{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:51:47Z","timestamp":1743051107292,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319721491"},{"type":"electronic","value":"9783319721507"}],"license":[{"start":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T00:00:00Z","timestamp":1511740800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72150-7_55","type":"book-chapter","created":{"date-parts":[[2017,11,26]],"date-time":"2017-11-26T08:21:29Z","timestamp":1511684489000},"page":"680-691","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Epidemiological Study of Browser-Based Malware for University Network with Partially Observed Flow Data"],"prefix":"10.1007","author":[{"given":"Sindhura","family":"Jaladhanki","sequence":"first","affiliation":[]},{"given":"Natallia","family":"Katenka","sequence":"additional","affiliation":[]},{"given":"Lisa","family":"DiPippo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,27]]},"reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Kolaczyk, E.D.: Statistical Analysis of Network Data: Methods and Models. Springer Series in Statistics (2009)","DOI":"10.1007\/978-0-387-88146-1"},{"key":"55_CR2","unstructured":"Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.: Automated web patrol with strider HoneyMonkeys. In: Proceedings of the Network and Distributed System Security Symposium (2006)"},{"key":"55_CR3","unstructured":"Savage, S., Voelker, G., Varghese, G., Paxson, V., Weaver, N.: NSF CyberTrust Center Proposal. Center for Internet Epidemiology and Defenses (2004)"},{"key":"55_CR4","unstructured":"Paxson, V., Adams, A., Mathis, M.: Experiences with NIMI. In: Proceedings of Passive\/Active Measurement (PAM) (2000)"},{"key":"55_CR5","unstructured":"Wagstaff, K., Sottile, C.: Cyberattack 101: Why Hackers are Going After Universities. NBC News (2015)"},{"key":"55_CR6","unstructured":"Bing, C.: Universities, not health care systems, facing highest number of ransomware attacks. Fedscoop (2016)"},{"key":"55_CR7","unstructured":"Harris, C.E., Hammargren, L.R.: Higher Education\u2019s Vulnerability to Cyber-Attacks. University Business (2016)"},{"key":"55_CR8","unstructured":"Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The ghost in the browser analysis of web-based malware. In: Proceedings of the First Workshop on Hot Topics in Understanding Botnets (2007)"},{"key":"55_CR9","unstructured":"Retrieved from \u201chttps:\/\/advisory.ey.com\/cybersecurity\/cyber-threats-higher-education-institutions\u201d, EY Building a better working world"},{"key":"55_CR10","unstructured":"Newman, L.: The Biggest Cybersecurity Disasters of 2017 So Far. Security, Wired (2017)"},{"key":"55_CR11","unstructured":"Moshchuk, A., Bragin, T., Gribble, S.D., Levy, H.M.: A crawler-based study of Spyware on the Web. In: Proceedings of the Network and Distributed System Security Symposium, pp. 17\u201333 (2006)"},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Straub, K.M., Sengupta, A., Ernst, J.M., McGwier, R.W., Watchorn, M., Tilley, R., Marchany, R.: Malware Propagation in Fully Connected Networks: A Netflow-Based Analysis. IEEE (2016)","DOI":"10.1109\/MILCOM.2016.7795376"},{"key":"55_CR13","doi-asserted-by":"crossref","unstructured":"Gomez-Gardenes, J., Latora, V., Moreno, Y., Profumo, E.: Spreading of sexually transmitted diseases in heterosexual populations. In: Proceedings of National Academy of Sciences (PNAS) (2008)","DOI":"10.1073\/pnas.0707332105"},{"key":"55_CR14","unstructured":"Coughlan, S.: Top University under ransomeware cyber-attack. BBC Education and Family (2017)"},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Bisanzio, D., Bertolotti, L., Tomassone, L., Amore, G., Ragagli, C., Mannelli, A., Giacobini, M., Provero, P.: Modeling the spread of vector-borne diseases on bipartite networks. PLOS (2010)","DOI":"10.1371\/journal.pone.0013796"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Chang, J., Venkatasubramanian, K.K., West, A.G., Lee, I.: Analyzing and Defending Against Web-based Malware. ACM Survey (2013)","DOI":"10.1145\/2501654.2501663"},{"issue":"11","key":"55_CR17","doi-asserted-by":"crossref","first-page":"2331","DOI":"10.1016\/j.comnet.2013.04.007","volume":"57","author":"F Tarissan","year":"2013","unstructured":"Tarissan, F., Quoitin, B., M\u00e9Rindol, P., Donnet, B., Pansiot, Jean-Jacques, Latapy, Matthieu: Towards a bipartite graph modeling of the internet topology. Comput. Netw. 57(11), 2331\u20132347 (2013)","journal-title":"Comput. Netw."}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72150-7_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T17:01:15Z","timestamp":1570381275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72150-7_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,27]]},"ISBN":["9783319721491","9783319721507"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72150-7_55","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2017,11,27]]}}}