{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:07Z","timestamp":1725551587290},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_3","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"36-48","source":"Crossref","is-referenced-by-count":1,"title":["Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior"],"prefix":"10.1007","author":[{"given":"Kevin R. B.","family":"Butler","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick D.","family":"McDaniel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/66093.66095","volume":"19","author":"E.H. Spafford","year":"1989","unstructured":"Spafford, E.H.: The Internet worm program: An analysis. ACM Computer Communication Review\u00a019, 17\u201357 (1989)","journal-title":"ACM Computer Communication Review"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer worm. IEEE Security and Privacy Magazine, 33\u201339 (2003)","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Staniford, S., Moore, D., Paxson, V., Weaver, N.: The top speed of flash worms. In: Proceedings of the 2nd Workshop on Rapid Malcode (WORM 2004), Fairfax, VA, USA (2004)","DOI":"10.1145\/1029618.1029624"},{"key":"3_CR4","unstructured":"Zimmer, C.: Parasite Rex: Inside the Bizarre World of Nature\u2019s Most Dangerous Creatures. Free Press (2001)"},{"key":"3_CR5","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1128\/CMR.11.4.569","volume":"11","author":"E.Y. Denkers","year":"1998","unstructured":"Denkers, E.Y., Gazzinelli, R.T.: Regulation and function of T-cell-mediated immunity during Toxoplasma gondii infection. Clinical Microbiology Reviews\u00a011, 569\u2013588 (1998)","journal-title":"Clinical Microbiology Reviews"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Berdoy, M., Webster, J., Macdonald, D.W.: Fatal attraction in rats infected with Toxoplasma gondii. In: Proceedings of the Royal Society of London: Biological Sciences, London, UK, pp. 1591\u20131594 (2000)","DOI":"10.1098\/rspb.2000.1182"},{"key":"3_CR7","unstructured":"Centers for Disease Control: Parasitic disease information: Schistosomiasis fact sheet (2005), http:\/\/www.cdc.gov\/ncidod\/dpd\/parasites\/schistosomiasis\/factsht_schistosomiasis.htm"},{"key":"3_CR8","doi-asserted-by":"crossref","first-page":"S107","DOI":"10.1017\/S0031182097001765","volume":"115","author":"J.H. McKerrow","year":"1997","unstructured":"McKerrow, J.H.: Cytokine induction and exploitation in schistosome infections. Parisitology\u00a0115, S107\u2013S112 (1997)","journal-title":"Parisitology"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1017\/S0031182000055323","volume":"85","author":"R. Anderson","year":"1982","unstructured":"Anderson, R., Mercer, J., Wilson, R., Carter, N.: Transmission of Schistosoma mansoni from man to snail: experimental studies of miracidial survival and infectivity in relation to larval age, water temperature, host size and host age. Parasitology\u00a085, 339\u2013360 (1982)","journal-title":"Parasitology"},{"key":"3_CR10","volume-title":"The Origin of Species","author":"C. Darwin","year":"1872","unstructured":"Darwin, C.: The Origin of Species, 6th edn. John Murray, London (1872)","edition":"6"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 1st Workshop on Rapid Malcode (WORM 2003), Washington, DC, USA (2003)","DOI":"10.1145\/948187.948190"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Jaiswal, S., Iannaccone, G., Diot, C., Kurose, J., Towsley, D.: Inferring TCP connection characteristics through passive measurements. In: Proceedings of IEEE INFOCOM 2004, Hong Kong (2004)","DOI":"10.1109\/INFCOM.2004.1354571"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-46419-0_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L. Alfaro de","year":"2000","unstructured":"de Alfaro, L., Kwiatkowska, M., Norman, G., Parker, D., Segala, R.: Symbolic model checking of probabilistic processes using MTBDDs and the Kroenecker representation. In: Schwartzbach, M.I., Graf, S. (eds.) TACAS 2000. LNCS, vol.\u00a01785, p. 395. Springer, Heidelberg (2000)"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s10009-002-0104-3","volume":"5","author":"S. Edelkamp","year":"2004","unstructured":"Edelkamp, S., Leue, S., Lluch-Lafuente, A.: Directed explicit-state model checking in the validation of communication protocols. International Journal on Software Tools for Technology Transfer (STTT)\u00a05, 247\u2013267 (2004)","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"key":"3_CR15","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/2.587545","volume":"30","author":"J. Voas","year":"1997","unstructured":"Voas, J., McGraw, G., Kassab, L., Voas, L.: A \u201ccrystal ball\u201d for software liability. IEEE Computer\u00a030, 29\u201336 (1997)","journal-title":"IEEE Computer"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Rubin, S., Jha, S., Miller, B.P.: Automatic generation and analysis of NIDS attacks. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004),Tuscon, AZ, USA (2004)","DOI":"10.1109\/CSAC.2004.9"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Machine Learning: ECML-93","author":"W. Spears","year":"1993","unstructured":"Spears, W., DeJong, K., Baeck, T., Fogel, D., de Garis, H.: An overview of evolutionary computation. