{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:31:29Z","timestamp":1725550289694},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540292357"},{"type":"electronic","value":"9783540320715"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11564621_43","type":"book-chapter","created":{"date-parts":[[2005,10,12]],"date-time":"2005-10-12T15:05:50Z","timestamp":1129129550000},"page":"370-375","source":"Crossref","is-referenced-by-count":4,"title":["Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy"],"prefix":"10.1007","author":[{"given":"Dan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Dongyang","family":"Long","sequence":"additional","affiliation":[]},{"given":"Changji","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhanpeng","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"ESEC \u201989","author":"E.H. Spafford","year":"1989","unstructured":"Spafford, E.H.: The internet worm incident. In: Ghezzi, C., McDermid, J.A. (eds.) ESEC 1989. LNCS, vol.\u00a0387. Springer, Heidelberg (1989)"},{"key":"43_CR2","unstructured":"eEye Digital Security, ANALYSIS: .ida \u201cCode Red Worm\u201d, http:\/\/www.eeye.com\/html\/Research\/Advisories\/AL20010717.html"},{"key":"43_CR3","unstructured":"eEye Digital Security, ANALYSIS: CodeRed II Worm, http:\/\/www.eeye.com\/html\/Research\/Advisories\/AL20010804.html"},{"key":"43_CR4","unstructured":"Russell, R., Machie, A.: Code Red II Worm. Tech. Rep, Incident Analysis, Secrity Focus (August 2001)"},{"key":"43_CR5","unstructured":"Machie, A., Roculan, J., Russell, R., Velzen, M.V.: Nimda Worm Analysis, Tech. Rep, Inci-dent Analysis, Security Focus (September 2001)"},{"key":"43_CR6","unstructured":"CERT\/CC, CERT\u00ae\u0302 Advisory CA-2001-26, Nimda Worm, http:\/\/www.cert.org\/advisories\/CA-2001-26.html"},{"key":"43_CR7","unstructured":"CERT\/CC, CERT\u00ae\u0302 Advisory CA-2003-04 MS-SQL Server Worm, http:\/\/www.cert.org\/advisories\/CA-2003-04.html"},{"key":"43_CR8","unstructured":"Moore, D., et al.: The spread of the Sapphire\/Slammer worm, a NANOG presentation, http:\/\/www.nanog.org\/mtg-0302\/ppt\/worm.pdf"},{"key":"43_CR9","unstructured":"EEye Digital Security. Blaster worm analysis (2003), http:\/\/www.eeye.com\/html\/Research\/Advisories\/AL20030811.html"},{"key":"43_CR10","unstructured":"CCERT, CCERT advisory on W32.Sasser, http:\/\/www.ccert.edu.cn\/notice\/show.php?handle=102 (in Chinese)"},{"key":"43_CR11","unstructured":"db.Kingsoft.com., Worms report (2004), http:\/\/db.kingsoft.com\/c\/2004\/12\/29\/164830.shtml (in Chinese)"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Toyoizumi, H., Kara, A.: Predators: good will mobile codes combat against computer vi-ruses, New Security Paradigms Workshop 2002, Virginia Beach, USA, September 23-26 (2002)","DOI":"10.1145\/844102.844105"},{"key":"43_CR13","unstructured":"Herbert HexXer, Code Green, http:\/\/www.securityfocus.com\/archive\/82\/211428"},{"key":"43_CR14","unstructured":"CCERT, CCERT advisory on W32, Nachi.Worm, http:\/\/www.ccert.edu.cn\/announce\/show.php?handle=93 (in Chinese)"},{"key":"43_CR15","unstructured":"Knowles, D., Perriot, F., Szor, P.: Symantec security response: W32\/Nachi.A, http:\/\/www.f-prot.com\/virusinfo\/descriptions\/nachi_A.html"},{"key":"43_CR16","unstructured":"Zou, C.C., Gong, W., Towsley, D.: On the performance of Internet worm scanning strategies, Technical Report, TR-03-CSE-07, Electrical and Computer Engineering Department, Uni-versity of Massachusetts (2003)"},{"key":"43_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-67795-3","volume-title":"Mathematical Modeling in Epidemiology","author":"J.C. Frauenthal","year":"1980","unstructured":"Frauenthal, J.C.: Mathematical Modeling in Epidemiology, New York. Springer, Heidelberg (1980)"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Gong, W., Towsley, D.: Code Red worm propagation modeling and analysis. In: Proc. of the 9th ACM Symp. on Computer and Communication Security, Washington, pp. 138\u2013147 (2002)","DOI":"10.1145\/586110.586130"},{"issue":"8","key":"43_CR19","first-page":"841","volume":"34","author":"Y. Feng","year":"2004","unstructured":"Feng, Y., Haixin, D., Xing, L.: Modeling and analysis on the interaction between the Internet worm and anti-worm. SCIENCE IN CHINA Ser. E Information Sciences\u00a034(8), 841\u2013856 (2004) (in Chinese)","journal-title":"SCIENCE IN CHINA Ser. E Information Sciences"},{"key":"43_CR20","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: 11th Usenix Security Symposium, San Francisco (August 2002)"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for Internet worms, Technical Report, TR-CSE-03-01, Electrical and Computer Engineering Department, Uni-versity of Massachusetts (2003)","DOI":"10.1145\/948109.948136"},{"issue":"8","key":"43_CR22","first-page":"1208","volume":"15","author":"W.P. Wen","year":"2004","unstructured":"Wen, W.P., Qin, S.H., Jiang, J.C., Wang, Y.J.: Research and Development of Internet Worms. J. of Software\u00a015(8), 1208\u20131219 (2004) (in Chinese)","journal-title":"J. of Software"}],"container-title":["Lecture Notes in Computer Science","Distributed and Parallel Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11564621_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:53:22Z","timestamp":1605642802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11564621_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540292357","9783540320715"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11564621_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}