{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:38:23Z","timestamp":1723034303411},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,26]]},"DOI":"10.1145\/1374618.1374640","type":"proceedings-article","created":{"date-parts":[[2008,5,28]],"date-time":"2008-05-28T16:50:20Z","timestamp":1211993420000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Improving sensor network immunity under worm attacks"],"prefix":"10.1145","author":[{"given":"Yi","family":"Yang","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,5,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ATmega128(L). http:\/\/www.atmel.com\/dyn\/resources\/prod- documents\/doc2467.pdf. ATmega128(L). http:\/\/www.atmel.com\/dyn\/resources\/prod- documents\/doc2467.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"Backtracking. http:\/\/en.wikipedia.org\/wiki\/Backtracking. Backtracking. http:\/\/en.wikipedia.org\/wiki\/Backtracking."},{"key":"e_1_3_2_1_3_1","unstructured":"Introduction to Percolation Theory. http:\/\/garnet.berkeley.edu\/ jqwu\/paper1\/paper1.html. Introduction to Percolation Theory. http:\/\/garnet.berkeley.edu\/ jqwu\/paper1\/paper1.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Memory Sections in Related Pages. http:\/\/hubbard.engr.scu.edu\/embedded\/avr\/doc\/avr-libc\/avr-libc-user-manual\/. Memory Sections in Related Pages. http:\/\/hubbard.engr.scu.edu\/embedded\/avr\/doc\/avr-libc\/avr-libc-user-manual\/."},{"key":"e_1_3_2_1_5_1","volume-title":"Crossbow Technology","author":"Motes Mica","unstructured":"Mica Motes . Crossbow Technology , Inc . http:\/\/www.xbow.com. Mica Motes. Crossbow Technology, Inc. http:\/\/www.xbow.com."},{"key":"e_1_3_2_1_6_1","unstructured":"MSP430 Microcontrollers. Texas Instrument. http:\/\/www.ti.com\/. MSP430 Microcontrollers. Texas Instrument. http:\/\/www.ti.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Percolation theory. http:\/\/en.wikipedia.org\/wiki\/Percolation-theory. Percolation theory. http:\/\/en.wikipedia.org\/wiki\/Percolation-theory."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180359"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095714.1095759"},{"key":"e_1_3_2_1_10_1","volume-title":"The mathematical theory of infectious diseases and its applications","author":"Bailey N.","year":"1975","unstructured":"N. Bailey . The mathematical theory of infectious diseases and its applications . Hafner Press , New York , 1975 . N. Bailey. The mathematical theory of infectious diseases and its applications. Hafner Press, New York, 1975."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128837"},{"key":"e_1_3_2_1_13_1","volume-title":"WOWMOM '06","author":"De P.","unstructured":"P. De , Y. Liu , and S. K. Das . Modeling node compromise spread in wireless sensor networks using epidemic theory . In WOWMOM '06 . P. De, Y. Liu, and S. K. Das. Modeling node compromise spread in wireless sensor networks using epidemic theory. In WOWMOM '06."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190095.1190160"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE INFOCOM","author":"Du W.","year":"2004","unstructured":"W. Du , J. Deng , Y. S. Han , S. Chen , and P. Varshney . A key management scheme for wireless sensor networks using deployment knowledge . In IEEE INFOCOM , 2004 . W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE INFOCOM, 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.2"},{"key":"e_1_3_2_1_17_1","volume-title":"HOTOS '97","author":"Forrest S.","unstructured":"S. Forrest , A. Somayaji , and D. Ackley . Building diverse computer systems . In HOTOS '97 . S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In HOTOS '97."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498374"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352563"},{"key":"e_1_3_2_1_21_1","volume-title":"Computer Algorithms\/C++","author":"Horowitz E.","year":"1996","unstructured":"E. Horowitz , S. Sahni , and S. Rajasekaran . Computer Algorithms\/C++ . Computer Science Press , 1996 . E. Horowitz, S. Sahni, and S. Rajasekaran. Computer Algorithms\/C++. Computer Science Press, 1996."},{"key":"e_1_3_2_1_22_1","volume-title":"Graph Coloring Problems","author":"Jensen T. R.","year":"1995","unstructured":"T. R. Jensen . Graph Coloring Problems . Wiley , 1995 . T. R. Jensen. Graph Coloring Problems. Wiley, 1995."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.50"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236404"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.904958"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030101"},{"key":"e_1_3_2_1_28_1","unstructured":"A. One. Smashing the stack for fun and profit. Phrack 49. http:\/\/www.phrack.org\/show.php?p=49a=14. A. One. Smashing the stack for fun and profit. Phrack 49. http:\/\/www.phrack.org\/show.php?p=49a=14."},{"key":"e_1_3_2_1_29_1","volume-title":"Epidemics and immunization in scale-free networks","author":"Pastor-Satorras R.","year":"2002","unstructured":"R. Pastor-Satorras and A. Vespignani . Epidemics and immunization in scale-free networks , chapter Handbook of graphs and networks: from the genome to the Internet. 2002 . R. Pastor-Satorras and A. Vespignani. Epidemics and immunization in scale-free networks, chapter Handbook of graphs and networks: from the genome to the Internet. 2002."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720288"},{"key":"e_1_3_2_1_32_1","volume-title":"ACM WORM","author":"Vojnovic M.","year":"2005","unstructured":"M. Vojnovic and A. Ganesh . On the race of worms, alerts and patches . In ACM WORM 2005 . M. Vojnovic and A. Ganesh. On the race of worms, alerts and patches. In ACM WORM 2005."},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Secucrity'06","author":"Wang X.","year":"2006","unstructured":"X. Wang , C. Pan , P. Liu , and S. Zhu . SigFree: A Signature-free Buffer Overflow Attack Blocker . In USENIX Secucrity'06 , July 2006 . X. Wang, C. Pan, P. Liu, and S. Zhu. SigFree: A Signature-free Buffer Overflow Attack Blocker. In USENIX Secucrity'06, July 2006."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132944"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508177"}],"event":{"name":"MobiHoc08: The Ninth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Hong Kong Hong Kong, China","acronym":"MobiHoc08","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1374618.1374640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T17:55:24Z","timestamp":1673114124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374618.1374640"}},"subtitle":["a software diversity approach"],"short-title":[],"issued":{"date-parts":[[2008,5,26]]},"references-count":32,"alternative-id":["10.1145\/1374618.1374640","10.1145\/1374618"],"URL":"https:\/\/doi.org\/10.1145\/1374618.1374640","relation":{},"subject":[],"published":{"date-parts":[[2008,5,26]]},"assertion":[{"value":"2008-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}