<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD Journal Publishing DTD v3.0 20080202//EN" "http://dtd.nlm.nih.gov/publishing/3.0/journalpublishing3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="nlm-ta">PLoS ONE</journal-id>
      <journal-id journal-id-type="publisher-id">plos</journal-id>
      <journal-id journal-id-type="pmc">plosone</journal-id>
      <journal-title-group>
        <journal-title>PLoS ONE</journal-title>
      </journal-title-group>
      <issn pub-type="epub">1932-6203</issn>
      <publisher>
        <publisher-name>Public Library of Science</publisher-name>
        <publisher-loc>San Francisco, USA</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">PONE-D-12-13239</article-id>
      <article-id pub-id-type="doi">10.1371/journal.pone.0059468</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="Discipline-v2">
          <subject>Biology</subject>
          <subj-group>
            <subject>Computational biology</subject>
            <subj-group>
              <subject>Population modeling</subject>
              <subj-group>
                <subject>Infectious disease modeling</subject>
              </subj-group>
            </subj-group>
          </subj-group>
          <subj-group>
            <subject>Population biology</subject>
            <subj-group>
              <subject>Epidemiology</subject>
              <subj-group>
                <subject>Social epidemiology</subject>
              </subj-group>
            </subj-group>
          </subj-group>
        </subj-group>
        <subj-group subj-group-type="Discipline-v2">
          <subject>Computer science</subject>
          <subj-group>
            <subject>Computer applications</subject>
          </subj-group>
          <subj-group>
            <subject>Computer modeling</subject>
          </subj-group>
          <subj-group>
            <subject>Computer security</subject>
          </subj-group>
        </subj-group>
        <subj-group subj-group-type="Discipline-v2">
          <subject>Engineering</subject>
          <subj-group>
            <subject>Electrical engineering</subject>
            <subj-group>
              <subject>Communications</subject>
            </subj-group>
          </subj-group>
        </subj-group>
        <subj-group subj-group-type="Discipline-v2">
          <subject>Mathematics</subject>
          <subj-group>
            <subject>Discrete mathematics</subject>
            <subj-group>
              <subject>Combinatorics</subject>
              <subject>Computational systems</subject>
            </subj-group>
          </subj-group>
          <subj-group>
            <subject>Mathematical computing</subject>
          </subj-group>
        </subj-group>
        <subj-group subj-group-type="Discipline-v2">
          <subject>Medicine</subject>
          <subj-group>
            <subject>Epidemiology</subject>
            <subj-group>
              <subject>Disease informatics</subject>
              <subject>Social epidemiology</subject>
            </subj-group>
          </subj-group>
        </subj-group>
        <subj-group subj-group-type="Discipline-v2">
          <subject>Social and behavioral sciences</subject>
          <subj-group>
            <subject>Communications</subject>
          </subj-group>
          <subj-group>
            <subject>Sociology</subject>
            <subj-group>
              <subject>Social networks</subject>
            </subj-group>
          </subj-group>
        </subj-group>
        <subj-group subj-group-type="Discipline">
          <subject>Public Health and Epidemiology</subject>
          <subject>Computational Biology</subject>
          <subject>Computer Science</subject>
          <subject>Mathematics</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>A Combinatorial Model of Malware Diffusion via Bluetooth Connections</article-title>
        <alt-title alt-title-type="running-head">A Model of Bluetooth Malware Diffusion</alt-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author" xlink:type="simple">
          <name name-style="western">
            <surname>Merler</surname>
            <given-names>Stefano</given-names>
          </name>
          <xref ref-type="aff" rid="aff1"/>
        </contrib>
        <contrib contrib-type="author" xlink:type="simple">
          <name name-style="western">
            <surname>Jurman</surname>
            <given-names>Giuseppe</given-names>
          </name>
          <xref ref-type="aff" rid="aff1"/>
          <xref ref-type="corresp" rid="cor1">
            <sup>*</sup>
          </xref>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <addr-line>Fondazione Bruno Kessler, Trento, Italy</addr-line>
      </aff>
      <contrib-group>
        <contrib contrib-type="editor" xlink:type="simple">
          <name name-style="western">
            <surname>Colizza</surname>
            <given-names>Vittoria</given-names>
          </name>
          <role>Editor</role>
          <xref ref-type="aff" rid="edit1"/>
        </contrib>
      </contrib-group>
      <aff id="edit1">
        <addr-line>INSERM &amp; Universite Pierre et Marie Curie, France</addr-line>
      </aff>
      <author-notes>
        <corresp id="cor1">* E-mail: <email xlink:type="simple">jurman@fbk.eu</email></corresp>
        <fn fn-type="conflict">
          <p>The authors have declared that no competing interests exist.</p>
        </fn>
        <fn fn-type="con">
          <p>Conceived and designed the experiments: SM GJ. Performed the experiments: SM GJ. Analyzed the data: SM GJ. Contributed reagents/materials/analysis tools: SM GJ. Wrote the paper: SM GJ.</p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2013</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>21</day>
        <month>3</month>
        <year>2013</year>
      </pub-date>
      <volume>8</volume>
      <issue>3</issue>
      <elocation-id>e59468</elocation-id>
      <history>
        <date date-type="received">
          <day>7</day>
          <month>5</month>
          <year>2012</year>
        </date>
        <date date-type="accepted">
          <day>18</day>
          <month>2</month>
          <year>2013</year>
        </date>
      </history>
      <permissions>
        <copyright-year>2013</copyright-year>
        <copyright-holder>Merler, Jurman</copyright-holder>
        <license xlink:type="simple">
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
        </license>
      </permissions>
      <abstract>
        <p>We outline here the mathematical expression of a diffusion model for cellphones malware transmitted through Bluetooth channels. In particular, we provide the deterministic formula underlying the proposed infection model, in its equivalent recursive (simple but computationally heavy) and closed form (more complex but efficiently computable) expression.</p>
      </abstract>
      <funding-group>
        <funding-statement>The authors acknowledge funding by the EU FP7 Project EPIWORK. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript</funding-statement>
      </funding-group>
      <counts>
        <page-count count="12"/>
      </counts>
    </article-meta>
  </front>
  <body>
    <sec id="s1">
      <title>Introduction</title>
      <p>The spreading of malware, <italic>i.e.</italic>, malicious self-replicating codes, has rapidly grown in the last few years, becoming a substantial threat to the wireless devices, and mobile (smart)phones represent nowadays the most appetible present and future target. Papers studying the problem from both theoretical and technical points of view already appeared in literature since 2005 <xref ref-type="bibr" rid="pone.0059468-Wang1">[1]</xref>–<xref ref-type="bibr" rid="pone.0059468-Ghallali2">[9]</xref>, and nowadays a number of different approaches to modeling the virus diffusion are already available to the community. With the present work we want to contribute to this topic by proposing a more accurate model for the spread of a malware through the Bluetooth channel, providing both a recursive and a combinatorial equivalent deterministic formulation of the described solution.</p>
      <sec id="s1a">
        <title>The Model</title>
        <p>The dynamics of the proposed model is the following: at a certain time <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e001" xlink:type="simple"/></inline-formula>, a number <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e002" xlink:type="simple"/></inline-formula> of infected mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e003" xlink:type="simple"/></inline-formula> come in contact with a number <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e004" xlink:type="simple"/></inline-formula> of clean (non-infected) cellphones <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e005" xlink:type="simple"/></inline-formula>; hereafter we will denote this configuration as <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e006" xlink:type="simple"/></inline-formula>.</p>
        <p>All <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e007" xlink:type="simple"/></inline-formula> telephones are in the Bluetooth transmission range of each other and they all have their Bluetooth device on. Each infected mobile tries to establish a connection with another device, clearly not knowing whether it is trying to pair to a clean or to an infected phone. All these connections are established instantaneously at time <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e008" xlink:type="simple"/></inline-formula>. However, for the sake of simplicity we assume that the infected mobiles establish connections following a given sequence, starting from <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e009" xlink:type="simple"/></inline-formula> down to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e010" xlink:type="simple"/></inline-formula>. In other words, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e011" xlink:type="simple"/></inline-formula> is the first to try to establish a connection, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e012" xlink:type="simple"/></inline-formula> is the last one. Moreover, each connection is chosen uniformly at random among all possible available choices. Connections between infected and clean mobiles deterministically result in infection transmission: when a clean mobile gets paired to an infected one, it becomes infected. All these events occur in the time interval <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e013" xlink:type="simple"/></inline-formula>, where <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e014" xlink:type="simple"/></inline-formula> is the minimal time allowing all infected mobiles to establish a connection and eventually transmit the virus: in practice, it may be considered of the order of a few tens of seconds. We assume that in this time interval clean cellphones do not try to establish any connections, <italic>e.g.</italic>, for non-malware purposes. We also assume that in this time interval no other mobile enters the Bluetooth transmission range of the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e015" xlink:type="simple"/></inline-formula> mobiles and, when a connection between two mobiles is established, the two mobiles remain connected for the whole time interval. Basically, we are assuming that the initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e016" xlink:type="simple"/></inline-formula> is given and it does not change in the time interval <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e017" xlink:type="simple"/></inline-formula>. Note that, given the definition of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e018" xlink:type="simple"/></inline-formula>, new infections do not result in configuration changes in the time interval <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e019" xlink:type="simple"/></inline-formula>.</p>
