{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:00:33Z","timestamp":1725544833144},"publisher-location":"Berlin, Heidelberg","reference-count":55,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642116292"},{"type":"electronic","value":"9783642116315"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11631-5_20","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T08:44:11Z","timestamp":1264841051000},"page":"209-219","source":"Crossref","is-referenced-by-count":3,"title":["Biological Aspects of Computer Virology"],"prefix":"10.1007","author":[{"given":"Vasileios","family":"Vlachos","sequence":"first","affiliation":[]},{"given":"Diomidis","family":"Spinellis","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Androutsellis-Theotokis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.istr.2007.10.003","volume":"12","author":"U. Aickelin","year":"2007","unstructured":"Aickelin, U., Greensmith, J.: Sensing danger: Innate immunology for intrusion detection. Information Security Technical Report\u00a012, 218\u2013227 (2007)","journal-title":"Information Security Technical Report"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R. Albert","year":"2002","unstructured":"Albert, R., Barab\u00e1si, A.: Statistical mechanics of complex networks. Reviews of Modern Physics\u00a074(1), 47\u201397 (2002)","journal-title":"Reviews of Modern Physics"},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSECP.2003.1177002","volume":"1","author":"I. Arce","year":"2003","unstructured":"Arce, I., Levy, E.: An analysis of the slapper worm. IEEE Security & Privacy\u00a01(3), 82\u201387 (2003)","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2005.12","volume":"3","author":"A. Arora","year":"2005","unstructured":"Arora, A., Telang, R.: Economics of software vulnerability disclosure. IEEE Security & Privacy\u00a03(1), 20\u201325 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0378-4371(00)00018-2","volume":"281","author":"A. Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A., Albert, R., Jeong, H.: Scale-free characteristics of random networks: the topology of the world-wide web. Physica A\u00a0281, 69\u201377 (1999)","journal-title":"Physica A"},{"key":"20_CR6","volume-title":"The Great Influenza","author":"J. Barry","year":"2005","unstructured":"Barry, J.: The Great Influenza. Penguin Group, New York (2005)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.scico.2005.06.001","volume":"1","author":"M. Burgess","year":"2006","unstructured":"Burgess, M.: Probabilistic anomaly detection in distributed computer networks. Science of Computer Programming\u00a01, 1\u201326 (2006)","journal-title":"Science of Computer Programming"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.istr.2007.10.005","volume":"12","author":"M. Burgess","year":"2007","unstructured":"Burgess, M.: Biology, immunology and information security. Information Security Technical Reports\u00a012, 192\u2013199 (2007)","journal-title":"Information Security Technical Reports"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"Cohen, F.: Computer viruses \u2013 theory and experiments. Computers and Security\u00a06, 22\u201335 (1987)","journal-title":"Computers and Security"},{"key":"20_CR10","series-title":"Wiley Professional Computing","volume-title":"A Short Course on Computer Viruses","author":"F. Cohen","year":"1994","unstructured":"Cohen, F.: A Short Course on Computer Viruses. Wiley Professional Computing. Wiley, Canada (1994)"},{"key":"20_CR11","unstructured":"DangerProject. The danger project (September 2008), http:\/\/www.dangertheory.com\/"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Ebel, H., Mielsch, L., Bornloldt, S.: Scale-free topology of e-mail networks. Physical Review\u00a0E 66(035103(R)) (September 2002)","DOI":"10.1103\/PhysRevE.66.035103"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. In: Proceedings of ACM SIGCOMM, Cambridge, MA, USA, pp. 251\u2013262 (1999)","DOI":"10.1145\/316188.316229"},{"issue":"10","key":"20_CR14","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A.: Computer immunology. Communications of the ACM\u00a040(10), 88\u201396 (1997)","journal-title":"Communications of the ACM"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Forrest, S., Somayaji, A., Ackley, D.: Building diverse computer systems. In: IEEE 6th Workshop on Hot Topics in Operating Systems (1997)","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"20_CR16","unstructured":"Furnell, S., Ward, J.: The true computer parasite (June 2005), http:\/\/securityfocus.com\/infocus\/1838"},{"issue":"6","key":"20_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSECP.2003.1253563","volume":"1","author":"D. Geer","year":"2003","unstructured":"Geer, D.: Monopoly considered harmful. IEEE Security & Privacy\u00a01(6), 14\u201316 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"20_CR18","unstructured":"Geer, D., Bace, R., Gutmann, P., Metzger, P., Pfleeger, C.P., Quarterman, J.S., Schneier, B.: