{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T01:14:07Z","timestamp":1777598047846,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3323679.3326517","type":"proceedings-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T16:07:11Z","timestamp":1559664431000},"page":"191-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Transient Dynamics of Epidemic Spreading and Its Mitigation on Large Networks"],"prefix":"10.1145","author":[{"given":"Chul-Ho","family":"Lee","sequence":"first","affiliation":[{"name":"Florida Institute of Technology"}]},{"given":"Srinivas","family":"Tenneti","sequence":"additional","affiliation":[{"name":"Cisco Systems and North Carolina State University"}]},{"given":"Do Young","family":"Eun","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600613"},{"key":"e_1_3_2_1_2_1","volume-title":"Cisco: Enterprises Are Leading The Internet of Things Innovation. https:\/\/bit.ly\/2JJBHBA.","author":"Afshar V.","year":"2017","unstructured":"V. Afshar . 2017 . Cisco: Enterprises Are Leading The Internet of Things Innovation. https:\/\/bit.ly\/2JJBHBA. V. Afshar. 2017. Cisco: Enterprises Are Leading The Internet of Things Innovation. https:\/\/bit.ly\/2JJBHBA."},{"key":"e_1_3_2_1_3_1","volume-title":"Networks: A Topographic View. Complexus 3 (Aug","author":"Canright G. S.","year":"2006","unstructured":"G. S. Canright and K. Eng\u00f8-Monsen . 2006 . Spreading on Networks: A Topographic View. Complexus 3 (Aug 2006), 131--146. Issue 1-3. G. S. Canright and K. Eng\u00f8-Monsen. 2006. Spreading on Networks: A Topographic View. Complexus 3 (Aug 2006), 131--146. Issue 1-3."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"I. Carreras D. Miorandi G. S. Canright and K. Eng\u00f8-Monsen. 2007. Eigenvector Centrality in Highly Partitioned Mobile Networks: Principles and Applications. Springer Berlin Heidelberg.  I. Carreras D. Miorandi G. S. Canright and K. Eng\u00f8-Monsen. 2007. Eigenvector Centrality in Highly Partitioned Mobile Networks: Principles and Applications. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-72693-7_7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284681"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2903148"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2465378"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525861"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.115"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"M. Draief A. Ganesh and L. Massouli\u00e9. 2008. Thresholds for Virus Spread on Networks. Ann. Appl. Probab. 18 2 (04 2008) 359--378.  M. Draief A. Ganesh and L. Massouli\u00e9. 2008. Thresholds for Virus Spread on Networks. Ann. Appl. Probab. 18 2 (04 2008) 359--378.","DOI":"10.1214\/07-AAP470"},{"key":"e_1_3_2_1_11_1","first-page":"6","article-title":"Optimal Energy-Aware Epidemic Routing in DTNs","volume":"60","author":"Eshghi S.","year":"2015","unstructured":"S. Eshghi , M. H. R. Khouzani , S. Sarkar , N. B. Shroff , and S. S. Venkatesh . 2015 . Optimal Energy-Aware Epidemic Routing in DTNs . IEEE TAC 60 , 6 (June 2015), 1554--1569. S. Eshghi, M. H. R. Khouzani, S. Sarkar, N. B. Shroff, and S. S. Venkatesh. 2015. Optimal Energy-Aware Epidemic Routing in DTNs. IEEE TAC 60, 6 (June 2015), 1554--1569.","journal-title":"IEEE TAC"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2364034"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"E. Estrada and N. Hatano. 2008. Communicability in complex networks. Physical Review E 77 (Mar 2008) 036111. Issue 3.  E. Estrada and N. Hatano. 2008. Communicability in complex networks. Physical Review E 77 (Mar 2008) 036111. Issue 3.","DOI":"10.1103\/PhysRevE.77.036111"},{"key":"e_1_3_2_1_14_1","unstructured":"ETSI. 2011. ETSI -- TR 103 055. https:\/\/bit.ly\/2JZCeRu.  