        <p>All the aforementioned assumptions are reasonably realistic, due to the very short time-scale considered.</p>
        <p>The task here is to discover the probability that, in this situation, a given clean mobile gets paired to an infected one, and thus it becomes itself infected.</p>
        <p>Summarizing, the setup and the constraints of the model are the following:</p>
      </sec>
      <sec id="s1b">
        <title>Setup</title>
        <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e020" xlink:type="simple"/></inline-formula> infected mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e021" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e022" xlink:type="simple"/></inline-formula> clean mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e023" xlink:type="simple"/></inline-formula> are in a room (<italic>i.e.</italic>, in the Bluetooth transmission range of each other).</p>
      </sec>
      <sec id="s1c">
        <title>Dynamics</title>
        <p>Starting from <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e024" xlink:type="simple"/></inline-formula> down to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e025" xlink:type="simple"/></inline-formula>, each infected mobile tries to connect with a yet unconnected device, regardless of whether it is infected or not.</p>
      </sec>
      <sec id="s1d">
        <title>Constraint #1</title>
        <p>Since the connection channel is Bluetooth, once a connection between two mobiles is established, these two devices become unavailable to further connection, or, in other words, each device can have at most one connection to another cellphone.</p>
      </sec>
      <sec id="s1e">
        <title>Constraint #2</title>
        <p>For each <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e026" xlink:type="simple"/></inline-formula>, when it is <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e027" xlink:type="simple"/></inline-formula>'s turn to choose, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e028" xlink:type="simple"/></inline-formula> must connect to one of the still available devices, if any.</p>
        <p>Let us consider the generic configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e029" xlink:type="simple"/></inline-formula> with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e030" xlink:type="simple"/></inline-formula> unpaired infected mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e031" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e032" xlink:type="simple"/></inline-formula> unpaired clean mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e033" xlink:type="simple"/></inline-formula>. According to the setup, the first mobile establishing a connection is <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e034" xlink:type="simple"/></inline-formula>. In <xref ref-type="fig" rid="pone-0059468-g001">Fig. 1</xref> a possible evolution is displayed starting from an initial configuration with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e035" xlink:type="simple"/></inline-formula> infected and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e036" xlink:type="simple"/></inline-formula> clean mobiles, together with an explanatory description of the occuring dynamics.</p>
        <fig id="pone-0059468-g001" position="float">
          <object-id pub-id-type="doi">10.1371/journal.pone.0059468.g001</object-id>
          <label>Figure 1</label>
          <caption>
            <title>An example of model dynamics starting from the initial configuration (7,5).</title>
            <p>In red, the pairing that it is established at each step. (a) At time <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e037" xlink:type="simple"/></inline-formula>, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e038" xlink:type="simple"/></inline-formula> infected mobile phones <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e039" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e040" xlink:type="simple"/></inline-formula> clean mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e041" xlink:type="simple"/></inline-formula> are all within their mutual Bluetooth connection range. (b) <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e042" xlink:type="simple"/></inline-formula> chooses a mobile among <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e043" xlink:type="simple"/></inline-formula>; it chooses <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e044" xlink:type="simple"/></inline-formula> establishing connection <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e378" xlink:type="simple"/></inline-formula> . (c) Now it <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e045" xlink:type="simple"/></inline-formula>'s turn to choose, and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e046" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e047" xlink:type="simple"/></inline-formula> are not available anymore for pairing (marked by a grey circle ○ ). (d) <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e048" xlink:type="simple"/></inline-formula> connects to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e049" xlink:type="simple"/></inline-formula> through pairing<inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e379" xlink:type="simple"/></inline-formula> . (e) The two mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e050" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e051" xlink:type="simple"/></inline-formula> become unavailable for pairing, too and the next infected mobile in line <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e052" xlink:type="simple"/></inline-formula> pairs to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e053" xlink:type="simple"/></inline-formula> via <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e380" xlink:type="simple"/></inline-formula> . (f) Only <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e054" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e055" xlink:type="simple"/></inline-formula> remain available for pairing with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e056" xlink:type="simple"/></inline-formula>, which chooses <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e057" xlink:type="simple"/></inline-formula> (connection<inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e381" xlink:type="simple"/></inline-formula> ). (g) Now the last mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e058" xlink:type="simple"/></inline-formula> must connect to the remaining unpaired clean phones <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e059" xlink:type="simple"/></inline-formula>: it chooses <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e060" xlink:type="simple"/></inline-formula> creating pairing <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e382" xlink:type="simple"/></inline-formula> . (h) There are no more unpaired infected mobiles: the process ends at time <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e061" xlink:type="simple"/></inline-formula>.</p>
          </caption>
          <graphic mimetype="image" xlink:href="info:doi/10.1371/journal.pone.0059468.g001" position="float" xlink:type="simple"/>
        </fig>
        <p>Due to the described dynamics, all the infected mobiles succeed in paring, with the exception of at most one <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e062" xlink:type="simple"/></inline-formula>, which can remain unpaired if there are no more available mobiles. This case can only happen when there are more infected mobiles than clean ones, their sum is odd and all the clean mobiles get paired:<disp-formula id="pone.0059468.e063"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e063" xlink:type="simple"/><label>(†)</label></disp-formula>where <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e064" xlink:type="simple"/></inline-formula> is the number of pairings between two infected mobiles. Henceforth, the last choosing infected mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e065" xlink:type="simple"/></inline-formula> cannot find any available device to pair to. In what follows, we will refer to this case as the case <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e066" xlink:type="simple"/></inline-formula>; an example of this situation in the initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e067" xlink:type="simple"/></inline-formula> is shown in <xref ref-type="fig" rid="pone-0059468-g002">Fig. 2</xref>.</p>
        <fig id="pone-0059468-g002" position="float">
          <object-id pub-id-type="doi">10.1371/journal.pone.0059468.g002</object-id>
          <label>Figure 2</label>
          <caption>
            <title>An example of the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e080" xlink:type="simple"/></inline-formula> situation.</title>