Cyber insecurity: The cost of monopoly. Technical report, Computer & Communications Industry Association (2003)"},{"key":"20_CR19","unstructured":"Goel, S., Bush, S.: Biological models of security for virus propagation in computer networks. Login\u00a029(6) (December 2004)"},{"issue":"6","key":"20_CR20","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MSECP.2003.1253561","volume":"1","author":"G. Goth","year":"2003","unstructured":"Goth, G.: Addressing the monoculture. IEEE Security & Privacy\u00a01(6), 8\u201310 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-85072-4_26","volume-title":"Artificial Immune Systems","author":"J. Greensmith","year":"2008","unstructured":"Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 291\u2013302. Springer, Heidelberg (2008)"},{"key":"20_CR22","unstructured":"Hofmeyr, S.: On the virulence of malware (June 2007), http:\/\/www.nthworld.org\/archives\/malware\/index.htm"},{"key":"20_CR23","unstructured":"Kephart, J.: How topology affects population dynamics. In: Proceedings of Artificial Life 3, New, Mexico, USA (June 1992)"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Kephart, J., White, S.: Directed-graph epidemiological models of computer viruses. In: Proceedings of the 1991 Computer Society Symposium on Research in Security and Privacy, California, USA, pp. 343\u2013361 (1991)","DOI":"10.1109\/RISP.1991.130801"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Kermack, W.O., McKendrick, A.G.: A contribution to the mathematical theory of epidemics. In: Proceedings of the Royal Society of London. Series A, vol.\u00a0115, pp. 700\u2013721 (1927)","DOI":"10.1098\/rspa.1927.0118"},{"key":"20_CR26","unstructured":"Kim, H., Kang, I.: On the functional validity of the worm-killing worm. In: Proceedings of the 2004 IEEE International Conference on Communications, June 2004, vol.\u00a04, pp. 1902\u20131906 (2004)"},{"key":"20_CR27","unstructured":"Leveille, J.: Epidemic spreading in technological networks. Hpl-2002-287, School of Cognitive and Computing Sciences, University of Sussex at Brighton, Bristol (October 2002)"},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.cose.2006.12.002","volume":"26","author":"J. Li","year":"2007","unstructured":"Li, J., Knickerbocker, P.: Functional similarities between computer worms and bilogical pathogens. Computers & Security\u00a026, 338\u2013347 (2007)","journal-title":"Computers & Security"},{"key":"20_CR29","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1126\/science.1071059","volume":"296","author":"P. Matzinger","year":"2002","unstructured":"Matzinger, P.: The danger model: A renewed sense of self. Science\u00a0296, 301\u2013305 (2002)","journal-title":"Science"},{"key":"20_CR30","unstructured":"MedicineNet. Definition of virulence (2008), http:\/\/www.medterms.com\/script\/main\/art.asp?articlekey=6911 (December 2008)"},{"key":"20_CR31","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1126\/science.1068883","volume":"296","author":"R. Medzhitov","year":"2002","unstructured":"Medzhitov, R., Janeway, C.: Decoding the patterns of self and nonself by the innate immune system. Science\u00a0296, 298\u2013300 (2002)","journal-title":"Science"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Security & Privacy, 33\u201339 (July 2003)","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"20_CR33","first-page":"33","volume":"31","author":"N. Weaver","year":"2006","unstructured":"Weaver, N., Ellis, D.: White worms don\u2019t work. Login\u00a031, 33\u201338 (2006)","journal-title":"Login"},{"key":"20_CR34","first-page":"908","volume":"E83-B","author":"T. Okamoto","year":"2000","unstructured":"Okamoto, T., Ishida, Y.: A distributed approach against computer viruses inspired by the immune system. IEICE Transaction on Communications\u00a0E83-B, 908\u2013915 (2000)","journal-title":"IEICE Transaction on Communications"},{"key":"20_CR35","unstructured":"OneStat. Microsoft\u2019s windows os global market share is more than 97 to onestat.com (2008), http:\/\/www.onestat.com\/html\/press-release-microsoft-windows-vista-global-usage-share-december-2008.html (May 2005)"},{"key":"20_CR36","doi-asserted-by":"publisher","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R. Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks. Physical Review Letters\u00a086, 3200\u20133203 (2001)","journal-title":"Physical Review Letters"},{"volume-title":"Ebola Virus Haemorrhagic Fever","year":"1977","key":"20_CR37","unstructured":"Pattyn, S. (ed.): Ebola Virus Haemorrhagic Fever. Elsevier\/North-Holland, Amsterdam (1977)"},{"issue":"4","key":"20_CR38","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2004.36","volume":"2","author":"J. Pincus","year":"2004","unstructured":"Pincus, J., Baker, B.: Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security & Privacy\u00a02(4), 20\u201327 (2004)","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"20_CR39","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2005.17","volume":"3","author":"E. Rescorla","year":"2005","unstructured":"Rescorla, E.: Is finding security holes a good idea? IEEE Security & Privacy\u00a03(1), 14\u201319 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"20_CR40","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.istr.2007.09.001","volume":"12","author":"K. Shafi","year":"2007","unstructured":"Shafi, K., Abbass, H.: Biologically-inspired complex adatpive systems approaches to network intrusion detection. Information Security Technical Report\u00a012, 209\u2013217 (2007)","journal-title":"Information Security Technical Report"},{"issue":"4","key":"20_CR41","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2004.59","volume":"2","author":"C. Shannon","year":"2004","unstructured":"Shannon, C., Moore, D.: The spread of the witty worm. IEEE Security & Privacy\u00a02(4), 46\u201350 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"20_CR42","unstructured":"Somayaji, A., Forrest, S.: Automated response using system-call delay. In: Nith USENIX security symposium (2000)"},{"key":"20_CR43","first-page":"75","volume-title":"Meeting on New Security Paradigms","author":"A. Somayaji","year":"1998","unstructured":"Somayaji, A., Hofmeyr, S., Forrest, S.: Principles of a computer immune system. In: Meeting on New Security Paradigms, Langdale, UK, September 23-26, 1997, pp. 75\u201382. ACM, New York (1998)"},{"key":"20_CR44","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to 0wn the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, August 2002, pp. 149\u2013167 (2002)"},{"key":"20_CR45","volume-title":"The Art of Computer Virus Research and Defense","author":"P. Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, Upper Saddle River (2005)"},{"key":"20_CR46","unstructured":"Tanachaiwiwat, S., Helmy, A.: Modeling and analysis of worm interactions (war of the worms). In: Fourth International Conference on Broadband Communications, Networks and Systems, 2007. BROADNETS 2007, pp. 649\u2013658 (2007)"},{"volume-title":"Adatpive Studies in Dynamics of Infectious Diseases","year":"2002","key":"20_CR47","unstructured":"Sabelis, M., Dieckmann, U., Metz, J., Sigmund, K. (eds.): Adatpive Studies in Dynamics of Infectious Diseases. Cambridge University Press, Cambridge (2002)"},{"issue":"2","key":"20_CR48","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.comnet.2004.01.002","volume":"45","author":"V. Vlachos","year":"2004","unstructured":"Vlachos, V., Androutsellis-Theotokis, S., Spinellis, D.: Security applications of peer-to-peer networks. Comput. Networks\u00a045(2), 195\u2013205 (2004)","journal-title":"Comput. Networks"},{"key":"20_CR49","unstructured":"Vlachos, V., Raptis, A., Spinellis, D.: PROMISing steps towards computer hygiene. In: Furnel, S. (ed.) International Network Conference (INC2006), Plymouth, UK, July 2006, pp. 229\u2013236 (2006)"},{"issue":"4","key":"20_CR50","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1108\/09685220710817815","volume":"15","author":"V. Vlachos","year":"2007","unstructured":"Vlachos, V., Spinellis, D.: A PRoactive malware identification system based on the computer hygiene principles. Information Management and Computer Security\u00a015(4), 295\u2013312 (2007)","journal-title":"Information Management and Computer Security"},{"key":"20_CR51","unstructured":"Weaver, N., Paxson, V., Staniford, S.: A worst-case worm. In: Proceedings of the Third Annual Workshop on Economics and Information Security (WEIS 2004) (May 2004)"},{"key":"20_CR52","unstructured":"Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: Large scale malicious code: A research agenda (May 2003), http:\/\/www.cs.berkeley.edu\/~nweaver\/largescalemaliciouscode.pdf (June 2005)"},{"key":"20_CR53","doi-asserted-by":"crossref","unstructured":"Williams, P.D., Day, T.: Interactions between mortality sources and the evolution of parasite virulence. In: Proceedings of the Royal Society of London B, vol.\u00a0268, pp. 2331\u20132337 (2001)","DOI":"10.1098\/rspb.2001.1795"},{"key":"20_CR54","unstructured":"Zelonis, K.: Avoiding the cyber pandemic: A public health approach to preventing malware propagation. Master\u2019s thesis, Carnegie Mellon University (December 2004)"},{"key":"20_CR55","doi-asserted-by":"crossref","unstructured":"Zou, C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS), Washington DC, USA (November 2002)","DOI":"10.1145\/586110.586130"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Next Generation Society. Technological and Legal Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11631-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T13:27:44Z","timestamp":1558790864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11631-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642116292","9783642116315"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11631-5_20","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}