ETSI. 2011. ETSI -- TR 103 055. https:\/\/bit.ly\/2JZCeRu."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2280884"},{"key":"e_1_3_2_1_16_1","unstructured":"FireEye. {n.d.}. What is a Zero-Day Exploit? https:\/\/bit.ly\/2zNvFNb.  FireEye. {n.d.}. What is a Zero-Day Exploit? https:\/\/bit.ly\/2zNvFNb."},{"key":"e_1_3_2_1_17_1","volume-title":"The Effect of Network Topology on the Spread of Epidemics. In IEEE INFOCOM'05","author":"Ganesh A.","unstructured":"A. Ganesh , L. Massouli\u00e9 , and D. Towsley . 2005 . The Effect of Network Topology on the Spread of Epidemics. In IEEE INFOCOM'05 . A. Ganesh, L. Massouli\u00e9, and D. Towsley. 2005. The Effect of Network Topology on the Spread of Epidemics. In IEEE INFOCOM'05."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1971122.1971127"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958251"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463186"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxq009"},{"key":"e_1_3_2_1_23_1","unstructured":"D. Goodin. 2010. 'Clickjacking' worm hits hundreds of thousands on Facebook. https:\/\/bit.ly\/2DCTaNn.  D. Goodin. 2010. 'Clickjacking' worm hits hundreds of thousands on Facebook. https:\/\/bit.ly\/2DCTaNn."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"P. Holme B. J. Kim C. N. Yoon and S. K. Han. 2002. Attack vulnerability of complex networks. Physical Review E 65 (May 2002) 056109. Issue 5.  P. Holme B. J. Kim C. N. Yoon and S. K. Han. 2002. Attack vulnerability of complex networks. Physical Review E 65 (May 2002) 056109. Issue 5.","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031506"},{"key":"e_1_3_2_1_26_1","unstructured":"S. Kamkar. 2005. The MySpace Worm. https:\/\/samy.pl\/myspace\/.  S. Kamkar. 2005. The MySpace Worm. https:\/\/samy.pl\/myspace\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2361801"},{"key":"e_1_3_2_1_28_1","unstructured":"J. Kirk. 2013. Oil gas field sensors vulnerable to attack via radio waves. https:\/\/bit.ly\/2T0KGUy.  J. Kirk. 2013. Oil gas field sensors vulnerable to attack via radio waves. https:\/\/bit.ly\/2T0KGUy."},{"key":"e_1_3_2_1_29_1","unstructured":"M. Kumar. 2012. Serious Tumblr Cross Site Scripting Vulnerability can be used to Spread Worms. https:\/\/bit.ly\/2Di3ER9.  M. Kumar. 2012. Serious Tumblr Cross Site Scripting Vulnerability can be used to Spread Worms. https:\/\/bit.ly\/2Di3ER9."},{"key":"e_1_3_2_1_30_1","unstructured":"M. Kumar. 2013. Rodpicom Botnet spreading via Skype and MSN Messenger. https:\/\/bit.ly\/2OzrrOl.  M. Kumar. 2013. Rodpicom Botnet spreading via Skype and MSN Messenger. https:\/\/bit.ly\/2OzrrOl."},{"key":"e_1_3_2_1_31_1","unstructured":"Kaspersky Lab. {n. d.}. What Is the Koobface Virus? https:\/\/bit.ly\/2RSHjhd.  Kaspersky Lab. {n. d.}. What Is the Koobface Virus? https:\/\/bit.ly\/2RSHjhd."},{"key":"e_1_3_2_1_32_1","unstructured":"C.-D. Lai M. Xie and R. E. Barlow. 2006. Stochastic Ageing and Dependence for Reliability. Springer-Verlag New York Inc.   C.-D. Lai M. Xie and R. E. Barlow. 2006. Stochastic Ageing and Dependence for Reliability. Springer-Verlag New York Inc."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"C.-H.Lee S.Tenneti and D. Y. Eun. 2019. Transient Dynamics of Epidemic Spreading and Its Mitigation on Large Networks. Technical Report. https:\/\/arxiv.org\/abs\/1903.00167.  C.-H.Lee S.Tenneti and D. Y. Eun. 2019. Transient Dynamics of Epidemic Spreading and Its Mitigation on Large Networks. Technical Report. https:\/\/arxiv.org\/abs\/1903.00167.","DOI":"10.1145\/3323679.3326517"},{"key":"e_1_3_2_1_34_1","unstructured":"J. Leskovec and A. Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data\/.  J. Leskovec and A. Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data\/."},{"key":"e_1_3_2_1_35_1","volume-title":"Trickle: A Self-regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks. In USENIX NSDI'04","author":"Levis P.","unstructured":"P. Levis , N. Patel , D. Culler , and S. Shenker . 2004 . Trickle: A Self-regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks. In USENIX NSDI'04 . 15--28. P. Levis, N. Patel, D. Culler, and S. Shenker. 2004. Trickle: A Self-regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks. In USENIX NSDI'04. 15--28."},{"key":"e_1_3_2_1_36_1","volume-title":"Susceptible-infected-susceptible model: A comparison of N-intertwined and heterogeneous mean-field approximations. Physical Review E 86 (Aug","author":"Li C.","year":"2012","unstructured":"C. Li , R. van de Bovenkamp , and P. Van Mieghem . 2012. Susceptible-infected-susceptible model: A comparison of N-intertwined and heterogeneous mean-field approximations. Physical Review E 86 (Aug 2012 ), 026116. Issue 2. C. Li, R. van de Bovenkamp, and P. Van Mieghem. 2012. Susceptible-infected-susceptible model: A comparison of N-intertwined and heterogeneous mean-field approximations. Physical Review E 86 (Aug 2012), 026116. Issue 2."},{"key":"e_1_3_2_1_37_1","unstructured":"L. Lov\u00e1sz. 2007. Eigenvalues of graphs. http:\/\/web.cs.elte.hu\/%7Elovasz\/eigenvals-x.pdf.  L. Lov\u00e1sz. 2007. Eigenvalues of graphs. http:\/\/web.cs.elte.hu\/%7Elovasz\/eigenvals-x.pdf."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2016.06.007"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2017.09.002"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"K. Mekki E. Bajic F. Chaxel and F. Meyer. 2018. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express (2018).  K. Mekki E. Bajic F. Chaxel and F. Meyer. 2018. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express (2018).","DOI":"10.1016\/j.icte.2017.12.005"},{"key":"e_1_3_2_1_41_1","volume-title":"Matrix Analysis and Applied Linear Algebra","author":"Ed C. D.","unstructured":"C. D. Meyer( Ed .). 2000. Matrix Analysis and Applied Linear Algebra . Society for Industrial and Applied Mathematics . C. D. Meyer(Ed.). 2000. Matrix Analysis and Applied Linear Algebra. Society for Industrial and Applied Mathematics."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098254"},{"key":"e_1_3_2_1_43_1","first-page":"6","article-title":"Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes","volume":"12","author":"Newell A.","year":"2015","unstructured":"A. Newell , D. Obenshain , T. Tantillo , C. Nita-Rotaru , and Y. Amir . 2015 . Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes . IEEE TDSC 12 , 6 (Nov 2015), 602--614. A. Newell, D. Obenshain, T. Tantillo, C. Nita-Rotaru, and Y. Amir. 2015. Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. IEEE TDSC 12, 6 (Nov 2015), 602--614.","journal-title":"IEEE TDSC"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"e_1_3_2_1_45_1","first-page":"1","article-title":"Analysis and Control of Epidemics: A Survey of Spreading Processes on Complex Networks","volume":"36","author":"Nowzari C.","year":"2016","unstructured":"C. Nowzari , V. M. Preciado , and G. J. Pappas . 2016 . Analysis and Control of Epidemics: A Survey of Spreading Processes on Complex Networks . IEEE Control Systems 36 , 1 (Feb 2016), 26--46. C. Nowzari, V. M. Preciado, and G. J. Pappas. 