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol.\u00a0667, Springer, Heidelberg (1993)"},{"key":"3_CR18","unstructured":"Marty, R.: THOR: A tool to test intrusion detection systems by variations of attacks. Master\u2019s thesis, Swiss Federal Institute of Technology, Zurich, Switzerland (2002)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Rubin, S., Jha, S., Miller, B.P.: Language-based generation and evaluation of NIDS signatures. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Oakland, CA, USA (2005)","DOI":"10.1109\/SP.2005.10"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Qiu, D., Srikant, R.: Modeling and performance analysis of Bit Torrent-like peer-to-peer networks. In: Proceedings of ACM SIGCOMM 2004, Portland, OR, USA (2004)","DOI":"10.1145\/1015467.1015508"},{"key":"3_CR21","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA (2002)"},{"key":"3_CR22","unstructured":"Bu, T., Towsley, D.: On distinguishing between Internet power law topology generators. In: Proceedings of IEEE INFOCOM 2002, New York, NY, USA (2002)"},{"key":"3_CR23","unstructured":"Greenwood, M., Bradford Hill, A., Topley, W.W.C., Wilson, J.: Experimental Epidemiology. His Majety\u2019s Stationary Office, London (1936) Privy Council, Medical Research Council"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1038\/280361a0","volume":"280","author":"R. Anderson","year":"1979","unstructured":"Anderson, R., May, R.: Population biology of infectious diseases, part 1. Nature\u00a0280, 361\u2013367 (1979)","journal-title":"Nature"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1038\/280455a0","volume":"280","author":"R. May","year":"1979","unstructured":"May, R., Anderson, R.: Population biology of infectious diseases, part 2. Nature\u00a0280, 455\u2013461 (1979)","journal-title":"Nature"},{"key":"3_CR26","volume-title":"The Epidemiology and Control of Malaria","author":"G. MacDonald","year":"1957","unstructured":"MacDonald, G.: The Epidemiology and Control of Malaria. Oxford University Press, New York (1957)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Davies, C., Webster, J., Woolhouse, M.: Trade-offs in the evolution of virulence in an indirectly transmitted macroparasite. In: Proceedings of the Royal Society of London: Biological Sciences, London, UK, pp. 251\u2013257 (2001)","DOI":"10.1098\/rspb.2000.1367"},{"key":"3_CR28","doi-asserted-by":"crossref","first-page":"S103","DOI":"10.1017\/S0031182000073054","volume":"100","author":"B. Levin","year":"1990","unstructured":"Levin, B., Svanborg-Eden, C.: Selection and evolution of virulence in bacteria: an ecumenical and modest suggestion. Parasitology\u00a0100, S103\u2013S115 (1990)","journal-title":"Parasitology"},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"423","DOI":"10.2307\/1943014","volume":"60","author":"G. Dwyer","year":"1990","unstructured":"Dwyer, G., Levin, S., Buttel, L.: A simulation model of the population dynamics and evolution of myxomatosis. Ecological Monographs\u00a060, 423\u2013447 (1990)","journal-title":"Ecological Monographs"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1038\/279150a0","volume":"279","author":"R. Anderson","year":"1979","unstructured":"Anderson, R.: Parasite pathogenicity and the depression of host population equilibria. Nature\u00a0279, 150\u2013152 (1979)","journal-title":"Nature"},{"key":"3_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev.es.01.110170.000245","volume":"1","author":"R. Lewontin","year":"1970","unstructured":"Lewontin, R.: The units of selection. Annual Review of Ecology and Systematics\u00a01, 1\u201318 (1970)","journal-title":"Annual Review of Ecology and Systematics"},{"key":"3_CR32","doi-asserted-by":"crossref","first-page":"S89","DOI":"10.1017\/S0031182000073042","volume":"100","author":"R. May","year":"1990","unstructured":"May, R., Anderson, R.: Parasite-host coevolution. Parasitology\u00a0100, S89\u2013S101 (1990)","journal-title":"Parasitology"},{"key":"3_CR33","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1086\/283708","volume":"117","author":"S. Levin","year":"1981","unstructured":"Levin, S., Pimentel, D.: Selection of intermediate rates of increase in parasite-host systems. The American Naturalist\u00a0117, 308\u2013315 (1981)","journal-title":"The American Naturalist"},{"key":"3_CR34","unstructured":"Chistodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 13th USENIX Security Symposium, Washington, DC, USA (2003)"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Ellis, D.R., Aiken, J.G., Attwood, K.S., Tenaglia, S.D.: A behavioral approach to worm detection. In: Proceedings of the 2nd Workshop on Rapid Malcode (WORM 2004), Fairfax, VA, USA (2004)","DOI":"10.1145\/1029618.1029625"},{"key":"3_CR36","unstructured":"Kim, H.A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Proceedings of the 14th USENIX Security Symposium, San Diego, CA, USA (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:58Z","timestamp":1605643378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/11593980_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}