{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:25:39Z","timestamp":1730258739221,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/USG.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/icspcs47537.2019.9008687","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T09:47:20Z","timestamp":1582883240000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model"],"prefix":"10.1109","author":[{"given":"Jamie L.","family":"Safar","sequence":"first","affiliation":[]},{"given":"Murali","family":"Tummala","sequence":"additional","affiliation":[]},{"given":"John C.","family":"McEachen","sequence":"additional","affiliation":[]},{"given":"Chad","family":"Bollmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Contributions to the mathematical theory of epidemics","volume":"115","author":"kermark","year":"0","journal-title":"Proceedings of the Royal Society of London Series A"},{"journal-title":"Optimal control of epidemics in the presence of heterogeneity","year":"2015","author":"eshghi","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2250-7_16"},{"key":"ref13","first-page":"92","article-title":"Effect of quarantine vaccination on infectious nodes in computer network","volume":"2","author":"kumar","year":"2015","journal-title":"Journal of Network and Computer Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179555"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853425"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2013.07.037"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47560-8_5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2013.03.051"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2012.09.025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100913.00195"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/637241.637244"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1092186"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2364034"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2870641"},{"journal-title":"Passivity framework for modeling composing and mitigating cyber attacks","year":"2016","author":"lee","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.10.002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1186"},{"key":"ref9","first-page":"1","article-title":"Essai d’une nouvelle analyse de la mortalite causee par la petite verole et des avantages de l’inoculation pour la prevenir","author":"bernoulli","year":"1760","journal-title":"Histoire de l’Academie Royale des Sciences (Paris) Avec les Memoires de Mathematique et de Physique"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2009.06.011"},{"journal-title":"A stochastic modeling of coordinated internal and external attacks","year":"2007","author":"li","key":"ref21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14257\/ijast.2014.63.08"}],"event":{"name":"2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS)","start":{"date-parts":[[2019,12,16]]},"location":"Gold Coast, Australia","end":{"date-parts":[[2019,12,18]]}},"container-title":["2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8977248\/9008412\/09008687.pdf?arnumber=9008687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:17Z","timestamp":1658094917000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9008687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icspcs47537.2019.9008687","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}