            <p>Starting from the initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e081" xlink:type="simple"/></inline-formula>, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e082" xlink:type="simple"/></inline-formula> infects the clean mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e083" xlink:type="simple"/></inline-formula>, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e084" xlink:type="simple"/></inline-formula> pairs to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e085" xlink:type="simple"/></inline-formula>, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e086" xlink:type="simple"/></inline-formula> infects <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e087" xlink:type="simple"/></inline-formula> and, finally, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e088" xlink:type="simple"/></inline-formula> pairs to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e089" xlink:type="simple"/></inline-formula>. Here the process ends, because there are no more mobiles available for pairing to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e090" xlink:type="simple"/></inline-formula> which remains unconnected.</p>
          </caption>
          <graphic mimetype="image" xlink:href="info:doi/10.1371/journal.pone.0059468.g002" position="float" xlink:type="simple"/>
        </fig>
        <p>The model is completely described by computing the probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e068" xlink:type="simple"/></inline-formula> that a certain clean mobile, for instance <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e069" xlink:type="simple"/></inline-formula>, gets infected in the time interval <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e070" xlink:type="simple"/></inline-formula>.</p>
        <p>Although <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e071" xlink:type="simple"/></inline-formula> could be stochastically approximated by running repeated simulations, in the following Sections we will derive two equivalent exact (deterministic) formulæ for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e072" xlink:type="simple"/></inline-formula> in the aforementioned setup. The former is a simple recursive expression, which follows straightforwardly from the model dynamics, while the latter is its corresponding closed form (thus with no recursion involved), which has a more complex expression and it heavily relies on combinatorics. Other than their alternative mathematical nature, the two formulæ show different behaviours also from a computational point of view, as discussed in a dedicated Section.</p>
      </sec>
      <sec id="s1f">
        <title>The Recursive Formula</title>
        <p>Recursively, the probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e073" xlink:type="simple"/></inline-formula> of a given susceptible mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e074" xlink:type="simple"/></inline-formula> to get infected starting from a given initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e075" xlink:type="simple"/></inline-formula> can be written by the following expression:<disp-formula id="pone.0059468.e076"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e076" xlink:type="simple"/><label>(1)</label></disp-formula>where the trivial conditions <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e077" xlink:type="simple"/></inline-formula>, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e078" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e079" xlink:type="simple"/></inline-formula> initialize the recursion, thus covering all possible cases.</p>
        <p>Since all clean mobiles share the same probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e091" xlink:type="simple"/></inline-formula> of getting infected, without loss of generality we may assume <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e092" xlink:type="simple"/></inline-formula>. The three terms <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e093" xlink:type="simple"/></inline-formula>, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e094" xlink:type="simple"/></inline-formula>, and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e095" xlink:type="simple"/></inline-formula> contributing to the general case of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e096" xlink:type="simple"/></inline-formula> come from the three mutually exclusive cases which can occur starting from the initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e097" xlink:type="simple"/></inline-formula>:</p>
        <list list-type="order">
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e098" xlink:type="simple"/></inline-formula> establishes a pairing with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e099" xlink:type="simple"/></inline-formula>. In this case <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e100" xlink:type="simple"/></inline-formula> gets infected and this event occurs with probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e101" xlink:type="simple"/></inline-formula>.</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e102" xlink:type="simple"/></inline-formula> establishes a pairing with one of the other <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e103" xlink:type="simple"/></inline-formula> clean mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e104" xlink:type="simple"/></inline-formula>. This event occurs with probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e105" xlink:type="simple"/></inline-formula> and of course <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e106" xlink:type="simple"/></inline-formula> does not get infected by <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e107" xlink:type="simple"/></inline-formula>. However, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e108" xlink:type="simple"/></inline-formula> may be infected later by the remaining <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e109" xlink:type="simple"/></inline-formula> available infected phones (with only <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e110" xlink:type="simple"/></inline-formula> clean mobiles still available, because one clean mobile has been infected by <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e111" xlink:type="simple"/></inline-formula>), thus falling back to a <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e112" xlink:type="simple"/></inline-formula> configuration.</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e113" xlink:type="simple"/></inline-formula> establishes a pairing with one of the other <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e114" xlink:type="simple"/></inline-formula> unpaired infected mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e115" xlink:type="simple"/></inline-formula>. This event occurs with probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e116" xlink:type="simple"/></inline-formula> and of course <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e117" xlink:type="simple"/></inline-formula> does not get infected by <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e118" xlink:type="simple"/></inline-formula>. However, similarly to the previous situation, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e119" xlink:type="simple"/></inline-formula> may be infected later by the remaining <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e120" xlink:type="simple"/></inline-formula> unpaired infected phones, thus falling back to a <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e121" xlink:type="simple"/></inline-formula> configuration.</p>
          </list-item>
        </list>
        <p>A worked out example illustrating the construction of Eq. 1 is shown in <xref ref-type="fig" rid="pone-0059468-g003">Fig. 3</xref>. The formula in Eq. 1 for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e122" xlink:type="simple"/></inline-formula> relies on a recursive equation of second order with non constant coefficients, for which no general method is known to derive the corresponding non-recursive (closed) expression. Moreover, as detailed in a later Section, calculating <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e123" xlink:type="simple"/></inline-formula> by using Eq. 1 is computationally heavy. However, we will obtain the equivalent time-saving closed form solution in the next Section using combinatorial arguments.</p>
        <fig id="pone-0059468-g003" position="float">
          <object-id pub-id-type="doi">10.1371/journal.pone.0059468.g003</object-id>
          <label>Figure 3</label>
          <caption>
            <title>Construction of the general case of the recursive formula Eq. 1.</title>
            <p>Starting from the initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e124" xlink:type="simple"/></inline-formula>, we want to compute the probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e125" xlink:type="simple"/></inline-formula> that a clean mobile (<inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e126" xlink:type="simple"/></inline-formula> without loss of generality) gets infected in the proposed model. At time <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e127" xlink:type="simple"/></inline-formula>, the first infected mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e128" xlink:type="simple"/></inline-formula> tries to establish a pairing, and only one of the three following alternatives can occur. In green, the case when <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e129" xlink:type="simple"/></inline-formula> immediately infects <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e130" xlink:type="simple"/></inline-formula> (with probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e131" xlink:type="simple"/></inline-formula>) and we are done. In blue, the case when <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e132" xlink:type="simple"/></inline-formula> pairs to one of the remaining another <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e133" xlink:type="simple"/></inline-formula> infected mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e134" xlink:type="simple"/></inline-formula> with probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e135" xlink:type="simple"/></inline-formula>; then <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e136" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e137" xlink:type="simple"/></inline-formula> becomes unavailable for pairing with the following choosing mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e138" xlink:type="simple"/></inline-formula>, and we are moved into the case of computing the probability that <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e139" xlink:type="simple"/></inline-formula> gets infected when there are <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e140" xlink:type="simple"/></inline-formula> unlinked infected mobiles and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e141" xlink:type="simple"/></inline-formula> clean ones, <italic>i.e.