{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:25:56Z","timestamp":1760059556721,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T00:00:00Z","timestamp":1750464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the National Natural Science Foundation of China","award":["62072111"],"award-info":[{"award-number":["62072111"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Axioms"],"abstract":"<jats:p>In this paper, we propose a new and fairly general network-based contagion dynamics model framework. In the model framework, each node in the network can be in one of multiple secure (or good) and infected (or bad) states. We characterize the dynamics of our model framework, by presenting the following: (i) a sufficient condition under which the dynamics are globally asymptotically stable; (ii) a sufficient condition under which the dynamics are locally asymptotically stable; and (iii) a sufficient condition for the persistence of bad states. Finally, we implemented three operations on the transition diagram. These three operations can help eliminate the bad states and help the model achieve the stability conditions.<\/jats:p>","DOI":"10.3390\/axioms14070487","type":"journal-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T07:42:34Z","timestamp":1750664554000},"page":"487","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Generalized Multistate Complex Network Contagion Dynamics Model and Its Stability"],"prefix":"10.3390","volume":"14","author":[{"given":"Yinchong","family":"Wang","sequence":"first","affiliation":[{"name":"School of Mathematical Sciences, Fudan University, 220 Handan Road, Shanghai 200433, China"}]},{"given":"Wenlian","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Fudan University, 220 Handan Road, Shanghai 200433, China"}]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Colorado Colorado Springs, 1420 Austin Bluffs Pkwy, Colorado Springs, CO 80918, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,21]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Epstein, J.M., Parker, J., Cummings, D., and Hammond, R.A. (2008). Coupled contagion dynamics of fear and disease: Mathematical and computational explorations. PLoS ONE, 3.","key":"ref_1","DOI":"10.1371\/journal.pone.0003955"},{"unstructured":"Wang, Y., Chakrabarti, D., Wang, C., and Faloutsos, C. (2003, January 6\u20138). Epidemic spreading in real networks: An eigenvalue viewpoint. Proceedings of the 22nd International Symposium on Reliable Distributed Systems, Florence, Italy.","key":"ref_2"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/TNET.2019.2912847","article-title":"Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent","volume":"27","author":"Lin","year":"2019","journal-title":"IEEE\/ACM ToN"},{"key":"ref_4","first-page":"2517","article-title":"Preventive and Reactive Cyber Defense Dynamics with Ergodic Time-dependent Parameters Is Globally Attractive","volume":"8","author":"Han","year":"2021","journal-title":"IEEE TNSE"},{"doi-asserted-by":"crossref","unstructured":"Zheng, R., Lu, W., and Xu, S. (2015, January 21\u201322). Active Cyber Defense Dynamics Exhibiting Rich Phenomena. Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, Urbana, IL, USA.","key":"ref_5","DOI":"10.1145\/2746194.2746196"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/15427951.2013.830583","article-title":"A Stochastic Model of Active Cyber Defense Dynamics","volume":"11","author":"Xu","year":"2015","journal-title":"Internet Math."},{"doi-asserted-by":"crossref","unstructured":"Anderson, R.M., and May, R.M. (1991). Infectious Diseases of Humans: Dynamics and Control, Oxford University Press.","key":"ref_7","DOI":"10.1093\/oso\/9780198545996.001.0001"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1109\/JSTSP.2014.2314858","article-title":"Diffusion in social networks as SIS epidemics: Beyond full mixing and complete graphs","volume":"8","author":"Zhang","year":"2014","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1109\/TCNS.2022.3145748","article-title":"On a networked SIS epidemic model with cooperative and antagonistic opinion dynamics","volume":"9","author":"She","year":"2022","journal-title":"IEEE Trans. Control. Netw. Syst."