{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:23:34Z","timestamp":1771662214676,"version":"3.50.1"},"reference-count":29,"publisher":"Zhejiang University Press","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1631\/fitee.2400236","type":"journal-article","created":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T02:26:07Z","timestamp":1757039167000},"page":"1637-1648","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Effect of terminal boundary protection on the spread of computer viruses: modeling and simulation","\u7ec8\u7aef\u8fb9\u754c\u9632\u62a4\u5bf9\u8ba1\u7b97\u673a\u75c5\u6bd2\u4f20\u64ad\u7684\u5f71\u54cd: \u5efa\u6a21\u4e0e\u4eff\u771f"],"prefix":"10.1631","volume":"26","author":[{"given":"Kai","family":"Gao","sequence":"first","affiliation":[]},{"given":"Lixin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yabing","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2179-0895","authenticated-orcid":false,"given":"Fuzhong","family":"Nian","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2025,9,5]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.033319"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102031"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6694098"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.2020000"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.2200314"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-842x.1988.tb00464.x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2023.102744"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2018.e00631"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/735327"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3934\/mfc.2022042"},{"issue":"3","key":"ref11","first-page":"56","article-title":"A study on friends model of a computer worm defense system","volume":"2","author":"Husain","year":"2015","journal-title":"Int. J Eng Appl Sci"},{"issue":"8","key":"ref12","first-page":"57","article-title":"Modeling and simulation of worm propagation and attacks against campus network","volume":"2","author":"Husain","year":"2015","journal-title":"Int J Eng Appl Sci"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2016.04.024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.9734\/jamcs\/2019\/v33i430182"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1186\/s13662-016-0899-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.111869"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.22624\/aims\/v4n1p15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/210291"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/srep05522"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1063\/1.4994893"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2016.1226499"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.01.026"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.3040247"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2019.2956860"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/259671"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2153195"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1063\/1.4896333"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2836865"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8814319"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2400236.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2400236\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2400236.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:46:22Z","timestamp":1771659982000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2400236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":29,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2066"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2400236","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"29 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}