</italic>, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e142" xlink:type="simple"/></inline-formula>. Finally, in orange, the case when <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e143" xlink:type="simple"/></inline-formula> pairs to one of the other <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e144" xlink:type="simple"/></inline-formula> clean mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e145" xlink:type="simple"/></inline-formula> (with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e146" xlink:type="simple"/></inline-formula>) with probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e147" xlink:type="simple"/></inline-formula>; then <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e148" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e149" xlink:type="simple"/></inline-formula> becomes unavailable for pairing with the following choosing mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e150" xlink:type="simple"/></inline-formula>, and we are moved into the case of computing the probability that <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e151" xlink:type="simple"/></inline-formula> gets infected when there are <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e152" xlink:type="simple"/></inline-formula> unlinked infected mobiles and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e153" xlink:type="simple"/></inline-formula> unlinked clean ones, <italic>i.e.</italic>, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e154" xlink:type="simple"/></inline-formula>. The general case <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e155" xlink:type="simple"/></inline-formula> is obtained by summing the contributions of all three alternative cases described above.</p>
          </caption>
          <graphic mimetype="image" xlink:href="info:doi/10.1371/journal.pone.0059468.g003" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec id="s1g">
        <title>The Combinatorial Formula</title>
        <p>To construct the explicit formula equivalent to Eq. 1, we need to employ a few combinatorial considerations. The key observation is that we can count all wirings (lists of pairings) that can occur at the end of the pairing process. Clearly, the fact that there is an order in setting up the connections between the mobiles heavily influences the probability that a given wiring can occur: in particular, this probability depends on the number <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e156" xlink:type="simple"/></inline-formula> of pairings between infected mobiles (bb-pairings, for short). As background material, we recall some definitions and results from combinatorics in the box in <xref ref-type="fig" rid="pone-0059468-g004">Fig. 4</xref>, together with the two following functions:</p>
        <fig id="pone-0059468-g004" position="float">
          <object-id pub-id-type="doi">10.1371/journal.pone.0059468.g004</object-id>
          <label>Figure 4</label>
          <caption>
            <title>Basic definitions, examples and facts on dispositions, combinations and permutations.</title>
          </caption>
          <graphic mimetype="image" xlink:href="info:doi/10.1371/journal.pone.0059468.g004" position="float" xlink:type="simple"/>
        </fig>
        <list list-type="bullet">
          <list-item>
            <p>the Heaviside step function</p>
          </list-item>
        </list>
        <p>
          <disp-formula id="pone.0059468.e157">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e157" xlink:type="simple"/>
          </disp-formula>
        </p>
        <list list-type="bullet">
          <list-item>
            <p>the Kronecker delta function</p>
          </list-item>
        </list>
        <p>
          <disp-formula id="pone.0059468.e158">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e158" xlink:type="simple"/>
          </disp-formula>
        </p>
        <p>As an example, the following indicator function can be written in the two equivalent formulations:<disp-formula id="pone.0059468.e159"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e159" xlink:type="simple"/></disp-formula>where <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e160" xlink:type="simple"/></inline-formula> is the Euclidean remainder function, so <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e161" xlink:type="simple"/></inline-formula> is zero for even <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e162" xlink:type="simple"/></inline-formula> and one for odd <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e163" xlink:type="simple"/></inline-formula>.</p>
        <p>Suppose now we are starting from an initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e164" xlink:type="simple"/></inline-formula>; then define the following quantities:</p>
        <list list-type="bullet">
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e165" xlink:type="simple"/></inline-formula>: the minimum number of bb-pairings in a wiring;</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e166" xlink:type="simple"/></inline-formula>: the probability that a wiring with exactly <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e167" xlink:type="simple"/></inline-formula> bb-pairings occurs;</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e168" xlink:type="simple"/></inline-formula>: the number of all possible ways to select <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e169" xlink:type="simple"/></inline-formula> bb-pairings;</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e170" xlink:type="simple"/></inline-formula>: the number of all possible wirings with a given list of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e171" xlink:type="simple"/></inline-formula> bb-pairings when a (generic) clean mobile gets paired;</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e172" xlink:type="simple"/></inline-formula>: the number of all possible wirings with a given list of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e173" xlink:type="simple"/></inline-formula> bb-pairings and where the clean mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e174" xlink:type="simple"/></inline-formula> is paired;</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e175" xlink:type="simple"/></inline-formula>: the number of all possible wirings with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e176" xlink:type="simple"/></inline-formula> bb-pairings when a (generic) clean mobile gets paired;</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e177" xlink:type="simple"/></inline-formula>: the number of all possible wirings with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e178" xlink:type="simple"/></inline-formula> bb-pairings where the clean mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e179" xlink:type="simple"/></inline-formula> is paired;</p>
          </list-item>
          <list-item>
            <p><inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e180" xlink:type="simple"/></inline-formula>: in the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e181" xlink:type="simple"/></inline-formula> case, with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e182" xlink:type="simple"/></inline-formula>, the number of possible wirings with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e183" xlink:type="simple"/></inline-formula> unpaired, for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e184" xlink:type="simple"/></inline-formula>.</p>
          </list-item>
        </list>
        <p>In the above notations, the (non recursive) closed form expression equivalent to Eq. 1 for the probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e185" xlink:type="simple"/></inline-formula> of a given susceptible mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e186" xlink:type="simple"/></inline-formula> to get infected in a given initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e187" xlink:type="simple"/></inline-formula> can be written as follows:</p>
        <p>
          <disp-formula id="pone.0059468.e188">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e188" xlink:type="simple"/>
            <label>(2)</label>
          </disp-formula>
        </p>
        <p>Eq. 2 has its roots on the following counting argument: the probability that a given clean mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e189" xlink:type="simple"/></inline-formula> gets infected is the sum over all admissible values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e190" xlink:type="simple"/></inline-formula> of all possible wirings with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e191" xlink:type="simple"/></inline-formula> bb-pairings weighted by the probability that a wiring with exactly <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e192" xlink:type="simple"/></inline-formula> bb-pairings occurs:<disp-formula id="pone.0059468.e193"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e193" xlink:type="simple"/><label>(3)</label></disp-formula>where <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e194" xlink:type="simple"/></inline-formula> is the minimum number of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e195" xlink:type="simple"/></inline-formula>-pairings that can be established in an initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e196" xlink:type="simple"/></inline-formula>.</p>
        <p>The rationale of summing over the number of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e199" xlink:type="simple"/></inline-formula>-pairings to compute <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e200" xlink:type="simple"/></inline-formula> relies on the observation that the probability of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e201" xlink:type="simple"/></inline-formula> of getting infected depends on the number of available infected mobiles that will pair with clean mobiles, that is exactly the number of infected mobiles which are not already paired to another infected mobile, <italic>i.e.</italic>, that are not involved in a bb-pairing.</p>
        <p>In particular, the three terms between brackets in Eq. 2 match respectively the three factors in Eq. 3, while the term between double brackets (<inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e202" xlink:type="simple"/></inline-formula> to enhance readability) corresponds to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e203" xlink:type="simple"/></inline-formula>.</p>