2016. Analysis and Control of Epidemics: A Survey of Spreading Processes on Complex Networks. IEEE Control Systems 36, 1 (Feb 2016), 26--46.","journal-title":"IEEE Control Systems"},{"key":"e_1_3_2_1_46_1","volume-title":"Black Hat USA 2016 -- A Lightbulb Worm? https:\/\/www.blackhat.com\/us-16\/briefings.html#a-lightbulb-worm.","author":"O'Flynn C.","year":"2016","unstructured":"C. O'Flynn . 2016 . Black Hat USA 2016 -- A Lightbulb Worm? https:\/\/www.blackhat.com\/us-16\/briefings.html#a-lightbulb-worm. C. O'Flynn. 2016. Black Hat USA 2016 -- A Lightbulb Worm? https:\/\/www.blackhat.com\/us-16\/briefings.html#a-lightbulb-worm."},{"key":"e_1_3_2_1_47_1","unstructured":"R. Park. 2015. Guide to Zero-Day Exploits. https:\/\/www.symantec.com\/connect\/blogs\/guide-zero-day-exploits.  R. Park. 2015. Guide to Zero-Day Exploits. https:\/\/www.symantec.com\/connect\/blogs\/guide-zero-day-exploits."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"R. Pastor-Satorras and A. Vespignani. 2001. Epidemic dynamics and endemic states in complex networks. Physical Review E 63 (May 2001) 066117. Issue 6.  R. Pastor-Satorras and A. Vespignani. 2001. Epidemic dynamics and endemic states in complex networks. Physical Review E 63 (May 2001) 066117. Issue 6.","DOI":"10.1103\/PhysRevE.63.066117"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"R. Pastor-Satorras and A. Vespignani. 2001. Epidemic Spreading in Scale-Free Networks. Physical Review Letters 86 (Apr 2001) 3200--3203. Issue 14.  R. Pastor-Satorras and A. Vespignani. 2001. Epidemic Spreading in Scale-Free Networks. Physical Review Letters 86 (Apr 2001) 3200--3203. Issue 14.","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.145"},{"key":"e_1_3_2_1_51_1","volume-title":"IEEE CDC'13","author":"Preciado V. M.","unstructured":"V. M. Preciado , M. Zargham , C. Enyioha , A. Jadbabaie , and G. J. Pappas . 2013. Optimal vaccine allocation to control epidemic outbreaks in arbitrary networks . In IEEE CDC'13 . V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. J. Pappas. 2013. Optimal vaccine allocation to control epidemic outbreaks in arbitrary networks. In IEEE CDC'13."},{"key":"e_1_3_2_1_52_1","first-page":"1","article-title":"Optimal Resource Allocation for Network Protection Against Spreading Processes","volume":"1","author":"Preciado V. M.","year":"2014","unstructured":"V. M. Preciado , M. Zargham , C. Enyioha , A. Jadbabaie , and G. J. Pappas . 2014 . Optimal Resource Allocation for Network Protection Against Spreading Processes . IEEE TCNS 1 , 1 (Mar 2014), 99--108. V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. J. Pappas. 2014. Optimal Resource Allocation for Network Protection Against Spreading Processes. IEEE TCNS 1, 1 (Mar 2014), 99--108.","journal-title":"IEEE TCNS"},{"key":"e_1_3_2_1_53_1","unstructured":"P. Ramos. 2013. Chronology of a Skype attack. https:\/\/bit.ly\/2PlosP5.  P. Ramos. 2013. Chronology of a Skype attack. https:\/\/bit.ly\/2PlosP5."},{"key":"e_1_3_2_1_54_1","volume-title":"IoT Goes Nuclear: Creating a ZigBee Chain Reaction","author":"Ronen E.","unstructured":"E. Ronen , A. Shamir , A. O. Weingarten , and C. O'Flynn . 2017. IoT Goes Nuclear: Creating a ZigBee Chain Reaction . In IEEE S &P'17. E. Ronen, A. Shamir, A. O. Weingarten, and C. O'Flynn. 2017. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. In IEEE S&P'17."},{"key":"e_1_3_2_1_55_1","volume-title":"Stochastic Processes","author":"Ross S. M.","unstructured":"S. M. Ross . 1996. Stochastic Processes ( second ed.). John Wiley & Son . S. M. Ross. 1996. Stochastic Processes (second ed.). John Wiley & Son."},{"key":"e_1_3_2_1_56_1","unstructured":"N. A. Ruhi H. J. Ahn and B. Hassibi. 2016. Analysis of Exact and Approximated Epidemic Models over Complex Networks. https:\/\/arxiv.org\/abs\/1609.09565.  N. A. Ruhi H. J. Ahn and B. Hassibi. 