{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:10:33Z","timestamp":1774541433290,"version":"3.50.1"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002546","name":"Sejong University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002546","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1016\/j.comnet.2024.110481","type":"journal-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T16:36:25Z","timestamp":1715186185000},"page":"110481","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"special_numbering":"C","title":["Delayed dynamics analysis of SEI2RS malware propagation models in cyber\u2013Physical systems"],"prefix":"10.1016","volume":"248","author":[{"given":"D.","family":"Nithya","sequence":"first","affiliation":[]},{"given":"V","family":"Madhusudanan","sequence":"additional","affiliation":[]},{"given":"B.S.N.","family":"Murthy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4541-3314","authenticated-orcid":false,"given":"R.","family":"Geetha","sequence":"additional","affiliation":[]},{"given":"Nguyen Xuan","family":"Mung","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1565-4376","authenticated-orcid":false,"given":"Nhu-Ngoc","family":"Dao","sequence":"additional","affiliation":[]},{"given":"Sungrae","family":"Cho","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2024.110481_bib0001","series-title":"Big Data Analytics For Cyber\u2013Physical Systems: Machine Learning For the Internet of Things","author":"Dartmann","year":"2019"},{"issue":"4","key":"10.1016\/j.comnet.2024.110481_bib0002","doi-asserted-by":"crossref","first-page":"1900","DOI":"10.1109\/TII.2016.2573762","article-title":"Data-centered runtime verification of wireless medical cyber\u2013physical system","volume":"13","author":"Jiang","year":"2016","journal-title":"IEEE Trans. Ind.Inf."},{"issue":"4","key":"10.1016\/j.comnet.2024.110481_bib0003","doi-asserted-by":"crossref","first-page":"5329","DOI":"10.1109\/JSYST.2020.2991258","article-title":"Brief survey on attack detection methods for cyber\u2013physical systems","volume":"14","author":"Tan","year":"2020","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.comnet.2024.110481_bib0004","series-title":"Cyber-Physical Systems: Foundations, Principles and Applications","first-page":"1","author":"Song","year":"2016"},{"key":"10.1016\/j.comnet.2024.110481_bib0005","series-title":"Security and Privacy in Cyber\u2013Physical Systems: Foundations, principles, and Applications","first-page":"1","author":"Song","year":"2021"},{"key":"10.1016\/j.comnet.2024.110481_bib0006","first-page":"1","article-title":"Sed droid: an enhanced stacking ensemble of deep learning framework for android malware detection","volume":"99","author":"Zhu","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.comnet.2024.110481_bib0007","first-page":"1","article-title":"Sama droid: a novel 3-level hybrid malware detection model for android operating system","author":"Arshad","year":"2018","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.comnet.2024.110481_bib0008","first-page":"3482","article-title":"Analysis of malware-induced cyber attacks in cyber\u2013physical power systems","volume":"67","author":"Xu","year":"2020","journal-title":"IEEE Trans. Circuits Syst. II"},{"issue":"3","key":"10.1016\/j.comnet.2024.110481_bib0009","doi-asserted-by":"crossref","first-page":"2061","DOI":"10.1007\/s11277-020-07959-y","article-title":"Optimal control of malware spreading model with tracing and patching in wireless sensor networks","volume":"117","author":"Muthu Krishnan","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comnet.2024.110481_bib0010","doi-asserted-by":"crossref","first-page":"92881","DOI":"10.1109\/ACCESS.2019.2927220","article-title":"SNIRD: disclosing rules of malware spread in heterogeneous wireless sensor networks","volume":"7","author":"Shen","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2024.110481_bib0011","first-page":"99","article-title":"Stochastic modeling of IoT botnet spread: a short survey on mobile malware spread modeling","author":"Mahboubi","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2024.110481_bib0012","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1007\/s11277-021-08955-6","article-title":"Smart city healthcare Cyber Physical System: characteristics technologies and challenges","volume":"122","author":"Verma","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comnet.2024.110481_bib0013","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11431-020-1838-6","article-title":"Human-cyber\u2013physical system for production and operation decision optimization in smart steel plants","volume":"65","author":"Zheng","year":"2022","journal-title":"Sci. China Technol. Sci."},{"issue":"1","key":"10.1016\/j.comnet.2024.110481_bib0014","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11277-023-10451-y","article-title":"Efect of delay in SMS worm propagation in mobile network with saturated incidence rate","volume":"131","author":"Zhang","year":"2023","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comnet.2024.110481_bib0015","doi-asserted-by":"crossref","first-page":"34968","DOI":"10.1109\/ACCESS.2023.3264978","article-title":"Analysis of delay-aware worm propagation model in wireless iot systems with ratio-dependent functional response","volume":"11","author":"Madhusudanan","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2024.110481_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.eij.2022.02.002","article-title":"Delay Modeling time. External noise and multiple malware infections in wireless sensor networks","author":"Nwokoye","year":"2022","journal-title":"Egyptian Inf J"},{"key":"10.1016\/j.comnet.2024.110481_bib0017","series-title":"Nonlinear System Analysis\u2014Lyapunov Based Approach; Intelligent Control Lecture Series","author":"Behera","year":"2003"},{"key":"10.1016\/j.comnet.2024.110481_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2022.111931","article-title":"Stability analysis and optimal control of rumor spreading model under media coverage considering time delay and pulse vaccination","volume":"157","author":"Cheng","year":"2022","journal-title":"Chaos Solit. Fract."