        <p>In what follows we will show that the expansion of the right-hand member of Eq. 3 coincides with Eq 2. The expansions of all terms will be carried out first by separately considering all occurring cases, and then providing an unique closed form formula (without conditional expressions) by using the Heaviside step and the Kronecker delta functions.</p>
      </sec>
      <sec id="s1h">
        <title>Lemma 1</title>
        <p><italic>Given an initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e231" xlink:type="simple"/></inline-formula>, the minimum number <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e232" xlink:type="simple"/></inline-formula> of bb-pairings in a wiring is the following:</italic><disp-formula id="pone.0059468.e233"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e233" xlink:type="simple"/></disp-formula>while the maximum number is <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e234" xlink:type="simple"/></inline-formula>.</p>
        <p>In fact, while when <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e235" xlink:type="simple"/></inline-formula> it is possible not to have any bb-pairing, when <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e236" xlink:type="simple"/></inline-formula> they cannot be less than <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e237" xlink:type="simple"/></inline-formula> or <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e238" xlink:type="simple"/></inline-formula> respectively when <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e239" xlink:type="simple"/></inline-formula> is even or odd. This is due to the constraint #1 imposing that an infected mobile <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e240" xlink:type="simple"/></inline-formula> must connect to another device whenever available, when it is its turn to choose.</p>
      </sec>
      <sec id="s1i">
        <title>Lemma 2</title>
        <p>
          <italic>Given a <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e248" xlink:type="simple"/></inline-formula> configuration, the probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e249" xlink:type="simple"/></inline-formula> that a wiring with exactly <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e250" xlink:type="simple"/></inline-formula> bb-pairings between two infected mobiles occurs is the following:</italic>
          <disp-formula id="pone.0059468.e251">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e251" xlink:type="simple"/>
          </disp-formula>
        </p>
        <p>In fact, when there are <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e252" xlink:type="simple"/></inline-formula> bb-pairings in the admissible range, all possible wirings depend on the choice of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e253" xlink:type="simple"/></inline-formula> infected devices <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e254" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e255" xlink:type="simple"/></inline-formula> clean devices <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e256" xlink:type="simple"/></inline-formula>, <italic>i.e.</italic> <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e257" xlink:type="simple"/></inline-formula> elements from the original sets of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e258" xlink:type="simple"/></inline-formula>. The first element has probability <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e259" xlink:type="simple"/></inline-formula> to be chosen, the second <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e260" xlink:type="simple"/></inline-formula>, the third <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e261" xlink:type="simple"/></inline-formula> and so on.</p>
      </sec>
      <sec id="s1j">
        <title>Lemma 3</title>
        <p>
          <italic>Given an initial configuration <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e262" xlink:type="simple"/></inline-formula> in the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e263" xlink:type="simple"/></inline-formula> case with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e264" xlink:type="simple"/></inline-formula>, then the number <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e265" xlink:type="simple"/></inline-formula> of possible wirings with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e266" xlink:type="simple"/></inline-formula> unpaired, for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e267" xlink:type="simple"/></inline-formula>, is:</italic>
          <disp-formula id="pone.0059468.e268">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e268" xlink:type="simple"/>
          </disp-formula>
        </p>
        <p>The idea is that all the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e269" xlink:type="simple"/></inline-formula> infected mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e270" xlink:type="simple"/></inline-formula> must be part of a bb-pairing, so they must be connected to one of the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e271" xlink:type="simple"/></inline-formula>. Once they have been chosen, the remaining <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e272" xlink:type="simple"/></inline-formula> bb-pairings must be selected among the mobiles <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e273" xlink:type="simple"/></inline-formula> that are yet unpaired. Both considerations can be exploited in terms of combinations using the definitions and the properties of <xref ref-type="fig" rid="pone-0059468-g004">Fig. 4</xref>.</p>
      </sec>
      <sec id="s1k">
        <title>Lemma 4</title>
        <p>
          <italic>In the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e274" xlink:type="simple"/></inline-formula> configuration, the number of all possible ways to select <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e275" xlink:type="simple"/></inline-formula> bb-pairings is:</italic>
          <disp-formula id="pone.0059468.e276">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e276" xlink:type="simple"/>
          </disp-formula>
        </p>
        <p>Apart from the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e277" xlink:type="simple"/></inline-formula> case, selecting <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e278" xlink:type="simple"/></inline-formula> bb-pairings is equivalent to consecutively choosing <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e279" xlink:type="simple"/></inline-formula> unordered pairs <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e280" xlink:type="simple"/></inline-formula> from the original set of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e281" xlink:type="simple"/></inline-formula> infected mobiles. The first pair can be chosen in <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e282" xlink:type="simple"/></inline-formula> ways, the second pair in <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e283" xlink:type="simple"/></inline-formula> and so on. The division by <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e284" xlink:type="simple"/></inline-formula> is motivated by the fact that the particular ordering in which the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e285" xlink:type="simple"/></inline-formula> pairs are chosen is irrelevant: the list <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e286" xlink:type="simple"/></inline-formula> is undistinguishable from the list <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e287" xlink:type="simple"/></inline-formula>. The number of these different ordering is precisely <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e288" xlink:type="simple"/></inline-formula> by definition of permutations. In the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e289" xlink:type="simple"/></inline-formula> case, if <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e290" xlink:type="simple"/></inline-formula> there is only one way to choose <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e291" xlink:type="simple"/></inline-formula> bb-pairings, while if <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e292" xlink:type="simple"/></inline-formula> the unpaired infected mobile can only be <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e293" xlink:type="simple"/></inline-formula>, so from <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e294" xlink:type="simple"/></inline-formula> we have to subtract the case where the only bb-pairing involves <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e295" xlink:type="simple"/></inline-formula>, which is impossible. Finally, in the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e296" xlink:type="simple"/></inline-formula> case with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e297" xlink:type="simple"/></inline-formula> the unpaired infected mobile can be any <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e298" xlink:type="simple"/></inline-formula> with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e299" xlink:type="simple"/></inline-formula>, and the total number of cases (which coincides with the number of cases where <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e300" xlink:type="simple"/></inline-formula> is selected, since all the clean mobiles are connected in these situations) is the sum of all cases with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e301" xlink:type="simple"/></inline-formula>.</p>
      </sec>
      <sec id="s1l">
        <title>Lemma 5</title>
        <p>
          <italic>In the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e302" xlink:type="simple"/></inline-formula> configuration, with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e303" xlink:type="simple"/></inline-formula> bb-pairings, the number of all possible cases when a particular <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e304" xlink:type="simple"/></inline-formula> is chosen is:</italic>
          <disp-formula id="pone.0059468.e305">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e305" xlink:type="simple"/>
          </disp-formula>
        </p>
