{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T12:10:02Z","timestamp":1738325402548,"version":"3.35.0"},"publisher-location":"Dordrecht","reference-count":16,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9781402087400"},{"type":"electronic","value":"9781402087417"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-1-4020-8741-7_15","type":"book-chapter","created":{"date-parts":[[2008,8,11]],"date-time":"2008-08-11T16:51:59Z","timestamp":1218473519000},"page":"79-84","source":"Crossref","is-referenced-by-count":0,"title":["Agent Based Framework for Worm Detection"],"prefix":"10.1007","author":[{"given":"A.M.","family":"El-Menshawy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H.M.","family":"Faheem","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T.","family":"Al-Arif","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Z.","family":"Taha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"S. Staniford, V. Paxson, and N. Weaver, \u201cHow to 0wn the Internet in Your Spare Time,\u201d in Proceedings of the 11th USENIX Security Symposium (Security \u20182002), San Francisco, California, USA, Aug. 2002."},{"key":"15_CR2","unstructured":"D. Moore, C. Shannon, G. M. Voelker, and S. Savage, \u201cInternet Quarantine: Requirements for Containing Self-Propagating Code,\u201d in Proceedings of the22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM \u20182003), San Francisco, California, USA, Apr. 2003."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"S. Chen and Y. Tang, \u201cSlowing Down Internet Worms ,\u201d in Proceeding of the24th International Conference on Distributed Computing and Systems (ICDCS \u20182004),, Tokyo,Japan, Mar. 2004.","DOI":"10.1109\/ICDCS.2004.1281596"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"C. Kruegel and G. Vigna, \u201cAnomaly Detection of Web-based Attacks,\u201d in Proceedings of the10th ACM Conference on Computer and Communication Security (CCS\u20192003). Washington D.C., USA: ACM Press, Oct. 2003, pp. 251\u2013261.","DOI":"10.1145\/948109.948144"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, \u201cInside the Slammer Worm,\u201d IEEE Magazine of Security and Privacy, pp. 33\u201339, July 2003.","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"15_CR6","unstructured":"C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, \u201cStackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,\u201d in Proceedings of the7th USENIX Security Conference (Security \u20181998), San Antonio, Texas, USA, Jan. 1998, pp. 63\u201378."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"M. Eichin and J. Rochlis, \u201cWith Microscope and Tweezers: An Analysis of the Internet Virus of November 1988,\u201d in Proceedings of the 1989 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 1989, pp. 326\u2013344.","DOI":"10.1109\/SECPRI.1989.36307"},{"key":"15_CR8","unstructured":"Y. Tang and S. Chen. Defending against Internet worms: A signature-based approach. In Proc. of IEEE INFOCOM\u201905, Miami, Florida, May 2005."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"M. Liljenstam, Y. Yuan, B. Premore, and D. Nicol. A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations. Proc. of 10th IEEE\/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), October 2002.","DOI":"10.1109\/MASCOT.2002.1167067"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code. Proc. of IEEE INFOCOM\u20192003, March 2003.","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"J. Rochlis and M. Eichin. WithMicroscope and Tweezers: The Worm from MIT\u2019s Perspective. Communication of the ACM, 32(6):689\u2013698, June 1989.","DOI":"10.1145\/63526.63528"},{"key":"15_CR12","unstructured":"S. Staniford, V. Paxson, and N.Weaver. How to Own the Internet in Your Spare Time. Proc. of 11th USENIX Security Symposium, San Francisco, August 2002."},{"key":"15_CR13","unstructured":"M. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. Proc. of Annual Computer Security Application Conference (ACSAC\u201902), December 2002."},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"C. C. Zou, W. Gong, and D. Towsley. Code Red Worm Propagation Modeling and Analysis. Proc. of 9th ACM Conference","DOI":"10.1145\/586110.586130"},{"key":"15_CR15","volume-title":"Artificial Intelligence, A Modern Approach","author":"S. Russel","year":"1995","unstructured":"S. Russel and P. Norvig, \u201cArtificial Intelligence, A Modern Approach,\u201d Printice Hall Inc., New Jersey, USA, 1995."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"H. M. Faheem, \u201cA MULTIAGENT-BASED APPROACH FOR MANAGING SECURITY POLICY,\u201d Wireless and Optical Communications Networks, 2005.Second IFIP International Conference, March 2005 pp. 351 - 356","DOI":"10.1109\/WOCN.2005.1436047"}],"container-title":["Advances in Computer and Information Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4020-8741-7_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T11:39:50Z","timestamp":1738323590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4020-8741-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9781402087400","9781402087417"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-1-4020-8741-7_15","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}