{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:04:54Z","timestamp":1725552294556},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540335849"},{"type":"electronic","value":"9783540335856"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11739685_68","type":"book-chapter","created":{"date-parts":[[2006,5,4]],"date-time":"2006-05-04T09:55:01Z","timestamp":1146736501000},"page":"652-661","source":"Crossref","is-referenced-by-count":1,"title":["An Anti-worm with Balanced Tree Based Spreading Strategy"],"prefix":"10.1007","author":[{"given":"Yi-xuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiao-chun","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Bai-ling","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hai-bin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","unstructured":"Chen, T.M.: Trends in Viruses and Worms. The Internet Protocol Journal\u00a06(3) (September 2003)"},{"issue":"4","key":"68_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSECP.2004.1281250","volume":"2","author":"E. Levy","year":"2004","unstructured":"Levy, E.: Approaching Zero. IEEE Security & Privacy Magazine\u00a02(4), 65\u201366 (2004)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Moore, D., Paxson, V., Shannon, C.: Inside the Slammer Worm. In: IEEE Security and Privacy (2003)","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"68_CR4","doi-asserted-by":"crossref","unstructured":"Castaneda, F., Sezer, E.C., Xu, J.: WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism. In: Proceedings of ACM Workshop on Rapid Malcode (WORM 2004) (October 2004)","DOI":"10.1145\/1029618.1029631"},{"key":"68_CR5","unstructured":"Bai-ling, W., Bin-xing, F., Xiao-chun, Y.: The Propagation Model and Analysis of Worms Together with Anti-Worms. WSEAS Transactions on Information Science and Applications\u00a01(4) ( October 2004)"},{"key":"68_CR6","unstructured":"Wei-Ping, W., Si-Han, Q., et al.: Research and Development of Internet Worms. Journal of Software\u00a015(8) (2004)"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Gong, W., Towsley, D.: Code Red worm propagation modeling and analysis. In: Proc. of the 9th ACM Symp. on Computer and Communication Security, Washington (2002)","DOI":"10.1145\/586110.586130"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., White, S.R.: Measuring and Modeling Computer Virus Prevalence. In: Proceedings of the IEEE Symposium on Security and Privacy (1993)","DOI":"10.1109\/RISP.1993.287647"},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., Chess, D.M., White, S.R.: Computers and Epidemiology. IEEE Spectrum (1993)","DOI":"10.1109\/6.275061"},{"key":"68_CR10","unstructured":"Zou, C.C., Towsley, D., Gong, W.: On the Performance of Internet Worm Scanning Strategies. Technical Report: TR-03-CSE-07"},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"Staniford, S., et al.: The Top Speed of Flash Worms. In: ACM Workshop on Rapid Malcode (WORM 2004), George Mason University, Fairfax, Virginia, USA (2004)","DOI":"10.1145\/1029618.1029624"},{"key":"68_CR12","doi-asserted-by":"crossref","unstructured":"Arce, I., Levy, E.: An Analysis of the Slapper Worm. IEEE Security & Privacy (2003)","DOI":"10.1109\/MSECP.2003.1177002"},{"key":"68_CR13","unstructured":"Wu, J., Vangala, S., Gao, L.: An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques. In: Network and Distributed System Security Symposium (2004)"},{"key":"68_CR14","unstructured":"PDNS - Parallel\/Distributed NS, http:\/\/www.cc.gatech.edu\/computing\/compass\/PDNS\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11739685_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,14]],"date-time":"2020-04-14T12:29:28Z","timestamp":1586867368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11739685_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540335849","9783540335856"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11739685_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}