},{"key":"10.1016\/j.comnet.2024.110481_bib0019","doi-asserted-by":"crossref","first-page":"2679","DOI":"10.1002\/rnc.4043","article-title":"Stability analysis and design of nonlinear sampled-data systems under aperiodic samplings","volume":"10","author":"Hooshmandi","year":"2018","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"10.1016\/j.comnet.2024.110481_bib0020","doi-asserted-by":"crossref","DOI":"10.1155\/2015\/637632","article-title":"New trends in nonlinear control systems and applications","author":"Liu","year":"2015","journal-title":"Abstr. Appl. Anal."},{"key":"10.1016\/j.comnet.2024.110481_bib0021","series-title":"Modelling and Control of Actuated Lower Limb Exoskeletons: A Mathematical Application Using Central Pattern Generators and Nonlinear Feedback Control Techniques; HAL Archives","author":"Ajayi","year":"2016"},{"key":"10.1016\/j.comnet.2024.110481_bib0022","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1016\/j.apm.2019.01.014","article-title":"A propagation model with defensive measures for PLC-PC worms in industrial networks","volume":"69","author":"Yao","year":"2019","journal-title":"Appl. Math. Model."},{"key":"10.1016\/j.comnet.2024.110481_bib0023","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.jocs.2017.05.011","article-title":"Modeling and validation of SMS worm propagation over social networks","volume":"21","author":"Xiao","year":"2017","journal-title":"J. Comput. Sci."},{"key":"10.1016\/j.comnet.2024.110481_bib0024","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.matcom.2021.05.027","article-title":"Exploring the behavior of malware propagation on mobile wireless sensor networks: stability and control analysis","volume":"190","author":"Kumari","year":"2021","journal-title":"Math. Comput. Simul."},{"key":"10.1016\/j.comnet.2024.110481_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2022.127207","article-title":"SEI2RS malware propagation model considering two infection rates in cyber\u2013physical systems","volume":"597","author":"Yu","year":"2022","journal-title":"Physica A"},{"key":"10.1016\/j.comnet.2024.110481_bib0026","doi-asserted-by":"crossref","first-page":"2047","DOI":"10.1007\/s11277-020-07668-6","article-title":"Dynamics of epidemic computer virus spreading model with Delays","volume":"115","author":"Madhusudanan","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comnet.2024.110481_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2021.111527","article-title":"Dynamics of a time-delayed two-strain epidemic model with general incidence rates","volume":"153","author":"Farah","year":"2021","journal-title":"Chaos Solit. Fract."},{"key":"10.1016\/j.comnet.2024.110481_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2020.110535","article-title":"Impact of leakage delay on bifurcation in fractional-order complex-valued neural networks","volume":"142","author":"Xu","year":"2021","journal-title":"Chaos Solit. Fract."},{"key":"10.1016\/j.comnet.2024.110481_bib0029","doi-asserted-by":"crossref","DOI":"10.1016\/j.rinp.2021.104090","article-title":"Hopf bifurcation analysis of SEIR-KS computer virus spreading model with two-delay","volume":"24","author":"Yang","year":"2021","journal-title":"Results Phys"},{"key":"10.1016\/j.comnet.2024.110481_bib0030","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.neunet.2019.05.002","article-title":"Novel bifurcation results for a delayed fractional-order quaternion-valued neural network","volume":"117","author":"Huang","year":"2019","journal-title":"Neural Netw"},{"key":"10.1016\/j.comnet.2024.110481_bib0031","series-title":"Theory And Applications of Hopf Bifurcation","author":"Hassard","year":"1981"},{"key":"10.1016\/j.comnet.2024.110481_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.rinp.2021.104181","article-title":"Dynamical analysis for a deterministic SVIRS epidemic model with Holling type II incidence rate and multiple delays","volume":"24","author":"Zhang","year":"2021","journal-title":"Results Phys."},{"key":"10.1016\/j.comnet.2024.110481_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.rinp.2022.105643","article-title":"Dynamic analysis of the e-SITR model for remote wireless sensor networks with noise and Sokol-Howell functional response","volume":"38","author":"Zhang","year":"2022","journal-title":"Results Phys."},{"key":"10.1016\/j.comnet.2024.110481_bib0034","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/s11277-020-08024-4","article-title":"Influence of clamor on the transmission of worms in remote sensor network","volume":"118","author":"Geetha","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.comnet.2024.110481_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2019.109483","article-title":"Stability and Hopf \u2013 bifurcation analysis of an SVEIR epidemic model with vaccination and multiple delays","volume":"131","author":"Zhang","year":"2020","journal-title":"Chaos Solit. Fract."},{"key":"10.1016\/j.comnet.2024.110481_bib0036","article-title":"Dynamical aspects of a delayed SEI2RS malware dissemination model in cyber\u2013physical systems","volume":"40","author":"Xiaodong","year":"2022","journal-title":"Results Phys."},{"key":"10.1016\/j.comnet.2024.110481_bib0037","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.106945","article-title":"An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks","volume":"165","author":"L\u00f3pez","year":"2019","journal-title":"Comput. Netw."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912862400313X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912862400313X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T11:35:56Z","timestamp":1717328156000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S138912862400313X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":37,"alternative-id":["S138912862400313X"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2024.110481","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Delayed dynamics analysis of SEI2RS malware propagation models in cyber\u2013Physical systems","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2024.110481","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"110481"}}