{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:36:52Z","timestamp":1725543412077},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540367079"},{"type":"electronic","value":"9783540368601"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11802372_80","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T10:26:36Z","timestamp":1153736796000},"page":"690-695","source":"Crossref","is-referenced-by-count":1,"title":["Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata"],"prefix":"10.1007","author":[{"given":"Jingbo","family":"Hao","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Boyun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"80_CR1","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/0167-4048(89)90089-8","volume":"8","author":"F. Cohen","year":"1989","unstructured":"Cohen, F.: Computational Aspects of Computer Viruses. Computers & Security\u00a08(4), 325\u2013344 (1989)","journal-title":"Computers & Security"},{"key":"80_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/0-387-34799-2_28","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"L.M. Adleman","year":"1990","unstructured":"Adleman, L.M.: An Abstract Theory of Computer Viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 354\u2013374. Springer, Heidelberg (1990)"},{"key":"80_CR3","unstructured":"Leitold, F.: Mathematical Model of Computer Viruses. In: EICAR 2000 Best Paper Proceedings, Brussels, Belgium, pp. 194\u2013217 (2000)"},{"issue":"1","key":"80_CR4","doi-asserted-by":"crossref","first-page":"58","DOI":"10.5840\/monist19998216","volume":"82","author":"P. Wegner","year":"1999","unstructured":"Wegner, P.: Towards Empirical Computer Science. The Monist\u00a082(1), 58\u2013108 (1999)","journal-title":"The Monist"},{"issue":"2","key":"80_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.ic.2004.07.002","volume":"194","author":"D. Goldin","year":"2004","unstructured":"Goldin, D., Smolka, S., Attie, P., Sonderegger, E.: Turing Machines, Transition Systems, and Interaction. Information and Computation\u00a0194(2), 101\u2013128 (2004)","journal-title":"Information and Computation"},{"key":"80_CR6","unstructured":"Tosic, P.T.: On Modeling and Analyzing Sparsely Networked Large-Scale Multi-Agent Systems with Cellular and Graph Automata. In: Proceedings of the 2nd Workshop on Modeling of Complex Systems by Cellular Automata, Reading, UK (to appear, 2006)"},{"key":"80_CR7","doi-asserted-by":"crossref","unstructured":"Brooks, R., Orr, N., Zachary, J., Griffin, C.: An Interacting Automata Model for Network Protection. In: Proceedings of the 5th International Conference on Information Fusion, Annapolis, USA, pp. 1090\u20131097 (2002)","DOI":"10.1109\/ICIF.2002.1020934"},{"key":"80_CR8","unstructured":"Hao, J., Yin, J., Zhang, B.: Proof of the Virus Decidability Theorem Based on a Universal Turing Machine Model (in Chinese). In: Proceedings of the National Annual Conference on Theoretical Computer Science, Qinhuangdao, China, pp. 243\u2013245 (2005)"},{"key":"80_CR9","unstructured":"Nechvatal, J., Sikora, S.: Red Ovoid Attack - Computer Virus Project 2.0 (2001), \n                    \n                      http:\/\/www.computerfinearts.com\/collection\/nechvatal\/redattack\/"}],"container-title":["Lecture Notes in Computer Science","Agent Computing and Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11802372_80.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:25:31Z","timestamp":1619508331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11802372_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540367079","9783540368601"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11802372_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}