{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:02Z","timestamp":1750308782406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,14]],"date-time":"2007-08-14T00:00:00Z","timestamp":1187049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,14]]},"DOI":"10.1145\/1577222.1577255","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T19:37:20Z","timestamp":1253907440000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards an analytic model of epidemic spreading in heterogeneous systems"],"prefix":"10.1145","author":[{"given":"Xiaohu","family":"Li","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio"}]},{"given":"T. Paul","family":"Parker","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio"}]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio"}]}],"member":"320","published-online":{"date-parts":[[2007,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Mathematical Theory of Infectious Diseases and Its Applications","author":"Bailey N.","year":"1975","unstructured":"N. Bailey . The Mathematical Theory of Infectious Diseases and Its Applications . 2 nd Edition. Griffin , London , 1975 . N. Bailey. The Mathematical Theory of Infectious Diseases and Its Applications. 2nd Edition. Griffin, London, 1975.","edition":"2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"A. Barabasi and R. Albert. Emergence of scaling in random networks. Science 286.  A. Barabasi and R. Albert. Emergence of scaling in random networks. Science 286.","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_3_2_1_3_1","volume-title":"Statistical Theory of Reliability and Life Testing. To Begin With","author":"Barlow R.","year":"1981","unstructured":"R. Barlow and F. Proschan . Statistical Theory of Reliability and Life Testing. To Begin With , Silver Spring, MD , 1981 . R. Barlow and F. Proschan. Statistical Theory of Reliability and Life Testing. To Begin With, Silver Spring, MD, 1981."},{"volume-title":"INFOCOM'03","author":"Chen Z.","key":"e_1_3_2_1_4_1","unstructured":"Z. Chen , L. Gao , and K. Kwiat . Modeling the spread of active worms . In INFOCOM'03 . Z. Chen, L. Gao, and K. Kwiat. Modeling the spread of active worms. In INFOCOM'03."},{"key":"e_1_3_2_1_5_1","unstructured":"A. Ganesh L. Massoulie and D. Towsley. The effect of network topology on the spread of epidemics. In Infocom'05.  A. Ganesh L. Massoulie and D. Towsley. The effect of network topology on the spread of epidemics. In Infocom'05 ."},{"volume-title":"IEEE Symposium on Security and Privacy'91","author":"Kephart J.","key":"e_1_3_2_1_6_1","unstructured":"J. Kephart and S. White . Directed-graph epidemiological models of computer viruses . In IEEE Symposium on Security and Privacy'91 . J. Kephart and S. White. Directed-graph epidemiological models of computer viruses. In IEEE Symposium on Security and Privacy'91."},{"volume-title":"IEEE Symposium on Security and Privacy'93","author":"Kephart J.","key":"e_1_3_2_1_7_1","unstructured":"J. Kephart and S. White . Measuring and modeling computer virus prevalence . In IEEE Symposium on Security and Privacy'93 . J. Kephart and S. White. Measuring and modeling computer virus prevalence. In IEEE Symposium on Security and Privacy'93."},{"volume-title":"MASCOTS'01","author":"Medina A.","key":"e_1_3_2_1_8_1","unstructured":"A. Medina , A. Lakhina , I. Matta , and J. Byers . Brite: An approach to universal topology generation . In MASCOTS'01 . A. Medina, A. Lakhina, I. Matta, and J. Byers. Brite: An approach to universal topology generation. In MASCOTS'01."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e20020122"},{"key":"e_1_3_2_1_10_1","unstructured":"R. Pastor-Satorras and A. Vespignani. Epidemics and immunization in scale-free networks. Handbook of Graphs and Networks: From the Genome to the Internet.  R. Pastor-Satorras and A. Vespignani. Epidemics and immunization in scale-free networks. Handbook of Graphs and Networks: From the Genome to the Internet ."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.63.066117"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.035108"},{"key":"e_1_3_2_1_13_1","series-title":"Wiley Series in Probability and Mathematical Statistics","volume-title":"Stochastic Processes","author":"Ross S.","year":"1996","unstructured":"S. Ross . Stochastic Processes . Wiley Series in Probability and Mathematical Statistics . John Wiley & amp; Sons, Inc, 1996 . S. Ross. Stochastic Processes. Wiley Series in Probability and Mathematical Statistics. John Wiley &amp; Sons, Inc, 1996."},{"key":"e_1_3_2_1_14_1","volume-title":"Stochastic Orders and Their Applications","author":"Shaked M.","year":"1994","unstructured":"M. Shaked and J. Shanthikumar . Stochastic Orders and Their Applications . Academic Press , San Diego (CA), 1994 . M. Shaked and J. Shanthikumar. Stochastic Orders and Their Applications. Academic Press, San Diego (CA), 1994."},{"volume-title":"USENIX Security Symposium'02","author":"Staniford S.","key":"e_1_3_2_1_15_1","unstructured":"S. Staniford , V. Paxson , and N. Weaver . How to own the internet in your spare time . In USENIX Security Symposium'02 . S. Staniford, V. Paxson, and N. Weaver. How to own the internet in your spare time. In USENIX Security Symposium'02."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1036921.1036926"},{"volume-title":"SRDS'03","author":"Wang Y.","key":"e_1_3_2_1_17_1","unstructured":"Y. Wang , D. Chakrabarti , C. Wang , and C. Faloutsos . Epidemic spreading in real networks: An eigenvalue viewpoint . In SRDS'03 . Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos. Epidemic spreading in real networks: An eigenvalue viewpoint. In SRDS'03."},{"volume-title":"Usenix Security Symposium'04","author":"Weaver N.","key":"e_1_3_2_1_18_1","unstructured":"N. Weaver , S. Staniford , and V. Paxson . Very fast containment of scanning worms . In Usenix Security Symposium'04 . N. Weaver, S. Staniford, and V. Paxson. Very fast containment of scanning worms. In Usenix Security Symposium'04."},{"volume-title":"NDSS'05","author":"Whyte D.","key":"e_1_3_2_1_19_1","unstructured":"D. Whyte , E. Kranakis , and P. van Oorschot . Dns-based detection of scanning worms in an enterprise network . In NDSS'05 . D. Whyte, E. Kranakis, and P. van Oorschot. Dns-based detection of scanning worms in an enterprise network. In NDSS'05."},{"volume-title":"IPTPS'05","author":"Zhou L.","key":"e_1_3_2_1_20_1","unstructured":"L. Zhou , L. Zhang , F. McSherry , N. Immorlica , M. Costa , and S Chien . An effective architecture and algorithm for detecting worms with various scan . In IPTPS'05 . L. Zhou, L. Zhang, F. McSherry, N. Immorlica, M. Costa, and S Chien. An effective architecture and algorithm for detecting worms with various scan. In IPTPS'05."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948136"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"}],"event":{"name":"QShine07: Heterogeneous Networking for Quality, Reliability, Security and Robustness","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGMM ACM Special Interest Group on Multimedia","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Vancouver Canada","acronym":"QShine07"},"container-title":["The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness &amp; Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1577222.1577255","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1577222.1577255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:44Z","timestamp":1750278164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1577222.1577255"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,14]]},"references-count":22,"alternative-id":["10.1145\/1577222.1577255","10.1145\/1577222"],"URL":"https:\/\/doi.org\/10.1145\/1577222.1577255","relation":{},"subject":[],"published":{"date-parts":[[2007,8,14]]},"assertion":[{"value":"2007-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}