{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:29:24Z","timestamp":1725470964080},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_31","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"427-442","source":"Crossref","is-referenced-by-count":6,"title":["Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation"],"prefix":"10.1007","author":[{"given":"K.","family":"Anagnostakis","sequence":"first","affiliation":[]},{"given":"S.","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"A. D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"given":"M. B.","family":"Greenwald","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Cert Advisory CA-2003-04: MS-SQL Server Worm (January 2003), \n                    \n                      http:\/\/www.cert.org\/advisories\/CA-2003-04.html"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Anagnostakis, K.G., Greenwald, M.B., Ioannidis, S., Keromytis, A.D., Li, D.: A Cooperative Immunization System for an Untrusting Internet. In: Proceedings of the 11\n                    th\n                   IEEE Internation Conference on Networking (ICON) (September\/October 2003), pp. 403\u2013408 (2003)","DOI":"10.1109\/ICON.2003.1266224"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/3-540-36199-5_10","volume-title":"Active Networks","author":"K.G. Anagnostakis","year":"2002","unstructured":"Anagnostakis, K.G., Greenwald, M.B., Ioannidis, S., Miltchev, S.: Open packet monitoring on FLAME: Safety, performance, and applications. In: Sterbenz, J.P.G., Takada, O., Tschudin, C.F., Plattner, B. (eds.) IWAN 2002. LNCS, vol.\u00a02546, pp. 120\u2013131. Springer, Heidelberg (2002)"},{"issue":"4","key":"31_CR4","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.106","volume":"3","author":"M. Bailey","year":"2005","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Watson, D., Nazario, J.: The Blaster Worm: Then and Now. IEEE Security & Privacy\u00a03(4), 26\u201331 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, M., Schultz, M.G., Eskin, E., Hershkop, S., Stolfo, S.J.: MET: An Experimental System for Malicious Email Tracking. In: Proceedings of the New Security Paradigms Workshop (NSPW) (September 2002), pp. 1\u201312 (2002)","DOI":"10.1145\/844102.844104"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast Portscan Detection Using Sequential Hypothesis Testing. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2004)","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"31_CR7","unstructured":"Kannan, J., Subramanian, L., Stoica, I., Katz, R.H.: Analyzing Cooperative Containment of Fast Scanning Worms. In: Proceedings of Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), pp. 17\u201323 (July 2005)"},{"key":"31_CR8","unstructured":"Kim, H., Karp, B.: Autograph: Toward Automated, Distributed Worm Signature Detection. In: Proceedings of the 13\n                    th\n                   USENIX Security Symposium, pp. 271\u2013286 (August 2004)"},{"issue":"6","key":"31_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MSP.2004.115","volume":"2","author":"J.G. Levine","year":"2004","unstructured":"Levine, J.G., Grizzard, J.B., Owen, H.L.: Using Honeynets to Protect Large Enterprise Networks. IEEE Security & Privacy\u00a02(6), 73\u201375 (2004)","journal-title":"IEEE Security & Privacy"},{"issue":"4","key":"31_CR10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSECP.2004.1281250","volume":"2","author":"E. Levy","year":"2004","unstructured":"Levy, E.: Approaching Zero. IEEE Security & Privacy\u00a02(4), 65\u201366 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"31_CR11","unstructured":"Locasto, M., Parekh, J., Stolfo, S., Keromytis, A., Malkin, T., Misra, V.: Collaborative Distributed Intrusion Detection. Technical Report CUCS-012-04, Columbia University Department of Computer Science (2004)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Voelker, G., Savage, S.: Internet Quarantine: Requirements for Containing Self-Propagating Code. In: Proceedings of 22\n                    nd\n                   Annual Joint Conference of IEEE Computer and Communication societies (INFOCOM) (April 2003)","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Nojiri, D., Rowe, J., Levitt, K.: Cooperative response strategies for large scale attack mitigation. In: Proceedings of the 3\n                    rd\n                   DARPA Information Survivability Conference and Exposition (April 2003)","DOI":"10.1109\/DISCEX.2003.1194893"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Porras, P., Briesemeister, L., Levitt, K., Rowe, J., Ting, Y.-C.A.: A Hybrid Quarantine Defense. In: Proceedings of the ACM Workshop on Rapid Malcode (WORM) (October 2004), pp. 73\u201382 (2004)","DOI":"10.1145\/1029618.1029630"},{"key":"31_CR15","unstructured":"Rajab, M.A., Monrose, F., Terzis, A.: On the Effectiveness of Distributed Worm Monitoring. In: Proceedings of the 14\n                    th\n                   USENIX Security Symposium, pp. 225\u2013237 (August 2005)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Sidiroglou, S., Keromytis, A.D.: A Network Worm Vaccine Architecture. In: Proceedings of the IEEE Workshop on Enterprise Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security (June 2003), pp. 220\u2013225 (2003)","DOI":"10.1109\/ENABL.2003.1231411"},{"key":"31_CR17","unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 6\n                    th\n                   Symposium on Operating Systems Design & Implementation (OSDI) (December 2004)"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Toyoizumi, H., Kara, A.: Predators: Good Will Mobile Codes Combat against Computer Viruses. In: Proceedings of the New Security Paradigms Workshop (NSPW), pp. 13\u201321 (September 2002)","DOI":"10.1145\/844102.844105"},{"key":"31_CR19","unstructured":"Wu, J., Vangala, S., Gao, L., Kwiat, K.: An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques. In: Proceedings of the Network and Distributed System Security (NDSS) Symposium, pp. 143\u2013156 (February 2004)"},{"key":"31_CR20","unstructured":"Yegneswaran, V., Barford, P., Jha, S.: Global Intrusion Detection in the DOMINO Overlay System. In: Proceedings of NDSS (February 2004)"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and Early Warning for Internet Worms. In: Proceedings of the 10\n                    th\n                   ACM International Conference on Computer and Communications Security (CCS), October 2003, pp. 190\u2013199 (2003)","DOI":"10.1145\/948109.948136"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:14:43Z","timestamp":1619507683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11836810_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}