        <p>The result follows immediately from the cardinality equations in <xref ref-type="fig" rid="pone-0059468-g004">Fig. 4</xref>, in particular from the fact that among all combinations of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e306" xlink:type="simple"/></inline-formula> objects in groups of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e307" xlink:type="simple"/></inline-formula> elements, a particular element is selected exactly <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e308" xlink:type="simple"/></inline-formula> times. When <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e309" xlink:type="simple"/></inline-formula> is even and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e310" xlink:type="simple"/></inline-formula> we follow the convention <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e311" xlink:type="simple"/></inline-formula> for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e312" xlink:type="simple"/></inline-formula>. In case <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e313" xlink:type="simple"/></inline-formula>, since all the non infected mobiles are selected, the possible ways to select them are exactly their permutations.</p>
        <p>This completes the expansion of Eq. 3 into Eq. 2.</p>
        <p>Equivalence between the recursive and the closed formula can be proven by showing that Eq. 2 satisfies the recursive relations of Eq. 1. The analytical proof of the equivalence involves working out a large number of cumbersome identities of binomial coefficients and factorials: in the last Section, we will briefly outline a sketch of the proof in the simple case <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e314" xlink:type="simple"/></inline-formula>. Numerically, the differences between the two formulæ are below machine precision for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e315" xlink:type="simple"/></inline-formula>.</p>
        <p>We conclude the Section with the observation that the sum of the total number of cases weighted by their corresponding probabilities adds up correctly to one:<disp-formula id="pone.0059468.e316"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e316" xlink:type="simple"/></disp-formula>because of the following counting lemma.</p>
      </sec>
      <sec id="s1m">
        <title>Lemma 6</title>
        <p>
          <italic>In the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e317" xlink:type="simple"/></inline-formula> configuration with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e318" xlink:type="simple"/></inline-formula> bb-pairings, the number <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e319" xlink:type="simple"/></inline-formula> of all possible ways to select the remaining clean mobiles for pairing is:</italic>
          <disp-formula id="pone.0059468.e320">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e320" xlink:type="simple"/>
          </disp-formula>
        </p>
        <p>Apart from the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e321" xlink:type="simple"/></inline-formula> case, when there are <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e322" xlink:type="simple"/></inline-formula> bb-pairings, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e323" xlink:type="simple"/></inline-formula> infected mobiles remain to be connected with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e324" xlink:type="simple"/></inline-formula> clean devices. This is equivalent to compute the number of possible sets of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e325" xlink:type="simple"/></inline-formula> elements from an initial set of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e326" xlink:type="simple"/></inline-formula> clean mobiles: since here the ordering matters, this is the definition of dispositions (see <xref ref-type="fig" rid="pone-0059468-g004">Fig. 4</xref>) of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e327" xlink:type="simple"/></inline-formula> elements from an original set of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e328" xlink:type="simple"/></inline-formula>.</p>
        <p>Note that, since in the case <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e329" xlink:type="simple"/></inline-formula> all the clean mobiles are selected, the two quantities <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e330" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e331" xlink:type="simple"/></inline-formula> coincide.</p>
      </sec>
      <sec id="s1n">
        <title>Analytical and Computational Notes</title>
        <p>Although defined only for positive integer values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e332" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e333" xlink:type="simple"/></inline-formula>, it is possible to provide a graphical sketch of the shape of the function <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e334" xlink:type="simple"/></inline-formula> by linear interpolation on the non integer real values. In <xref ref-type="fig" rid="pone-0059468-g005">Fig. 5</xref> we show both the tridimensional surface of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e335" xlink:type="simple"/></inline-formula> and its corresponding contourplot for values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e336" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e337" xlink:type="simple"/></inline-formula> ranging between 1 and 100. Asymptotically, the function <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e338" xlink:type="simple"/></inline-formula> converges to the following limits:<disp-formula id="pone.0059468.e339"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e339" xlink:type="simple"/><label>(4)</label></disp-formula></p>
        <fig id="pone-0059468-g005" position="float">
          <object-id pub-id-type="doi">10.1371/journal.pone.0059468.g005</object-id>
          <label>Figure 5</label>
          <caption>
            <title>Tridimensional surface (a) and corresponding levelplot (b) of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e197" xlink:type="simple"/></inline-formula> for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e198" xlink:type="simple"/></inline-formula>, linearly interpolated on the real non integer values.</title>
          </caption>
          <graphic mimetype="image" xlink:href="info:doi/10.1371/journal.pone.0059468.g005" position="float" xlink:type="simple"/>
        </fig>
        <p>Graphical examples of the behaviour stated in Eq. 4 are provided in <xref ref-type="fig" rid="pone-0059468-g006">Fig. 6</xref>, where a few curves of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e340" xlink:type="simple"/></inline-formula> are plotted when one of the two parameters is kept constant (and equal to 10, 50, 100) and the other ranges between 0 and 100, together with the curve corresponding to <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e341" xlink:type="simple"/></inline-formula> for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e342" xlink:type="simple"/></inline-formula>. When one of the two parameter is equal to a constant <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e343" xlink:type="simple"/></inline-formula>, the smaller is <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e344" xlink:type="simple"/></inline-formula>, the faster <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e345" xlink:type="simple"/></inline-formula> converges to the limits in Eq. 4.</p>
        <fig id="pone-0059468-g006" position="float">
          <object-id pub-id-type="doi">10.1371/journal.pone.0059468.g006</object-id>
          <label>Figure 6</label>
          <caption>
            <title>Plot of curves of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e204" xlink:type="simple"/></inline-formula> for different configurations <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e205" xlink:type="simple"/></inline-formula>.</title>
            <p>In blue, we show three curves of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e206" xlink:type="simple"/></inline-formula> for constant <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e207" xlink:type="simple"/></inline-formula> (<inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e208" xlink:type="simple"/></inline-formula> solid line, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e209" xlink:type="simple"/></inline-formula> dashed line and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e210" xlink:type="simple"/></inline-formula> dotted line) and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e211" xlink:type="simple"/></inline-formula> ranging from 0 to 100. All three curves approach the asymptotic value 0 for increasing <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e212" xlink:type="simple"/></inline-formula>, more rapidly for smaller values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e213" xlink:type="simple"/></inline-formula>. In black, we show the symmetric cases obtained keeping <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e214" xlink:type="simple"/></inline-formula> constant (<inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e215" xlink:type="simple"/></inline-formula> solid line, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e216" xlink:type="simple"/></inline-formula> dashed line and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e217" xlink:type="simple"/></inline-formula> dotted line) and letting <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e218" xlink:type="simple"/></inline-formula> range from 0 to 100. Again, all three curves approach the asymptotic value 1 for increasing <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e219" xlink:type="simple"/></inline-formula>, more rapidly for smaller values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e220" xlink:type="simple"/></inline-formula>. The sawtooth shape of the curve <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e221" xlink:type="simple"/></inline-formula> for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e222" xlink:type="simple"/></inline-formula> is due to the effect of the <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e223" xlink:type="simple"/></inline-formula> case, which induces abrupt differences in <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e224" xlink:type="simple"/></inline-formula> for consecutive values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e225" xlink:type="simple"/></inline-formula> (changing from even to odd). Finally, the dotted-dashed red line shows the curve of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e226" xlink:type="simple"/></inline-formula> for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e227" xlink:type="simple"/></inline-formula> ranging between 0 and 100: in this case, the curve gets very close to its asymptotic value 0.5 even with small values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e228" xlink:type="simple"/></inline-formula>; for instance, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e229" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e230" xlink:type="simple"/></inline-formula>.</p>
