{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:29:19Z","timestamp":1775068159627,"version":"3.50.1"},"reference-count":21,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T00:00:00Z","timestamp":1763769600000},"content-version":"vor","delay-in-days":325,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","award":["RGP2\/206\/46"],"award-info":[{"award-number":["RGP2\/206\/46"]}],"id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001823","name":"Ministerstvo \u0160kolstv\u00ed, Ml\u00e1de\u017ee a T\u011blov\u00fdchovy","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001823","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006443","name":"Vysok\u00e1 \u0160kola b\u00e1nsk\u00e1 - Technick\u00e1 Univerzita Ostrava","doi-asserted-by":"publisher","award":["SP2025\/049"],"award-info":[{"award-number":["SP2025\/049"]}],"id":[{"id":"10.13039\/501100006443","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020912","name":"King Faisal University","doi-asserted-by":"publisher","award":["KFU253628"],"award-info":[{"award-number":["KFU253628"]}],"id":[{"id":"10.13039\/501100020912","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Journal of Mathematics"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>According to the report of Statista, in 2023, the worldwide number of malware attacks reached 6.06 billion, an increase of 10 percent compared to the preceding year. In recent years, the highest number of malware attacks was detected in 2018, when 10.5 billion such attacks were reported across the globe. In the present study, to analyze the dynamics of viruses in the computer population, a delay tactics technique was used with the artificial decay parameters like different types of antivirus. The mathematical delayed model is designed with the whole computer population divided into subpopulations: susceptible, antidotal, exposed, infected, quarantined, and recovered. The fundamental properties of the newly developed model were studied rigorously like the positivity and boundedness of the results. Also, the two states discussed the computer population like computer virus\u2013free equilibrium (virus control in computer populations) and computer virus\u2013existing equilibrium (virus active to affect a computer population). Established concepts such as the Routh\u2013Hurwitz criterion and Lyapunov function stabilities for both states of the model at the local and global levels under certain assumptions of reproduction number. The simulation results support the theoretical analysis of the model and the best presentation of results in each computer subpopulation. Also, these results visualize the gaining virus capacity and controlling virus with the effective use of delay tactics including or without antivirus software.<\/jats:p>","DOI":"10.1155\/jom\/9971453","type":"journal-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T09:00:17Z","timestamp":1763802017000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Transmission Dynamics of Computer Virus Propagation Model Through Delay Effect Demonstration"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6443-9966","authenticated-orcid":false,"given":"Ali","family":"Raza","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3628-6795","authenticated-orcid":false,"given":"Eug\u00e9nio M.","family":"Rocha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6124-9043","authenticated-orcid":false,"given":"Mohammed Mahyoub","family":"Al-Shamiri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1742-585X","authenticated-orcid":false,"given":"Nauman","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2165-3479","authenticated-orcid":false,"given":"Muhammad","family":"Rafiq","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7059-405X","authenticated-orcid":false,"given":"Maysaa Elmahi","family":"Abd Elwahab","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9401-6481","authenticated-orcid":false,"given":"Emad","family":"Fadhal","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_2_15_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2016.10.028"},{"key":"e_1_2_15_2_2","first-page":"95","article-title":"Propagation of Computer Virus via a Modified Sira Model","volume":"2","author":"Achuba P. M.","year":"2017","journal-title":"Ilorin Journal of Computer Science and Information Technology"},{"key":"e_1_2_15_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2017.08.048"},{"key":"e_1_2_15_4_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13662-018-1672-1"},{"key":"e_1_2_15_5_2","first-page":"757","article-title":"Some Nonstandard Differential Models with Applications to Population Dynamics and Computer Virus Propagation","volume":"28","author":"Kyurkchiev N.","year":"2019","journal-title":"Dynamic Systems and Applications"},{"key":"e_1_2_15_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40314-023-02520-6"},{"key":"e_1_2_15_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.04.220"},{"key":"e_1_2_15_8_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.08595"},{"key":"e_1_2_15_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.122617"},{"key":"e_1_2_15_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2024.12.063"},{"key":"e_1_2_15_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12346-021-00516-3"},{"key":"e_1_2_15_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41980-021-00530-w"},{"key":"e_1_2_15_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113845"},{"key":"e_1_2_15_14_2","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/2075354"},{"key":"e_1_2_15_15_2","doi-asserted-by":"publisher","DOI":"10.1155\/ddns\/3107171"},{"key":"e_1_2_15_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40808-024-02270-2"},{"key":"e_1_2_15_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2024.111937"},{"key":"e_1_2_15_18_2","doi-asserted-by":"publisher","DOI":"10.1002\/asjc.3693"},{"key":"e_1_2_15_19_2","doi-asserted-by":"publisher","DOI":"10.1002\/mma.10721"},{"key":"e_1_2_15_20_2","first-page":"12","article-title":"Analysis of Computer Virus Propagation Based on Compartmental Model","volume":"7","author":"Shahrear P.","year":"2018","journal-title":"Applied and Computational Mathematics"},{"key":"e_1_2_15_21_2","unstructured":"https:\/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/."}],"container-title":["Journal of Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/jom\/9971453","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/jom\/9971453","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/jom\/9971453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T10:06:53Z","timestamp":1772964413000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/jom\/9971453"}},"subtitle":[],"editor":[{"given":"Ammar","family":"Alsinai","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/jom\/9971453"],"URL":"https:\/\/doi.org\/10.1155\/jom\/9971453","archive":["Portico"],"relation":{},"ISSN":["2314-4629","2314-4785"],"issn-type":[{"value":"2314-4629","type":"print"},{"value":"2314-4785","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-06-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9971453"}}