{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:45:05Z","timestamp":1743111905273,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689133"},{"type":"electronic","value":"9783540689140"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-68914-0_1","type":"book-chapter","created":{"date-parts":[[2008,5,26]],"date-time":"2008-05-26T04:58:06Z","timestamp":1211777886000},"page":"1-20","source":"Crossref","is-referenced-by-count":4,"title":["On the Effectiveness of Internal Patching Against File-Sharing Worms"],"prefix":"10.1007","author":[{"given":"Liang","family":"Xie","sequence":"first","affiliation":[]},{"given":"Hui","family":"Song","sequence":"additional","affiliation":[]},{"given":"Suncun","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"The gnutella protocol specification, \n                  \n                    http:\/\/www.the-gdf.org"},{"key":"1_CR2","unstructured":"http:\/\/en.wikipedia.org\/wiki\/comparison_of_file_sharing_applications"},{"key":"1_CR3","unstructured":"http:\/\/www.facetime.com\/securitylabs\/imp2pthreats.aspx"},{"key":"1_CR4","unstructured":"http:\/\/www.viruslist.com\/en\/viruslist.html?id=49790"},{"key":"1_CR5","unstructured":"P2PSim: a simulator for peer-to-peer protocols, \n                  \n                    http:\/\/pdos.csail.mit.edu\/p2psim"},{"key":"1_CR6","unstructured":"Using binary delta compression technology to update windows operating systems. Microsoft online White Paper"},{"key":"1_CR7","unstructured":"www.viruslist.com\/en\/virusesdescribed?chapter=153311928"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Biddle, P., England, P., Peinado, M., Willman, B.: The darknet and the future of content distribution. In: ACM Workshop on Digital Rights Management (2002)","DOI":"10.1007\/978-3-540-44993-5_10"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy (2006)","DOI":"10.1109\/SP.2006.41"},{"key":"1_CR10","unstructured":"Costa, M., Crowcroft, J., Castro, M., Rowstron, A.: Can we contain internet worms? In: Proc. of the 3rd Worshop on Hot Topics in Networks (HotNets-III) (November 2004)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Dumitriu, D., Knightly, E., Kuzmanovic, A., Stoica, I., Zwaenepoel, W.: Denial-of-service resilience in peer-to-peer file sharing systems. In: Sigmetrics 2005 (2005)","DOI":"10.1145\/1064212.1064218"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Karagiannis, T., Rodriguez, P., Vojnovic, M.: Planet scale software updates. In: Proc. of SIGCOMM 2006 (2006)","DOI":"10.1145\/1159913.1159961"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Good, N., Krekelberg, A.: Usability and privacy: a study of kazaa p2p file-sharing (2002), \n                  \n                    http:\/\/www.hpl.hp.com\/shl\/papers\/kazaa\/index.html","DOI":"10.1145\/642633.642636"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Hughes, D., Coulson, G., Walkerdine, J.: Free riding on gnutella revisited: the bell tolls. In: Proc. of IEEE Distributed Systems Online (2005)","DOI":"10.1109\/MDSO.2005.31"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Joseph, S.: NeuroGrid: Semantically routing queries in peer\u2013to\u2013peer networks. In: International Workshop on Peer-to-Peer Computing (2002)","DOI":"10.1007\/3-540-45745-3_18"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Kc, G., Keromytis, A., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: ACM CCS 2003 (October 2003)","DOI":"10.1145\/948109.948146"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Kumar, R., Yao, D., Bagchi, A., Ross, K., Rubenstein, D.: Fluid modeling of pollution proliferation in p2p networks. In: Sigmetrics 2006(2006)","DOI":"10.1145\/1140277.1140316"},{"key":"1_CR18","unstructured":"Leibowitz, N., Ripeanu, M., Wierzbicki, A.: Deconstructing the kazaa network. In: Proc. of IEEE IWAPP 2003 (2003)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Mulz, D., Valeur, F., Kruegel, C., Vigna, G.: Anomalous system call detection. In: ACM TISSEC 2006 (2006)","DOI":"10.1145\/1127345.1127348"},{"key":"1_CR20","unstructured":"Newstone, J., Song, D.: Dynamic taint analysis: Automatic detection and generation of software exploit attacks. In: Proc. of the 12th Annual Network and Distributed System Security Symposium (NDSS 2005) (2005)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Shin, S., Jung, J., Balakrishnan, H.: Malware prevalence in the kazaa file-sharing network. In: ACM Internet Measurement Conference 2006 (2006)","DOI":"10.1145\/1177080.1177125"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M., Dabek, F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup protocol for internet applications. In: IEEE Trans. on Networking (2002)","DOI":"10.1109\/TNET.2002.808407"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Thommes, R., Coates, M.: Epidemiological modeling of peer-to-peer viruses and pollution. In: Infocom 2006 (2006)","DOI":"10.1109\/INFOCOM.2006.101"},{"key":"1_CR24","unstructured":"Vojnovic, M., Ganesh, A.: On the race of worms, alerts and patches. In: ACM Workshop on WORM (2005)"},{"key":"1_CR25","unstructured":"Zetter, K.: Kazza delivers more than tunes. The Wired Magazine (2004)"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_3","volume-title":"Peer-to-Peer Systems IV","author":"L. Zhou","year":"2005","unstructured":"Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., Chien, S.: A first look at p2p worms: threats and denfenses. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol.\u00a03640, Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68914-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:33:10Z","timestamp":1558265590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68914-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540689133","9783540689140"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68914-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}