{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:19Z","timestamp":1725558679703},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_9","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"97-108","source":"Crossref","is-referenced-by-count":22,"title":["An Email Worm Vaccine Architecture"],"prefix":"10.1007","author":[{"given":"Stelios","family":"Sidiroglou","sequence":"first","affiliation":[]},{"given":"John","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"given":"Salvatore J.","family":"Stolfo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"US-CERT Incident Note IN-2003-03: Sobig Worm (2003), \n                    \n                      http:\/\/www.cert.org\/incident_notes\/IN-2003-03.html"},{"key":"9_CR2","unstructured":"US-CERT Technical Cyber Security Alert TA04-028A: MyDoom Virus (2004), \n                    \n                      http:\/\/www.us-cert.gov\/cas\/techalerts\/TA04-028A.html"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIT.2002.806137","volume":"49","author":"D. Spinellis","year":"2003","unstructured":"Spinellis, D.: Reliable identification of bounded-length viruses is NP-complete. IEEE Transactions on Information Theory\u00a049, 280\u2013284 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-36084-0_3","volume-title":"Recent Advances in Intrusion Detection","author":"F. Apap","year":"2002","unstructured":"Apap, F., Honig, A., Hershkop, S., Eskin, E., Stolfo, S.J.: Detecting malicious software by monitoring anomalous windows registry accesses. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, p. 36. Springer, Heidelberg (2002)"},{"key":"9_CR5","unstructured":"VMware (2004), \n                    \n                      http:\/\/www.vmware.com"},{"key":"9_CR6","unstructured":"Postfix (2004), \n                    \n                      http:\/\/www.postfix.org"},{"key":"9_CR7","unstructured":"Microsoft Outlook 2003 (2004), \n                    \n                      http:\/\/office.microsoft.com\/en-us\/FX010857931033.aspx"},{"key":"9_CR8","unstructured":"EZdetach (2004), \n                    \n                      http:\/\/www.techhit.com\/ezdetach\/"},{"key":"9_CR9","unstructured":"Stolfo, S.J., Li, W.J., Hershkop, S., Wang, K., Hu, C.W., Nimeskern, O.: Detecting Viral Propagations Using Email Behavior Profiles. In: ACM TOIT 2005 (2005)"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"Cohen, F.: Computer Viruses: Theory and Practice. Computers & Security\u00a06, 22\u201335 (1987)","journal-title":"Computers & Security"},{"key":"9_CR11","first-page":"130","volume-title":"Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems","author":"J.O. Kephart","year":"1994","unstructured":"Kephart, J.O.: A Biologically Inspired Immune System for Computers. In: Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, pp. 130\u2013139. MIT Press, Cambridge (1994)"},{"key":"9_CR12","unstructured":"Miretskiy, Y., Das, A., Wright, C.P., Zadok, E.: Avfs: An On-Access Anti-Virus File System. In: Proceedings of the 13\n                    th\n                   USENIX Security Symposium, pp. 73\u201388 (2004)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Towsley, D., Gong, W.: Email Worm Modeling and Defense. In: Proceedings of the 3\n                    rd\n                   International Conference on Computer Communications and Networks, ICCCN (2004)","DOI":"10.1109\/ICCCN.2004.1401687"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Wong, C., Bielski, S., McCune, J.M., Wang, C.: A Study of Mass-Mailing Worms. In: Proceedings of the ACM Workshop on Rapid Malcode (WORM), pp. 1\u201310 (2004)","DOI":"10.1145\/1029618.1029620"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Xiong, J.: ACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control. In: Proceedings of the ACM Workshop on Rapid Malcode (WORM), 11\u201322 (2004)","DOI":"10.1145\/1029618.1029621"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, M., Schultz, M.G., Eskin, E., Hershkop, S., Stolfo, S.J.: MET: An Experimental System for Malicious Email Tracking. In: Proceedings of the New Security Paradigms Workshop (NSPW), pp. 1\u201312 (2002)","DOI":"10.1145\/844102.844104"},{"key":"9_CR17","unstructured":"Schultz, M.G., Eskin, E., Zadok, E., Bhattacharyya, M., Stolfo, S.J.: Mef: Malicious email filter - a unix mail filter that detects malicious windows executables. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference (2001)"},{"key":"9_CR18","unstructured":"Zou, C.C., Gong, W., Towsley, D.: Feedback Email Worm Defense System for Enterprise Networks. Technical Report TR-04-CSE-05, Univ. of Massachussetts, ECE Department (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:44:33Z","timestamp":1620013473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}