{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:27:38Z","timestamp":1725496058680},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770855"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77086-2_2","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T10:22:09Z","timestamp":1196072529000},"page":"10-24","source":"Crossref","is-referenced-by-count":1,"title":["Investigating the Impact of Real-World Factors on Internet Worm Propagation"],"prefix":"10.1007","author":[{"given":"Daniel A.","family":"Ray","sequence":"first","affiliation":[]},{"given":"Charles B.","family":"Ward","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"Munteanu","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Blackwell","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Riley, G.F.: Large-scale network simulations with GTNetS. In: Proceedings of the 2003 Winter Simulation Conference (2003)","DOI":"10.1109\/WSC.2003.1261483"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Riley, G.F., Sharif, M.I., Lee, W.: Simulating internet worms. In: Proceedings of MASCOTS (2004)","DOI":"10.1109\/MASCOT.2004.1348281"},{"issue":"6","key":"2_CR3","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1145\/63526.63527","volume":"32","author":"E. Spafford","year":"1989","unstructured":"Spafford, E.: The Internet worm: Crisis and aftermath. Communications of the ACM\u00a032(6), 678\u2013687 (1989)","journal-title":"Communications of the ACM"},{"key":"2_CR4","unstructured":"Arron, E.J.: The Nimda worm: An overview (October 2001), http:\/\/www.sans.org\/rr\/catindex.php?cat_id=36"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Claffy, kc.: Code-Red: A case study on the spread and victims of an Internet worm. In: Proc. ACM Internet Measurement Workshop, pp. 273\u2013284 (2002)","DOI":"10.1145\/637241.637244"},{"key":"2_CR6","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: The spread of the Sapphire\/Slammer SQL worm. CAIDA, La Jolla, CA, Tech. Rep. (2003), http:\/\/www.caida.org\/analysis\/security\/sapphire\/"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","volume":"1","author":"D. Moore","year":"2003","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer worm. IEEE Security and Privacy\u00a01(4), 33\u201339 (2003)","journal-title":"IEEE Security and Privacy"},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1145\/781027.781045","volume-title":"Proc. ACM SIGMETRICS","author":"V. Yegneswaran","year":"2003","unstructured":"Yegneswaran, V., Barford, P., Ullrich, J.: Internet intrusions: Global characteristics and prevalence. In: Proc. ACM SIGMETRICS, pp. 138\u2013147. ACM Press, New York (2003)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: Proc. IEEE Symposium on Security and Privacy, pp. 343\u2013361 (May 1991)","DOI":"10.1109\/RISP.1991.130801"},{"key":"2_CR10","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in your spare time. In: USENIX Security Symposium, USENIX, Berkeley, CA, pp. 149\u2013167 (August 2002)"},{"key":"2_CR11","first-page":"1869","volume-title":"Proc. IEEE INFOCOM","author":"M. Garetto","year":"2003","unstructured":"Garetto, M., Gong, W.: Modeling malware spreading dynamics. In: Proc. IEEE INFOCOM, vol.\u00a03, pp. 1869\u20131879. IEEE Computer Society Press, Washington, DC (2003)"},{"key":"2_CR12","first-page":"1890","volume-title":"Proc. IEEE INFOCOM","author":"Z. Chen","year":"2003","unstructured":"Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In: Proc. IEEE INFOCOM, pp. 1890\u20131900. IEEE Computer Society Press, Washington, DC (2003)"},{"key":"2_CR13","unstructured":"Zou, C.C., Gao, L., Gong, W., Towsley, D.: Advanced polymorphic worms: Evading IDS by blending in with normal traffic. In: Proc. Conference on Computer and Communications Security (2003)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Z., Ji, C.: A self-learning worm using importance scanning. In: Proc. Workshop on Rapid Malcode (2005)","DOI":"10.1145\/1103626.1103632"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/948109.948136","volume-title":"Proc. Conference on Computer and Communications Security","author":"C.C. Zou","year":"2003","unstructured":"Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for Internet worms. In: Proc. Conference on Computer and Communications Security, pp. 190\u2013199. ACM Press, New York (2003)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Sharif, M., Riley, G., Lee, W.: Comparative study between analytical models and packet-level worm simulations. In: PADS (2005)","DOI":"10.1109\/PADS.2005.5"},{"key":"2_CR17","unstructured":"Wei, S., Mirkovic, J., Swany, M.: Distributed worm simulations with a realistic internet model. In: PADS (2005)"},{"key":"2_CR18","unstructured":"Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: USENIX Security Symposium, USENIX, Berkeley, CA, pp. 29\u201344 (2004)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Riley, G.F., Fujimoto, R.M., Ammar, M.: A generic framework for parallelization of network simulations. In: MASCOTS. Proceedings of Seventh International Symposium of Modeling, Analysis and Simulation of Computer and Telecommunication Systems (1999)","DOI":"10.1109\/MASCOT.1999.805048"},{"key":"2_CR20","unstructured":"Winick, J., Jamin, S.: Inet-3.0: Internet topology generator, http:\/\/topology.eecs.umich.edu\/inet\/inet-3.0.pdf"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1029618.1029624","volume-title":"WORM 2004. Proceedings of the 2004 ACM workshop on Rapid malcode","author":"S. Staniford","year":"2004","unstructured":"Staniford, S., Moore, D., Paxson, V., Weaver, N.: The top speed of flash worms. In: WORM 2004. Proceedings of the 2004 ACM workshop on Rapid malcode, pp. 33\u201342. ACM Press, New York (2004)"},{"key":"2_CR22","unstructured":"Rajab, M.A., Monrose, F., Terzis, A.: On the Effectiveness of Distributed Worm Monitoring. In: USENIX Security Symposium (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77086-2_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T22:49:48Z","timestamp":1684104588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77086-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770855"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77086-2_2","relation":{},"subject":[]}}