},{"doi-asserted-by":"crossref","unstructured":"Huang, J., Ma, X., Wu, H., Awuxi, H., Zhang, X., Chen, Y., Alitengsaier, N., and Li, Q. (2025). Retrospective study on the epidemiological characteristics of multi-pathogen infections of hospitalized severe acute respiratory tract infection and influenza-like illness in Xinjiang from January to May 2024. BMC Infect. Dis., 25.","key":"ref_10","DOI":"10.1186\/s12879-025-10654-7"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100","DOI":"10.2478\/ijanmc-2024-0010","article-title":"Securing operating systems (OS): A comprehensive approach to security with best practices and techniques","volume":"9","author":"Akhtar","year":"2024","journal-title":"Int. J. Adv. Network, Monit. Control."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/S0167-4048(97)88131-X","article-title":"Possible macro virus attacks and how to prevent them","volume":"15","author":"Bontchev","year":"1996","journal-title":"Comput. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.procs.2015.04.126","article-title":"Network security and types of attacks in network","volume":"48","author":"Pawar","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1057\/s41288-022-00266-6","article-title":"Cyber risk and cybersecurity: A systematic review of data availability","volume":"47","author":"Cremer","year":"2022","journal-title":"Geneva Pap. Risk Insur. Issues Pract."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/0025-5564(95)92756-5","article-title":"Global stability for the SEIR model in epidemiology","volume":"125","author":"Li","year":"1995","journal-title":"Math. Biosci."},{"doi-asserted-by":"crossref","unstructured":"Par\u00e9, P.E., Vrabac, D., Sandberg, H., and Johansson, K.H. (2020, January 1\u20133). Analysis, Online Estimation, and Validation of a Competing Virus Model. Proceedings of the 2020 American Control Conference (ACC), Denver, CO, USA.","key":"ref_16","DOI":"10.23919\/ACC45564.2020.9147568"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"110394","DOI":"10.1016\/j.chaos.2020.110394","article-title":"SEAIR Epidemic spreading model of COVID-19","volume":"142","author":"Basnarkov","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TDSC.2011.33","article-title":"A Stochastic Model of Multivirus Dynamics","volume":"9","author":"Xu","year":"2012","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"doi-asserted-by":"crossref","unstructured":"Prakash, B.A., Chakrabarti, D., Faloutsos, M., Valler, N., and Faloutsos, C. (2011, January 11\u201314). Threshold Conditions for Arbitrary Cascade Models on Arbitrary Networks. Proceedings of the 2011 IEEE 11th International Conference on Data Mining, Vancouver, BC, Canada.","key":"ref_19","DOI":"10.1109\/ICDM.2011.145"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1109\/TNET.2013.2239658","article-title":"Generalized epidemic mean-field model for spreading processes over multilayer complex networks","volume":"21","author":"Sahneh","year":"2013","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"255","DOI":"10.2307\/3620310","article-title":"Introduction to applied nonlinear dynamical systems and chaos, by S Wiggins. Pp 672. DM98.00. 1990. ISBN 3-540-9703-7 (Springer)","volume":"75","author":"Brandon","year":"1991","journal-title":"Math. Gaz."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"485","DOI":"10.2307\/3612451","article-title":"Ordinary Differential Equations. By Jack K. Hale. Pp. xvi, 332. 1969. (Wiley-Interscience)","volume":"55","author":"Green","year":"1971","journal-title":"Math. Gaz."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1137\/10081856X","article-title":"A stochastic differential equation SIS epidemic model","volume":"71","author":"Gray","year":"2011","journal-title":"SIAM J. Appl. Math."},{"key":"ref_24","first-page":"156","article-title":"Preventive and Reactive Cyber Defense Dynamics Is Globally Stable","volume":"5","author":"Zheng","year":"2018","journal-title":"IEEE TNSE"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"044308","DOI":"10.1103\/PhysRevE.110.044308","article-title":"Finding patient zero in susceptible-infectious-susceptible epidemic processes","volume":"110","author":"Persoons","year":"2024","journal-title":"Phys. Rev. E"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1284680.1284681","article-title":"Epidemic thresholds in real networks","volume":"10","author":"Chakrabarti","year":"2008","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TNET.2008.925623","article-title":"Virus Spread in