May R. M. 2002. Infectious diseases of humans: Dynamics and control. Oxford Press Oxford."},{"key":"e_1_2_1_2_1","volume-title":"The Mathematical Theory of Infectious Diseases and its Applications","author":"Bailey N.","unstructured":"Bailey , N. 1975. The Mathematical Theory of Infectious Diseases and its Applications . Griffin , London . Bailey, N. 1975. The Mathematical Theory of Infectious Diseases and its Applications. Griffin, London."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 16th ACM-SIAM Symposium on Discrete Algorithm (SODA)","author":"Berger N.","unstructured":"Berger , N. , Borgs , C. , Chayes , J. T. , and Saberi , A . 2005. On the spread of viruses in the internet . In Proceedings of the 16th ACM-SIAM Symposium on Discrete Algorithm (SODA) . Vancouver, BC, Canada. 301--310. Berger, N., Borgs, C., Chayes, J. T., and Saberi, A. 2005. On the spread of viruses in the internet. In Proceedings of the 16th ACM-SIAM Symposium on Discrete Algorithm (SODA). Vancouver, BC, Canada. 301--310."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.047104"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948200"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s000260300002"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0937490100"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.247901"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Eguiluz V. M. and Klemm K. 2002. Epidemic threshold in structured scale-free networks. arXiv:cond-mat\/02055439. Eguiluz V. M. and Klemm K. 2002. Epidemic threshold in structured scale-free networks. arXiv:cond-mat\/02055439.","DOI":"10.1103\/PhysRevLett.89.108701"},{"key":"e_1_2_1_11_1","unstructured":"Erd\u00f6s P. and R\u00e9nyi A. 1960. On the evolution of random graphs. In Publication 5. Institute of Mathematics Hungarian Academy of Sciences Hungary. 17--61. Erd\u00f6s P. and R\u00e9nyi A. 1960. On the evolution of random graphs. In Publication 5. Institute of Mathematics Hungarian Academy of Sciences Hungary. 17--61."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316229"},{"key":"e_1_2_1_13_1","unstructured":"Ganesh A. Massouli\u00e9 L. and Towsley D. 2005. The effect of network topology on the spread of epidemics. In INFOCOM. Ganesh A. Massouli\u00e9 L. and Towsley D. 2005. The effect of network topology on the spread of epidemics. In INFOCOM."},{"key":"e_1_2_1_14_1","unstructured":"Hayashi Y. Minoura M. and Matsukubo J. 2003. Recoverable prevalence in growing scale-free networks and the effective immunization. arXiv:cond-mat\/0305549 v2. Hayashi Y. Minoura M. and Matsukubo J. 2003. Recoverable prevalence in growing scale-free networks and the effective immunization. arXiv:cond-mat\/0305549 v2."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144500371907"},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Hethcote H. W. and Yorke J. A. 1984. Gonorrhea Transmission Dynamics and Control. Vol. 56. Springer. Lecture Notes in Biomathematics. Hethcote H. W. and Yorke J. A. 1984. Gonorrhea Transmission Dynamics and Control. Vol. 56. Springer. Lecture Notes in Biomathematics.","DOI":"10.1007\/978-3-662-07544-9"},{"key":"e_1_2_1_17_1","unstructured":"Hirsch M. W. and Smale S. 1974. Differential Equations Dynamical Systems and Linear Algebra. Academic Press New York. Hirsch M. W. and Smale S. 1974. Differential Equations Dynamical Systems and Linear Algebra. Academic Press New York."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy. 343--359","author":"Kephart J. O.","unstructured":"Kephart , J. O. and White , S. R . 1991. Directed-graph epidemiological models of computer viruses . In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy. 343--359 . Kephart, J. O. and White, S. R. 1991. Directed-graph epidemiological models of computer viruses. In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy. 343--359."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy. 2--15","author":"Kephart J. O.","unstructured":"Kephart , J. O. and White , S. R . 1993. Measuring and modeling computer virus prevalence . In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy. 2--15 . Kephart, J. O. and White, S. R. 1993. Measuring and modeling computer virus prevalence. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy. 2--15."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00040-7"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144599359449"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00119-8"},{"key":"e_1_2_1_23_1","unstructured":"Martin H. Ed. 2002. The Virus Bulletin: Independent Anti-Virus Advice. World Wide Web http:\/\/www.virusbtn.com. Ongoing. Martin H. Ed. 2002. The Virus Bulletin: Independent Anti-Virus Advice. World Wide Web http:\/\/www.virusbtn.com. Ongoing."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of Edin. Math. Society.","volume":"14","author":"McKendrick A. G.","year":"1926","unstructured":"McKendrick , A. G. 1926 . Applications of mathematics to medical problems . In Proceedings of Edin. Math. Society. Vol. 14 . 98--130. McKendrick, A. G. 1926. Applications of mathematics to medical problems. In Proceedings of Edin. Math. Society. Vol. 14. 98--130."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/859816"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e20020122"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.035101"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.63.066117"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.035108"},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Pastor-Satorras R. and Vespignani A. 2002b. Epidemics and immunization in scale-free networks. In Handbook of Graphs and Networks: From the Genome to the Internet S. Bornholdt and H. G. Schuster Eds. Wiley-VCH Berlin. Pastor-Satorras R. and Vespignani A. 2002b. Epidemics and immunization in scale-free networks. In Handbook of Graphs and Networks: From the Genome to the Internet S. Bornholdt and H. G. Schuster Eds. Wiley-VCH Berlin.","DOI":"10.1002\/3527602755.ch5"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978369"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 16th ACM Annual Computer Security Applications Conference.","author":"Wang C.","unstructured":"Wang , C. , Knight , J. C. , and Elder , M. C . 2000. On computer viral infection and the effect of immunization . In Proceedings of the 16th ACM Annual Computer Security Applications Conference. Wang, C., Knight, J. C., and Elder, M. C. 2000. On computer viral infection and the effect of immunization. In Proceedings of the 16th ACM Annual Computer Security Applications Conference."},{"key":"e_1_2_1_35_1","unstructured":"Wang Y. Chakrabarti D. Wang C. and Faloutsos C. 2003. Epidemic spreading in real networks: An eigenvalue viewpoint. In SRDS. Wang Y. Chakrabarti D. Wang C. and Faloutsos C. 2003. Epidemic spreading in real networks: An eigenvalue viewpoint. In SRDS."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1284680.1284681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1284680.1284681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:16Z","timestamp":1750258696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1284680.1284681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["10.1145\/1284680.1284681"],"URL":"https:\/\/doi.org\/10.1145\/1284680.1284681","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1]]},"assertion":[{"value":"2005-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2007-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}