{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T16:28:37Z","timestamp":1649089717337},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2006,6,27]],"date-time":"2006-06-27T00:00:00Z","timestamp":1151366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1007\/s10878-006-8903-1","type":"journal-article","created":{"date-parts":[[2006,6,28]],"date-time":"2006-06-28T06:37:41Z","timestamp":1151476661000},"page":"35-56","source":"Crossref","is-referenced-by-count":2,"title":["Resource allocation for restoration of compromised systems"],"prefix":"10.1007","volume":"12","author":[{"given":"Qunwei","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Sibabrata","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,6,27]]},"reference":[{"key":"8903_CR1","doi-asserted-by":"crossref","unstructured":"Antonatos S, Akritidis P, Markatos EP, Anagnostakis KG (2005) Defending against hitlist worms using network address space randomization. In WORM \u201905: Proceedings of the 2005 ACM workshop on Rapid malcode, New York, NY, USA, ACM Press, 30\u201340","DOI":"10.1145\/1103626.1103633"},{"key":"8903_CR2","unstructured":"Baumol WJ, Blinder AS (2004) Economics: Principles and Policy. South-Western College Pub"},{"issue":"12","key":"8903_CR3","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/501317.501328","volume":"44","author":"H Berghel","year":"2001","unstructured":"Berghel H (2001) The code red worm. Commun. ACM 44(12):15\u201319","journal-title":"Commun. ACM"},{"key":"8903_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3516-1","volume-title":"Mathematical Models in Population Biology and Epidemiology","author":"F Brauer","year":"2001","unstructured":"Brauer F, Castiloo-Chavez C (2001) Mathematical Models in Population Biology and Epidemiology. Springer-Verlag, New York"},{"key":"8903_CR5","doi-asserted-by":"crossref","unstructured":"Brown A (2003) A recovery-oriented approach to dependable services: Repairing past errors with system-wide undo. Technical Report UCB\/\/CSD-04-1304, UC Berkeley Computer Science, December","DOI":"10.21236\/ADA603322"},{"key":"8903_CR6","doi-asserted-by":"crossref","unstructured":"Brown A, Chung L, Kakes W, Ling C, and Patterson D (2004) Experience with evaluating human-assisted recovery processes. In Proceedings of the 2004 International Conference on Dependable Systems and Networks","DOI":"10.1109\/DSN.2004.1311910"},{"key":"8903_CR7","doi-asserted-by":"crossref","unstructured":"Castaneda F, Sezer EC, Xu J (2004) Worm vs. worm: preliminary study of an active counter-attack mechanism. In WORM \u201904: Proceedings of the 2004 ACM workshop on Rapid malcode, New York, NY, USA, ACM Press, 83\u201393","DOI":"10.1145\/1029618.1029631"},{"key":"8903_CR8","unstructured":"Chen M, Kiciman E, Fratkin E, Brewer E, Fox A (2002) Pinpoint: Problem determination in large, dynamic, internet services. In Proceedings of the International Conference on Dependable Systems and Networks (IPDS Track)"},{"key":"8903_CR9","doi-asserted-by":"crossref","unstructured":"Chen Z, Gao L, Kwiat K (2003) Modeling the spread of active worms. In Proceedings of INFOCOM 2003, IEEE, 1890\u20131900.","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"8903_CR10","doi-asserted-by":"crossref","unstructured":"Chen Z, Ji C (2005) A self-learning worm using importance scanning. In WORM \u201905: Proceedings of the 2005 ACM workshop on Rapid malcode, New York, NY, USA, ACM Press, 22\u201329","DOI":"10.1145\/1103626.1103632"},{"key":"8903_CR11","unstructured":"Dubendorfer T, Wagner A, Plattner B (2004) An economic damage model for large-scale internet attacks. In Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WET ICE 2004)"},{"key":"8903_CR12","doi-asserted-by":"crossref","unstructured":"Dwork C, Naor M (1993) Pricing via processing or combatting junk mail. In CRYPTO \u201992: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, London, UK, Springer-Verlag, 139\u2013147","DOI":"10.1007\/3-540-48071-4_10"},{"key":"8903_CR13","doi-asserted-by":"crossref","unstructured":"Goel A, Po K, Farhadi K, Li Z, de Lara E (2005) The taser intrusion recovery system. In SOSP \u201905: Proceedings of the twentieth ACM symposium on Operating systems principles, New York, NY, USA, ACM, Press, 163\u2013176.","DOI":"10.1145\/1095810.1095826"},{"issue":"4","key":"8903_CR14","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon LA, Loeb MP (2002) The economics of information security investment. ACM Transactions on Information and System Security, 5(4):438\u2013457","journal-title":"ACM Transactions on Information and System Security"},{"key":"8903_CR15","unstructured":"Gray J (1986) Why do computers stop and what can be done about it? In Proceedings of the 5th Symposium on Reliablity in Distributed Software and Database Systems"},{"key":"8903_CR16","unstructured":"Kuhn