          </caption>
          <graphic mimetype="image" xlink:href="info:doi/10.1371/journal.pone.0059468.g006" position="float" xlink:type="simple"/>
        </fig>
        <p>Apart from its intrinsic theoretical relevance, the non recursive closed formula is essential for numerically compute <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e346" xlink:type="simple"/></inline-formula>. In fact, the computational cost is notably different by using either the recursive formula Eq. 3 or its closed form counterpart Eq. 2: namely, the explicit formula is much faster, as shown by the values reported in <xref ref-type="table" rid="pone-0059468-t001">Table 1</xref> and the curves plotted in <xref ref-type="fig" rid="pone-0059468-g007">Fig. 7</xref>. For the recursive formula the computing time shows an exponentially growing trends for increasing values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e347" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e348" xlink:type="simple"/></inline-formula>, while for the non recursive formula the computing time is very small and minimally growing for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e349" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e350" xlink:type="simple"/></inline-formula> ranging between 0 and 100. Actually, the average time over 10 values using a Python implementation of the non recursive formula on a 24 core Intel Xeon E5649 CPU 2.53GHz Linux workstation with 47 GB RAM is 11 milliseconds for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e351" xlink:type="simple"/></inline-formula> and 60 milliseconds for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e352" xlink:type="simple"/></inline-formula>, with very limited standard deviation. On the same hardware, a Python implementation of the recursive formula took about 12 milliseconds for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e353" xlink:type="simple"/></inline-formula>, 2.4 seconds for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e354" xlink:type="simple"/></inline-formula>, 6 minutes for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e355" xlink:type="simple"/></inline-formula> and more than 9 hours for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e356" xlink:type="simple"/></inline-formula>, which was the largest tested value.</p>
        <fig id="pone-0059468-g007" position="float">
          <object-id pub-id-type="doi">10.1371/journal.pone.0059468.g007</object-id>
          <label>Figure 7</label>
          <caption>
            <title>Plot of the computing times (in <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e241" xlink:type="simple"/></inline-formula> scale) needed to compute <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e242" xlink:type="simple"/></inline-formula> for different values of <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e243" xlink:type="simple"/></inline-formula> as listed in <xref ref-type="table" rid="pone-0059468-t001"><bold>Table 1</bold></xref>.</title>
            <p>Error bars range between minimum and maximum, while lines connect mean values; all values refer to 10 replicates. Solid line represents computing times obtained by using the recursive formula Eq. 1, while dotted line corresponds to the values produced by using the closed formula Eq. 2.</p>
          </caption>
          <graphic mimetype="image" xlink:href="info:doi/10.1371/journal.pone.0059468.g007" position="float" xlink:type="simple"/>
        </fig>
        <table-wrap id="pone-0059468-t001" position="float">
          <object-id pub-id-type="doi">10.1371/journal.pone.0059468.t001</object-id>
          <label>Table 1</label>
          <caption>
            <title>Computing times (in seconds) required to compute <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e244" xlink:type="simple"/></inline-formula> by the recursive formula in Eq. 1 and the equivalent closed formula in Eq. 2, for different values of the number of infected (I) and susceptible (S).</title>
          </caption>
          <alternatives>
            <graphic id="pone-0059468-t001-1" position="float" mimetype="image" xlink:href="info:doi/10.1371/journal.pone.0059468.t001" xlink:type="simple"/>
            <table>
              <colgroup span="1">
                <col align="left" span="1"/>
                <col align="center" span="1"/>
                <col align="center" span="1"/>
                <col align="center" span="1"/>
                <col align="center" span="1"/>
                <col align="center" span="1"/>
                <col align="center" span="1"/>
              </colgroup>
              <thead>
                <tr>
                  <td align="left" rowspan="1" colspan="1">I = S</td>
                  <td colspan="3" align="left" rowspan="1">Recursive</td>
                  <td colspan="3" align="left" rowspan="1">Closed Form</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">Min</td>
                  <td align="left" rowspan="1" colspan="1">Mean</td>
                  <td align="left" rowspan="1" colspan="1">Max</td>
                  <td align="left" rowspan="1" colspan="1">Min</td>
                  <td align="left" rowspan="1" colspan="1">Mean</td>
                  <td align="left" rowspan="1" colspan="1">Max</td>
                </tr>
              </thead>
              <tbody>
                <tr>
                  <td align="left" rowspan="1" colspan="1">5</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                  <td align="left" rowspan="1" colspan="1">0.013</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">10</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                  <td align="left" rowspan="1" colspan="1">0.013</td>
                  <td align="left" rowspan="1" colspan="1">0.013</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">15</td>
                  <td align="left" rowspan="1" colspan="1">0.013</td>
                  <td align="left" rowspan="1" colspan="1">0.013</td>
                  <td align="left" rowspan="1" colspan="1">0.014</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">20</td>
                  <td align="left" rowspan="1" colspan="1">0.031</td>
                  <td align="left" rowspan="1" colspan="1">0.031</td>
                  <td align="left" rowspan="1" colspan="1">0.032</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">25</td>
                  <td align="left" rowspan="1" colspan="1">0.223</td>
                  <td align="left" rowspan="1" colspan="1">0.229</td>
                  <td align="left" rowspan="1" colspan="1">0.235</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.011</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">30</td>
                  <td align="left" rowspan="1" colspan="1">2.365</td>
                  <td align="left" rowspan="1" colspan="1">2.449</td>
                  <td align="left" rowspan="1" colspan="1">2.491</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">35</td>
                  <td align="left" rowspan="1" colspan="1">26.203</td>
                  <td align="left" rowspan="1" colspan="1">26.757</td>
                  <td align="left" rowspan="1" colspan="1">27.419</td>
                  <td align="left" rowspan="1" colspan="1">0.012</td>
                  <td align="left" rowspan="1" colspan="1">0.013</td>
                  <td align="left" rowspan="1" colspan="1">0.013</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">40</td>
                  <td align="left" rowspan="1" colspan="1">361.621</td>
                  <td align="left" rowspan="1" colspan="1">362.351</td>
                  <td align="left" rowspan="1" colspan="1">362.894</td>
                  <td align="left" rowspan="1" colspan="1">0.014</td>
                  <td align="left" rowspan="1" colspan="1">0.014</td>
                  <td align="left" rowspan="1" colspan="1">0.014</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">45</td>
                  <td align="left" rowspan="1" colspan="1">3225.718</td>
                  <td align="left" rowspan="1" colspan="1">3287.492</td>
                  <td align="left" rowspan="1" colspan="1">3333.242</td>
                  <td align="left" rowspan="1" colspan="1">0.015</td>
                  <td align="left" rowspan="1" colspan="1">0.015</td>
                  <td align="left" rowspan="1" colspan="1">0.015</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">50</td>
                  <td align="left" rowspan="1" colspan="1">34336.694</td>
                  <td align="left" rowspan="1" colspan="1">34433.664</td>
                  <td align="left" rowspan="1" colspan="1">34555.204</td>
                  <td align="left" rowspan="1" colspan="1">0.016</td>
                  <td align="left" rowspan="1" colspan="1">0.015</td>
                  <td align="left" rowspan="1" colspan="1">0.016</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">55</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.018</td>
                  <td align="left" rowspan="1" colspan="1">0.018</td>
                  <td align="left" rowspan="1" colspan="1">0.019</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">60</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.020</td>
                  <td align="left" rowspan="1" colspan="1">0.021</td>
                  <td align="left" rowspan="1" colspan="1">0.021</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">65</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.023</td>
                  <td align="left" rowspan="1" colspan="1">0.023</td>
                  <td align="left" rowspan="1" colspan="1">0.023</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">70</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.026</td>
                  <td align="left" rowspan="1" colspan="1">0.027</td>
                  <td align="left" rowspan="1" colspan="1">0.027</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">75</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.030</td>
                  <td align="left" rowspan="1" colspan="1">0.030</td>