Networks","volume":"17","author":"Omic","year":"2009","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s00607-011-0155-y","article-title":"The N-intertwined SIS epidemic network model","volume":"93","author":"Mieghem","year":"2011","journal-title":"Computing"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2348832.2348835","article-title":"Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights","volume":"7","author":"Xu","year":"2012","journal-title":"ACM TAAS"},{"unstructured":"Xu, S. (2022, January 7). The Cybersecurity Dynamics Way of Thinking and Landscape (invited paper). Proceedings of the ACM Workshop on Moving Target Defense, Los Angeles, CA, USA.","key":"ref_30"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"109330","DOI":"10.1016\/j.automatica.2020.109330","article-title":"Multi-competitive viruses over time-varying networks with mutations and human awareness","volume":"123","author":"Liu","year":"2021","journal-title":"Automatica"},{"doi-asserted-by":"crossref","unstructured":"Chakrabarti, D., Leskovec, J., Faloutsos, C., Madden, S., Guestrin, C., and Faloutsos, M. (2007, January 6\u201312). Information Survival Threshold in Sensor and P2P Networks. Proceedings of the IEEE INFOCOM 2007\u201426th IEEE International Conference on Computer Communications, Anchorage, AK, USA.","key":"ref_32","DOI":"10.1109\/INFCOM.2007.156"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1088\/0951-7715\/9\/3\/006","article-title":"From attractor to chaotic saddle: A tale of transverse instability","volume":"9","author":"Ashwin","year":"1996","journal-title":"Nonlinearity"},{"unstructured":"Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., and Thomas, C.B. (2018). Mitre Att&CK: Design and Philosophy, The MITRE Corporation. Technical Report.","key":"ref_34"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"16","DOI":"10.36965\/OJAKM.2017.5(2)16-28","article-title":"Cybersecurity skills: Foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation","volume":"5","author":"Carlton","year":"2017","journal-title":"Online J. Appl. Knowl. Manag. (OJAKM)"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/TNET.2014.2364034","article-title":"Optimal patching in clustered epidemics of malware","volume":"24","author":"Eshghi","year":"2015","journal-title":"IEEE Trans. Netw."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1109\/JAS.2020.1003527","article-title":"Using event-based method to estimate cybersecurity equilibrium","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE\/CAA J. Autom. Sin."},{"doi-asserted-by":"crossref","unstructured":"Horn, R.A., and Johnson, C.R. (2012). Matrix Analysis, Cambridge University Press. [2nd ed.].","key":"ref_38","DOI":"10.1017\/CBO9781139020411"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"046112","DOI":"10.1103\/PhysRevE.81.046112","article-title":"Approximating spectral impact of structural perturbations in large networks","volume":"81","author":"Milanese","year":"2010","journal-title":"Phys. Rev. E"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1017\/S0013091500012104","article-title":"J. H. Wilkinson, The Algebraic Eigenvalue Problem (Clarendon Press, Oxford, 1965), 662pp., 110s","volume":"15","author":"Mitchell","year":"1967","journal-title":"Proc. Edinb. Math. Soc."},{"doi-asserted-by":"crossref","unstructured":"Shilnikov, L.P., Shilnikov, A.L., Turaev, D.V., and Chua, L.O. (2001). Methods of Qualitative Theory in Nonlinear Dynamics: (Part II), World Scientific.","key":"ref_41","DOI":"10.1142\/9789812798558"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1137\/0713041","article-title":"A Constructive Proof of the Brouwer Fixed-Point Theorem and Computational Results","volume":"13","author":"Kellogg","year":"1976","journal-title":"SIAM J. Numer. Anal."}],"container-title":["Axioms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2075-1680\/14\/7\/487\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:56:26Z","timestamp":1760032586000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2075-1680\/14\/7\/487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,21]]},"references-count":42,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["axioms14070487"],"URL":"https:\/\/doi.org\/10.3390\/axioms14070487","relation":{},"ISSN":["2075-1680"],"issn-type":[{"type":"electronic","value":"2075-1680"}],"subject":[],"published":{"date-parts":[[2025,6,21]]}}}