{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:23:45Z","timestamp":1725492225134},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540714408"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71441-5_6","type":"book-chapter","created":{"date-parts":[[2007,7,5]],"date-time":"2007-07-05T17:14:41Z","timestamp":1183655681000},"page":"50-58","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy Tracing the Source of Net-Virus"],"prefix":"10.1007","author":[{"given":"Lansheng","family":"Han","sequence":"first","affiliation":[]},{"given":"Shuxia","family":"Han","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Varney","family":"Washington","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","volume-title":"Proceedings of the 16th ACM Annual Computer Security Applications Conference","author":"C. Wang","year":"2000","unstructured":"Wang, C., Knight, J.C., Elder, M.C.: On computer viral infection and the effect of immunization. In: Proceedings of the 16th ACM Annual Computer Security Applications Conference, December 2000, ACM Press, New York (2000)"},{"unstructured":"Steve, R.: White, Open Problems in Computer Virus Research. Virus Bulletin Conference, Munich, Germany, October (1998)","key":"6_CR2"},{"doi-asserted-by":"crossref","unstructured":"Tarantola, A.: Inverse Problem Theory and Model Parameter Estimation. Society of Industrial and Applied Mathematics (SIAM), 5\u201367 (2004)","key":"6_CR3","DOI":"10.1137\/1.9780898717921"},{"key":"6_CR4","first-page":"3","volume-title":"Parameter Estimation and Inverse Problems","author":"R.C. Aster","year":"2005","unstructured":"Aster, R.C., Borchers, B., Thurber, C.H.: Parameter Estimation and Inverse Problems, pp. 3\u201323. Elsevier, Amsterdam (2005)"},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3844\/jcssp.2005.31.34","volume":"1","author":"C.P. Jose Roberto","year":"2005","unstructured":"Jose Roberto, C.P., Betyna, F.N., Liuz, H.A.M.: Epidemiological Models Applied to Viruses in Computer Networks. Jounal of Computer Science\u00a01(1), 31\u201334 (2005)","journal-title":"Jounal of Computer Science"},{"unstructured":"Zou, C.C., Towsley, D., Gong, W.: Email Virus Propagation Modeling and Analysis, Technical Report: TR-CSE-03-04 (2003)","key":"6_CR6"}],"container-title":["Advances in Soft Computing","Fuzzy Information and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71441-5_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:20:41Z","timestamp":1605763241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71441-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540714408"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71441-5_6","relation":{},"subject":[]}}