{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:49Z","timestamp":1725552109481},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123337"},{"type":"electronic","value":"9783642123344"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12334-4_19","type":"book-chapter","created":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T15:05:39Z","timestamp":1271084739000},"page":"181-190","source":"Crossref","is-referenced-by-count":6,"title":["A Probabilistic Population Study of the Conficker-C Botnet"],"prefix":"10.1007","author":[{"given":"Rhiannon","family":"Weaver","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Abu Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In: Proceedings of the First Annual Workshop on Hot Topics in Botnets (March 2007)"},{"key":"19_CR2","volume-title":"Statistical Inference","author":"G. Casella","year":"1990","unstructured":"Casella, G., Berger, R.: Statistical Inference. Duxbury Press, Boston (1990)"},{"issue":"4","key":"19_CR3","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/JSAC.2003.810499","volume":"21","author":"M. Chan","year":"2003","unstructured":"Chan, M., Hamdi, M.: An active queue management scheme based on a capture-recapture model. IEEE Journal on Selected Areas in Communications\u00a021(4), 572\u2013583 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"19_CR4","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1111\/j.1541-0420.2007.00815.x","volume":"63","author":"J. Dupuis","year":"2007","unstructured":"Dupuis, J., Schwarz, C.: A Bayesian approach to the multistate Jolly-Seber capture-recapture model. Biometrics\u00a063, 1015\u20131022 (2007)","journal-title":"Biometrics"},{"key":"19_CR5","unstructured":"Faber, S.: Silk Conficker. C Plug-in (2009), CERT Code release, http:\/\/tools.netsa.cert.org\/wiki\/display\/tt\/SiLK+Conficker.C+Plugin"},{"issue":"3","key":"19_CR6","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1111\/1467-985X.00143","volume":"162","author":"S. Fienberg","year":"1999","unstructured":"Fienberg, S., Johnson, M., Junker, B.: Classical multilevel and bayesian approaches to population size estimation using multiple lists. Journal of the Royal Statistical Society: Series A\u00a0162(3), 383\u2013405 (1999)","journal-title":"Journal of the Royal Statistical Society: Series A"},{"key":"19_CR7","unstructured":"Fitzgibbon, N., Wood, M.: Conficker.C: A technical analysis (March 2009), Sophos white paper, http:\/\/www.sophos.com\/sophos\/docs\/eng\/marketing_material\/conficker-analysis.pdf"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ipl.2003.08.011","volume":"88","author":"K. Horowitz","year":"2003","unstructured":"Horowitz, K., Malkhi, D.: Estimating network size from local information. Information Processing Letters\u00a088, 237\u2013243 (2003)","journal-title":"Information Processing Letters"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Li, Z., Goyal, A., Chen, Y., Paxson, V.: Automating analysis of large-scale botnet probing events. In: ASAICCS 2009 (March 2009)","DOI":"10.1145\/1533057.1533063"},{"key":"19_CR10","unstructured":"Mane, S., Mopuru, S., Mehra, K., Srivastava, J.: Network size estimation in a peer-to-peer network. Tech. Rep. TR 05-030, University of Minnesota Department of Computer Science and Engineering (2005)"},{"key":"19_CR11","unstructured":"McAfee: Conficker.C over the wire. McAfee Network Security blog publication (March 2009), http:\/\/www.avertlabs.com\/research\/blog\/index.php\/2009\/04\/01\/confickerc-on-the-wire-2"},{"issue":"3","key":"19_CR12","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.392383","volume":"3","author":"V. Paxson","year":"1995","unstructured":"Paxson, V., Floyd, S.: Wide-area traffic: The failure of poisson modeling. IEEE\/ACM Transactions on Networking\u00a03(3), 226\u2013244 (1995)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"19_CR13","unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: Conficker C Actived P2P scanner. SRI international Code release\/document (2009), http:\/\/www.mtc.sri.com\/Conficker\/contrib\/scanner.html"},{"key":"19_CR14","unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: Conficker C analysis. Tech. rep., SRI International (2009)"},{"key":"19_CR15","unstructured":"Porras, P., Saidi, H., Yegneswaran, V.: Conficker C P2P protocol and implementation. Tech. rep., SRI International (2009)"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Psaltoulis, D., Kostoulas, D., Gupta, I., Briman, K., Demers, A.: Decentralized schemes for size estimation in large and dynamic groups. Tech. Rep. UIUCDCS-R-2005-2524, University of Illinois Department of Computer Science (2005)","DOI":"10.1109\/NCA.2005.15"},{"issue":"3","key":"19_CR17","doi-asserted-by":"publisher","first-page":"860","DOI":"10.2307\/2533048","volume":"52","author":"C. Schwarz","year":"1996","unstructured":"Schwarz, C., Arnason, A.: A general methodology for the analysis of capture-recapture experiments in open populations. Biometrics\u00a052(3), 860\u2013873 (1996)","journal-title":"Biometrics"},{"key":"19_CR18","volume-title":"An Introduction to Stochastic Modeling","author":"H. Taylor","year":"1998","unstructured":"Taylor, H., Karlin, S.: An Introduction to Stochastic Modeling. Academic Press, London (1998)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12334-4_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:53:25Z","timestamp":1606186405000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12334-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123337","9783642123344"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12334-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}