HW, Tucker AW (1951) Nonlinear programming. In Proceedings of the Second Berkeley Symposium on Mathematical Statistics and Probability, University of California, Press, 481\u2013492"},{"key":"8903_CR17","doi-asserted-by":"crossref","unstructured":"Lala JH (2003) Introduction. In Proceedings of the Foundations of Intrusion Tolerant Systems (OASIS\u201903), IEEE, x\u2013xix.","DOI":"10.1109\/FITS.2003.1264923"},{"key":"8903_CR18","doi-asserted-by":"crossref","unstructured":"Liljenstam M, Nicol DM, Berk VH, Gray RS (2003) Simulating realistic network worm traffic for worm warning system design and testing. In WORM \u201903: Proceedings of the 2003 ACM workshop on Rapid malcode, New York, NY, USA, ACM Press, 24\u201333.","DOI":"10.1145\/948187.948193"},{"key":"8903_CR19","doi-asserted-by":"crossref","unstructured":"Ma J, Voelker GM, Savage S (2005) Self-stopping worms. In WORM \u201905: Proceedings of the 2005 ACM workshop on Rapid malcode, New York, NY, USA ACM Press, 12\u201321.","DOI":"10.1145\/1103626.1103630"},{"key":"8903_CR20","unstructured":"MapleSoft. (2004) Maple. In http:\/\/www.maplesoft.com"},{"issue":"1\u20132","key":"8903_CR21","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3233\/JCS-2001-91-206","volume":"9","author":"C Meadows","year":"2001","unstructured":"Meadows C (2001) A cost-based framework for analysis of denial of service in networks. Journal of Computer Security, 9(1\u20132):143\u2013164","journal-title":"Journal of Computer Security"},{"key":"8903_CR22","doi-asserted-by":"crossref","unstructured":"Moore D, Shannon C, Brown J (2002) Code-red: a case study on the spread and victims of an internet worm. In Proceedings of the ACM SIGCOMM\/USENIX Internet Measurement Workshop, ACM, 273\u2013284.","DOI":"10.1145\/637201.637244"},{"key":"8903_CR23","unstructured":"Oppenheimer D, Ganapathi A, Patterson D (2003) Why do internet services fail, and what can be done about it? In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (USITS \u201903)"},{"key":"8903_CR24","unstructured":"Patterson D (2002) A simple way to estimate the cost of downtime. In Proceedings of LISA \u201902: Sixteenth Systems Administration Conference, 185\u2013188"},{"key":"8903_CR25","unstructured":"Patterson D, Brown A, Broadwell P, Candea G, Chen M, Cutler J, Enriquez P, Fox A, Kiciman E, Merzbacher M, Oppenheimer D, Sastry N, Tetzlaff W, Traupman J, Treuhaft N (2002) Recovery-oriented computing (roc): Motivation, definition, techniques, and case studies. Technical Report UCB\/\/CSD-02-1175, UC Berkeley Computer Science"},{"key":"8903_CR26","unstructured":"Ray S, Zheng Q, Hong X, Kwiat K (2006) Integrity function\u2014a framework for server replication and placement in adversarial environment. In submitted to IEEE Transactions on Parallel and Distributed Systems"},{"key":"8903_CR27","doi-asserted-by":"crossref","unstructured":"Rohloff K, Basar T (2005) The detection of rcs worm epidemics. In WORM \u201905: Proceedings of the 2005 ACM workshop on Rapid malcode, New York, NY, USA, ACM Press, 81\u201386","DOI":"10.1145\/1103626.1103642"},{"key":"8903_CR28","doi-asserted-by":"crossref","unstructured":"Verissimo PE, Neves NF, Correia MP (2003) Intrusion tolerant architectures: Concepts and design. Architecting Dependable System, Lecture Notes in Computer Science, 2677(44):3\u201336","DOI":"10.1007\/3-540-45177-3_1"},{"key":"8903_CR29","doi-asserted-by":"crossref","unstructured":"Wagner A, Dubendorfer T, Plattner B, Hiestand R (2003) Experiences with worm propagation simulations. In WORM \u201903: Proceedings of the 2003 ACM workshop on Rapid malcode, New York, NY, USA, ACM Press, 34\u201341","DOI":"10.1145\/948187.948194"},{"key":"8903_CR30","doi-asserted-by":"crossref","unstructured":"Zou C, Gong W, Towsley D (2002) Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM conference on Computer and communications security, ACM, 138\u2013147","DOI":"10.1145\/586110.586130"},{"issue":"5","key":"8903_CR31","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/TNET.2005.857113","volume":"13","author":"CC Zou","year":"2005","unstructured":"Zou CC, Gong W, Towsley D, Gao L (2005) The monitoring and early detection of internet worms. IEEE\/ACM Trans. Netw. 13(5):961\u2013974","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-006-8903-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10878-006-8903-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-006-8903-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:18:10Z","timestamp":1559261890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10878-006-8903-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6,27]]},"references-count":31,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["8903"],"URL":"https:\/\/doi.org\/10.1007\/s10878-006-8903-1","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,6,27]]}}}