{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:40:28Z","timestamp":1725565228540},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220572"},{"type":"electronic","value":"9783540247678"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24767-8_91","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T00:45:04Z","timestamp":1284165904000},"page":"867-876","source":"Crossref","is-referenced-by-count":0,"title":["Macroscopic Treatment to Polymorphic E-mail Based Viruses"],"prefix":"10.1007","author":[{"given":"Cholmin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Soung-uck","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Manpyo","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"91_CR1","unstructured":"Muttik, I.: Stripping Down An Av Engine. In: Proceeding of the Virus Bulletin Conference, pp. 59\u201368 (2000)"},{"key":"91_CR2","unstructured":"Kim, C., Lee, S., Jung, H., Jung, Y., Hong, M.: Macroscopic Treatme-nt to E-mail Based Viruses. In: Proceeding of the SAM 2002 (2002)"},{"key":"91_CR3","unstructured":"Szappanos, G.: Are There Any Polymorphic Macro Viruses At All (...And What To Do With Them). In: Proceeding of the Virus Bulletin Conference (2002)"},{"key":"91_CR4","unstructured":"Computer Associate International Inc., CA Releases Top 10 Virus List for 2003 (2003), \n                    \n                      http:\/\/www3.ca.com\/press\/pressrelease.asp?id=1856"},{"key":"91_CR5","unstructured":"Bontchev, V.: Macro And Script Virus Polymorphism. In: Proceeding of the Virus Bul-Letin Conference, pp. 406\u2013438 (2002)"},{"issue":"5","key":"91_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/6.275061","volume":"30","author":"J.O. Kephart","year":"1993","unstructured":"Kephart, J.O., Chess, D.M., White, S.R.: Computers and Epidemiology. IEEE Spectrum\u00a030(5), 20\u201326 (1993)","journal-title":"IEEE Spectrum"},{"key":"91_CR7","first-page":"121","volume-title":"A Short Course on Computer Viruses","author":"F.B. Cohen","year":"1994","unstructured":"Cohen, F.B.: A Short Course on Computer Viruses, 2nd edn., pp. 121\u2013134. John Wiley & Sons, Inc., Chichester (1994)","edition":"2"},{"key":"91_CR8","unstructured":"Kephart, J.O.: How Topology Affects Population Dynamics. In: Proceeding of the Artificial Life III Studies in the Science of Complexity Proc., vol.\u00a0XVII, pp. 447\u2013463 (1993)"},{"key":"91_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/0167-4048(89)90037-0","volume":"8","author":"W. Gleissner","year":"1989","unstructured":"Gleissner, W.: A mathematical theory for the spread of computer viruses. Computers & Security\u00a08, 35\u201341 (1989)","journal-title":"Computers & Security"},{"key":"91_CR10","unstructured":"Tipet, The Tipet Theory of Computer Virus Propagation, Foundationware, USA (1990)"},{"key":"91_CR11","doi-asserted-by":"crossref","unstructured":"Park, K., Lee, H.: On the Effectiveness of Route-Based Packet Internets Filtering for Distributed DoS Attack Prevention in Power-Law. In: Proceeding of the ACM SIGCOMM (2001)","DOI":"10.1145\/383059.383061"},{"key":"91_CR12","unstructured":"Russell, E.C.: Building Simulation Models with SIMSCRIPT II.5. CACI Products Company (1989)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24767-8_91","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T22:06:32Z","timestamp":1558303592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24767-8_91"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220572","9783540247678"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24767-8_91","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}