{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T02:29:07Z","timestamp":1774060147746,"version":"3.50.1"},"reference-count":28,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T00:00:00Z","timestamp":1401753600000},"content-version":"vor","delay-in-days":153,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o Gulbenkian, through Pr\u00e9mio Gulbenkian de Apoio \u00e1 Investiga\u00e7\u00e3o 2003"},{"DOI":"10.13039\/501100007157","name":"Polytechnic of Porto","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007157","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Mathematical Problems in Engineering"],"published-print":{"date-parts":[[2014,1]]},"abstract":"<jats:p>We propose a fractional model for computer virus propagation. The model includes the interaction between computers and removable devices. We simulate numerically the model for distinct values of the order of the fractional derivative and for two sets of initial conditions adopted in the literature. We conclude that fractional order systems reveal richer dynamics than the classical integer order counterpart. Therefore, fractional dynamics leads to time responses with super\u2010fast transients and super\u2010slow evolutions towards the steady\u2010state, effects not easily captured by the integer order models.<\/jats:p>","DOI":"10.1155\/2014\/476502","type":"journal-article","created":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T21:05:06Z","timestamp":1401829506000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Fractional Dynamics of Computer Virus Propagation"],"prefix":"10.1155","volume":"2014","author":[{"given":"Carla M. A.","family":"Pinto","sequence":"first","affiliation":[]},{"given":"J. A.","family":"Tenreiro Machado","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2014,6,3]]},"reference":[{"key":"e_1_2_8_1_2","unstructured":"GordonL. A. LoebM. P. LucyshynW. andRichardsonR. 2005 CSI\/FBI crime and security survey Computer Security Institute 2005."},{"key":"e_1_2_8_2_2","doi-asserted-by":"crossref","unstructured":"DattaS.andHuiW. The effectiveness of vaccinations on the spread of email-borne computer viruses Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE \u203205) May 2005 Saskatoon Canada IEEE 219\u2013223 2-s2.0-33751345631 https:\/\/doi.org\/10.1109\/CCECE.2005.1556914.","DOI":"10.1109\/CCECE.2005.1556914"},{"key":"e_1_2_8_3_2","doi-asserted-by":"crossref","unstructured":"KephartJ. O.andWhiteS. R. Directed-graph epidemiological models of computer viruses Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy May 1991 343\u2013358 2-s2.0-0026156688.","DOI":"10.1109\/RISP.1991.130801"},{"key":"e_1_2_8_4_2","unstructured":"KephartJ. O.andWhiteS. R. Measuring and modeling computer virus prevalence Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy May 1993 2\u201315 2-s2.0-0027150413."},{"key":"e_1_2_8_5_2","doi-asserted-by":"crossref","unstructured":"GarettoM. GongW. andTowsleyD. Modeling malware spreading dynamics Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies April 2003 1869\u20131879 https:\/\/doi.org\/10.1109\/INFCOM.2003.1209209 2-s2.0-0042474229.","DOI":"10.1109\/INFCOM.2003.1209209"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857113"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2007.02.004"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.115"},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.12.010"},{"key":"e_1_2_8_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2012.04.092"},{"key":"e_1_2_8_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.nonrwa.2011.07.048"},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.05.030"},{"key":"e_1_2_8_13_2","volume-title":"The Fractional Calculus: Theory and Application of Differentiation and Integration to Arbitrary Order","author":"Oldham K. B.","year":"1974"},{"key":"e_1_2_8_14_2","volume-title":"Fractional Integrals and Derivatives: Theory and Applications","author":"Samko S. G.","year":"1993"},{"key":"e_1_2_8_15_2","volume-title":"An Introduction to the Fractional Calculus and Fractional Differential Equations","author":"Miller K. S.","year":"1993"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-0208(06)80001-0"},{"key":"e_1_2_8_17_2","series-title":"Mathematics in Science and Engineering","volume-title":"Fractional Differential Equations: An Introduction to Fractional Derivatives, Fractional Differential Equations, to Methods of Their Solution","author":"Podlubny I.","year":"1998"},{"key":"e_1_2_8_18_2","doi-asserted-by":"publisher","DOI":"10.1142\/p614"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14003-7"},{"key":"e_1_2_8_20_2","doi-asserted-by":"publisher","DOI":"10.1142\/8180"},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5388-7"},{"key":"e_1_2_8_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2009.03.004"},{"key":"e_1_2_8_23_2","first-page":"107","article-title":"Analysis and design of fractional-order digital control systems","volume":"27","author":"Machado J. A. T.","year":"1997","journal-title":"Systems Analysis Modelling Simulation"},{"key":"e_1_2_8_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.joems.2013.11.001"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2009.04.019"},{"key":"e_1_2_8_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(03)00190-7"},{"key":"e_1_2_8_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.11.007"},{"key":"e_1_2_8_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ygeno.2011.05.010"}],"container-title":["Mathematical Problems in Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/mpe\/2014\/476502.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/mpe\/2014\/476502.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2014\/476502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T07:25:23Z","timestamp":1735629923000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2014\/476502"}},"subtitle":[],"editor":[{"given":"Guido","family":"Maione","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["10.1155\/2014\/476502"],"URL":"https:\/\/doi.org\/10.1155\/2014\/476502","archive":["Portico"],"relation":{},"ISSN":["1024-123X","1563-5147"],"issn-type":[{"value":"1024-123X","type":"print"},{"value":"1563-5147","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1]]},"assertion":[{"value":"2014-04-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-05-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"476502"}}