{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T14:40:02Z","timestamp":1739457602562,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108433"},{"type":"electronic","value":"9783642108440"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10844-0_8","type":"book-chapter","created":{"date-parts":[[2009,11,30]],"date-time":"2009-11-30T06:19:27Z","timestamp":1259561967000},"page":"58-64","source":"Crossref","is-referenced-by-count":1,"title":["Active Worm Propagation in Hierarchical Peer-to-Peer Network Management Systems: Modeling and Analysis"],"prefix":"10.1007","author":[{"given":"Zahra Zohoor","family":"Saadat","sequence":"first","affiliation":[]},{"given":"Saleh","family":"Yousefi","sequence":"additional","affiliation":[]},{"given":"Mahmood","family":"Fathy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2005.1522126","volume":"43","author":"L.Z. Granville","year":"2005","unstructured":"Granville, L.Z., da Rosa, D.M., Panisson, A., Melchiors, C., Almeida, M.J.B., Tarouco, L.M.R.: Managing computer networks using peer-to-peer technologies. IEEE Communications Magazine\u00a043, 62\u201368 (2005)","journal-title":"IEEE Communications Magazine"},{"key":"8_CR2","unstructured":"Arozarena, P., Frints, M., Collins, S., Fallon, L., Zach, M., Serrat, J., Nielsen, J.: Madeira: a peer-to-peer approach to network management. In: Proceedings of the Wireless World Research Forum, Shanghai, China (2006)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/CTRQ.2009.22","volume-title":"Proceeding of the Second International Conference on Communication Theory, Reliability, and Quality of Service, France","author":"Z.Z. Saadat","year":"2009","unstructured":"Saadat, Z.Z., Yousefi, S., Fathy, M.: Active Worm Propagation inHierarchical Peer-to-Peer Network Management Systems. In: Proceeding of the Second International Conference on Communication Theory, Reliability, and Quality of Service, France, pp. 52\u201357. IEEE computer society, Los Alamitos (2009)"},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.cose.2006.10.003","volume":"26","author":"T. Lia","year":"2007","unstructured":"Lia, T., Guan, Z., Wu, X.: Modeling and analyzing the spread of active worms based on P2P systems. Computers and Security\u00a026(3), 213\u2013218 (2007)","journal-title":"Computers and Security"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Yu, W., Boyer, C., Chellappan, S., Xuan, D.: Peer-to-peer system-based active worm attacks: modeling and analysis. In: IEEE International Conference, vol.\u00a01(16-20), pp. 295\u2013300 (2005)","DOI":"10.1109\/ICC.2005.1494364"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Ma, J., Chen, X., Xiang, G.: Modeling Passive Worm Propagation in Peer-to-Peer System. In: 2006 International Conference on Computational Intelligence and Security, vol.\u00a02(3-6), pp. 1129\u20131132 (2006)","DOI":"10.1109\/ICCIAS.2006.295439"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Chen, G., Gray, R.S.: Simulating non-scanning worms on peer-to-peer networks. In: ACM International Conference Proceeding Series: Proceedings of the 1st international conference on Scalable information systems, vol.\u00a0152, Article No. 29 (2006)","DOI":"10.1145\/1146847.1146876"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Yao, Y., Luo, X., Gao, F., Ai, S.: Research of a Potential Worm Propagation Model based on Pure P2P Principle. In: ICCT 2006, International Conference Proceeding Series: Proceedings of the 1st international conference on Computer, pp. 1\u20134 (2006)","DOI":"10.1109\/ICCT.2006.342006"},{"issue":"1","key":"8_CR9","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I. Stoica","year":"2003","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord:\u00a0a scalable peer-to-peer lookup protocol for internet application. IEEE\/ACM Transactions on Networking (TON)\u00a011(1), 17\u201332 (2003)","journal-title":"IEEE\/ACM Transactions on Networking (TON)"}],"container-title":["Communications in Computer and Information Science","Communication and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10844-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T14:11:35Z","timestamp":1739455895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10844-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108433","9783642108440"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10844-0_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}