2016. Analysis of Exact and Approximated Epidemic Models over Complex Networks. https:\/\/arxiv.org\/abs\/1609.09565."},{"key":"e_1_3_2_1_57_1","series-title":"SIAM SDM' 15.","volume-title":"Approximation Algorithms for Reducing the Spectral Radius to Control Epidemic Spread","author":"Saha S.","unstructured":"S. Saha , A. Adiga , B. A. Prakash , and A. K. S. Vullikanti . 2015. Approximation Algorithms for Reducing the Spectral Radius to Control Epidemic Spread . In SIAM SDM' 15. S. Saha, A. Adiga, B. A. Prakash, and A. K. S. Vullikanti. 2015. Approximation Algorithms for Reducing the Spectral Radius to Control Epidemic Spread. In SIAM SDM' 15."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"C. M. Schneider T. Mihaljev S. Havlin and H. J. Herrmann. 2011. Suppressing epidemics with a limited amount of immunization units. Physical Review E 84 (Dec 2011) 061911. Issue 6.  C. M. Schneider T. Mihaljev S. Havlin and H. J. Herrmann. 2011. Suppressing epidemics with a limited amount of immunization units. Physical Review E 84 (Dec 2011) 061911. Issue 6.","DOI":"10.1103\/PhysRevE.84.061911"},{"key":"e_1_3_2_1_59_1","unstructured":"Schneider Electric. 2013. ZigBee Technology: Setting Standards for Energy-Efficient Control Networks. https:\/\/bit.ly\/2QyvtID.  Schneider Electric. 2013. ZigBee Technology: Setting Standards for Energy-Efficient Control Networks. https:\/\/bit.ly\/2QyvtID."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925623"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"P. Van Mieghem D. Stevanovi\u0107 F. Kuipers C. Li R. van de Bovenkamp D. Liu and H. Wang. 2011. Decreasing the spectral radius of a graph by link removals. Physical Review E 84 (Jul 2011) 016101. Issue 1.  P. Van Mieghem D. Stevanovi\u0107 F. Kuipers C. Li R. van de Bovenkamp D. Liu and H. Wang. 2011. Decreasing the spectral radius of a graph by link removals. Physical Review E 84 (Jul 2011) 016101. Issue 1.","DOI":"10.1103\/PhysRevE.84.016101"},{"key":"e_1_3_2_1_62_1","volume-title":"Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. In International Symposium on Reliable Distributed Systems.","author":"Wang Y.","unstructured":"Y. Wang , D. Chakrabarti , C. Wang , and C. Faloutsos . 2003 . Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. In International Symposium on Reliable Distributed Systems. Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos. 2003. Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. In International Symposium on Reliable Distributed Systems."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966939"},{"key":"e_1_3_2_1_64_1","volume-title":"ASocial Network Based Patching Scheme for Worm Containment in Cellular Networks. In IEEE INFOCOM'09","author":"Zhu Z.","unstructured":"Z. Zhu , G. Cao , S. Zhu , S. Ranjan , and A. Nucci . 2009 . ASocial Network Based Patching Scheme for Worm Containment in Cellular Networks. In IEEE INFOCOM'09 . 1476--1484. Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci. 2009. ASocial Network Based Patching Scheme for Worm Containment in Cellular Networks. In IEEE INFOCOM'09. 1476--1484."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.1001"}],"event":{"name":"Mobihoc '19: The Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Catania Italy","acronym":"Mobihoc '19","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323679.3326517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:40Z","timestamp":1750206340000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":65,"alternative-id":["10.1145\/3323679.3326517","10.1145\/3323679"],"URL":"https:\/\/doi.org\/10.1145\/3323679.3326517","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}