                  <td align="left" rowspan="1" colspan="1">0.030</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">80</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.035</td>
                  <td align="left" rowspan="1" colspan="1">0.035</td>
                  <td align="left" rowspan="1" colspan="1">0.035</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">85</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.039</td>
                  <td align="left" rowspan="1" colspan="1">0.040</td>
                  <td align="left" rowspan="1" colspan="1">0.040</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">90</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.046</td>
                  <td align="left" rowspan="1" colspan="1">0.046</td>
                  <td align="left" rowspan="1" colspan="1">0.046</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">95</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.052</td>
                  <td align="left" rowspan="1" colspan="1">0.052</td>
                  <td align="left" rowspan="1" colspan="1">0.052</td>
                </tr>
                <tr>
                  <td align="left" rowspan="1" colspan="1">100</td>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1"/>
                  <td align="left" rowspan="1" colspan="1">0.060</td>
                  <td align="left" rowspan="1" colspan="1">0.060</td>
                  <td align="left" rowspan="1" colspan="1">0.061</td>
                </tr>
              </tbody>
            </table>
          </alternatives>
          <table-wrap-foot>
            <fn id="nt101">
              <label/>
              <p>In particular, <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e245" xlink:type="simple"/></inline-formula>, and only the closed formula was used for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e246" xlink:type="simple"/></inline-formula> (due to the excessively long runtimes: <italic>e.g.</italic>, computing <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e247" xlink:type="simple"/></inline-formula> by the recursive formula took more than 9 hours). Mean, maximum (Max) and minimum (Min) values for 10 replicates of each experiment are reported. All simulations were run on a 24 core Intel Xeon E5649 CPU 2.53GHz workstation with 47 GB RAM, Linux 2.6.32 (Red Hat 4.4.6), with software written in Python 2.6.6.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec id="s1o">
        <title>Proof of Equivalence in the Case <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e357" xlink:type="simple"/></inline-formula></title>
        <p>In this Section we show the kind of arguments involved in proving the equivalence between Eq. 1 and Eq. 2 by outlining the main steps of the proof in a simple case, <italic>i.e.</italic>, when there as many infected as clean mobiles, and their numnber is even. Clearly, the general case is computationally far more complex, but it used the same ideas.</p>
        <p>Proving the equivalence between the recursive and the combinatorial formula requires substituting the explicit expression for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e358" xlink:type="simple"/></inline-formula> of Eq. 2 in its three occurrences in Eq. 1. We are assuming <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e359" xlink:type="simple"/></inline-formula>, thus in this case the identity we need to prove reads as follows:<disp-formula id="pone.0059468.e360"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e360" xlink:type="simple"/></disp-formula>or, equivalently:</p>
        <p><disp-formula id="pone.0059468.e361"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e361" xlink:type="simple"/><label>(5)</label></disp-formula>The expression for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e362" xlink:type="simple"/></inline-formula> becomes:<disp-formula id="pone.0059468.e363"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e363" xlink:type="simple"/></disp-formula>where the upper bound is <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e364" xlink:type="simple"/></inline-formula> since the right-hand member vanishes for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e365" xlink:type="simple"/></inline-formula> and the product symbols were eliminated by using the factorial and double factorial notations:</p>
        <p><disp-formula id="pone.0059468.e366"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e366" xlink:type="simple"/></disp-formula>.</p>
        <p>Analogously, the expansions for <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e367" xlink:type="simple"/></inline-formula> and <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e368" xlink:type="simple"/></inline-formula> become respectively:<disp-formula id="pone.0059468.e369"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e369" xlink:type="simple"/></disp-formula></p>
        <p>Then the left-hand member of Eq. 5 reads as follows:<disp-formula id="pone.0059468.e370"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e370" xlink:type="simple"/></disp-formula>which, collecting common factors, reduces to:</p>
        <p>
          <disp-formula id="pone.0059468.e371">
            <graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e371" xlink:type="simple"/>
          </disp-formula>
        </p>
        <p>Now, expanding the double factorial by the identity:<disp-formula id="pone.0059468.e372"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e372" xlink:type="simple"/></disp-formula>and carrying the terms not involving <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e373" xlink:type="simple"/></inline-formula> outside the summation symbol, the above quantity becomes:</p>
        <p><disp-formula id="pone.0059468.e374"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e374" xlink:type="simple"/><label>(6)</label></disp-formula>Now, applying the following identity<disp-formula id="pone.0059468.e375"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e375" xlink:type="simple"/></disp-formula>to Eq. 6 with <inline-formula><inline-graphic xlink:href="info:doi/10.1371/journal.pone.0059468.e376" xlink:type="simple"/></inline-formula>, we obtain that</p>
        <p><disp-formula id="pone.0059468.e377"><graphic position="anchor" xlink:href="info:doi/10.1371/journal.pone.0059468.e377" xlink:type="simple"/></disp-formula>as claimed.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ack>
      <p>The authors thank two anonymous referees for their precious suggestions and notes, which helped in greatly improving the paper.</p>
    </ack>
    <ref-list>
      <title>References</title>
      <ref id="pone.0059468-Wang1">
        <label>1</label>
        <mixed-citation publication-type="journal" xlink:type="simple"><name name-style="western"><surname>Wang</surname><given-names>P</given-names></name>, <name name-style="western"><surname>González</surname><given-names>M</given-names></name>, <name name-style="western"><surname>Hidalgo</surname><given-names>C</given-names></name>, <name name-style="western"><surname>Barabási</surname><given-names>AL</given-names></name> (<year>2009</year>) <article-title>Understanding the spreading patterns of mobile phones viruses</article-title>. <source>Science</source> <volume>324</volume>: <fpage>1071</fpage>–<lpage>1076</lpage>.</mixed-citation>
      </ref>
      <ref id="pone.0059468-Nguyen1">
        <label>2</label>
        <mixed-citation publication-type="book" xlink:type="simple">Nguyen HN, Shinoda Y (2009) A novel analytical framework to model malware diffusion in heterogeneous wireless networks. In: Proceedings of IEEE WoWMoM 09. IEEE, 1–10.</mixed-citation>
      </ref>
      <ref id="pone.0059468-Zanero1">
        <label>3</label>
        <mixed-citation publication-type="journal" xlink:type="simple"><name name-style="western"><surname>Zanero</surname><given-names>S</given-names></name> (<year>2009</year>) <article-title>Wireless Malware Propagation: A Reality Check</article-title>. <source>IEEE Security &amp; Privacy</source> <volume>7</volume>: <fpage>70</fpage>–<lpage>74</lpage>.</mixed-citation>
      </ref>
      <ref id="pone.0059468-Guanhua1">
        <label>4</label>
        <mixed-citation publication-type="journal" xlink:type="simple"><name name-style="western"><surname>Guanhua</surname><given-names>Y</given-names></name>, <name name-style="western"><surname>Eidenbenz</surname><given-names>S</given-names></name> (<year>2009</year>) <article-title>Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)</article-title>. <source>IEEE Transactions on Mobile Computing</source> <volume>8</volume>: <fpage>353</fpage>–<lpage>368</lpage>.</mixed-citation>
      </ref>
      <ref id="pone.0059468-Shuai1">
        <label>5</label>
        <mixed-citation publication-type="book" xlink:type="simple">Shuai F, Chang-Guang W, Li-Jing B, Qing-Yang H, Jian-Feng M (2009) Modeling and Analysis Malware Spread in Short-Range Wireless Networks. In: Proceedings of WiCom 09. IEEE, 1–4.</mixed-citation>
      </ref>
      <ref id="pone.0059468-Khouzani1">
        <label>6</label>
        <mixed-citation publication-type="book" xlink:type="simple">Khouzani M (2011) Optimal control of mobile malware epidemics. Ph.D. thesis, University of Pennsylvania.</mixed-citation>
      </ref>
      <ref id="pone.0059468-Ghallali1">
        <label>7</label>
        <mixed-citation publication-type="book" xlink:type="simple">Ghallali M, El Ouadghiri D, Essaaidi M, Boulmalf M (2011) Mobile phones security: the spread of malware via MMS and Bluetooth, prevention methods. In: Proceedings of MoMM 11. ACM, 256–259.</mixed-citation>
      </ref>
      <ref id="pone.0059468-LaPolla1">
        <label>8</label>
        <mixed-citation publication-type="book" xlink:type="simple">La Polla M, Martinelli F, Sgandurra D (2012) A Survey on Security for Mobile Devices. IEEE Communications Surveys &amp; Tutorials PP: 1–26.</mixed-citation>
      </ref>
      <ref id="pone.0059468-Ghallali2">
        <label>9</label>
        <mixed-citation publication-type="journal" xlink:type="simple"><name name-style="western"><surname>Ghallali</surname><given-names>M</given-names></name>, <name name-style="western"><surname>El Ouahidi</surname><given-names>B</given-names></name> (<year>2012</year>) <article-title>Designing a new framework in order to limit the spread of malware in mobile phones</article-title>. <source>Int J EnCoTe</source> <volume>1</volume>: <fpage>1</fpage>–<lpage>8</lpage>.</mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>