{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T10:40:19Z","timestamp":1743244819628,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_22","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T16:20:29Z","timestamp":1338913229000},"page":"261-272","source":"Crossref","is-referenced-by-count":3,"title":["Modeling Social Engineering Botnet Dynamics across Multiple Social Networks"],"prefix":"10.1007","author":[{"given":"Shuhao","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiaochun","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Zhiyu","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Yongzheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Yipeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: 19th International Conference on World Wide Web, pp. 591\u2013600 (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Abraham, S., Chengalur-Smith, I.S.: An overview of social engineering malware: Trends, tactics, and implications. Technology in Society (2010)","DOI":"10.1016\/j.techsoc.2010.07.001"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Thomas, K., Nicol, D.M.: The Koobface botnet and the rise of social malware. In: 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 63\u201370 (2010)","DOI":"10.1109\/MALWARE.2010.5665793"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1016\/j.physa.2006.03.050","volume":"371","author":"R. Toivonen","year":"2006","unstructured":"Toivonen, R., Onnela, J.P., Saram\u00e1ki, J., Hyv\u00f3nen, J., Kaski, K.: A model for social networks. Physica A: Statistical and Theoretical Physic.\u00a0371(2), 851\u2013860 (2006)","journal-title":"Physica A: Statistical and Theoretical Physic."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Ruitenbeek, E.V., Sanders, W.H.: Modeling peer-to-peer botnets. In: 5th International Conference on Quantitative Evaluation of Systems, pp. 307\u2013316. IEEE Computer Society (2008)","DOI":"10.1109\/QEST.2008.43"},{"issue":"7039","key":"22_CR6","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1038\/nature03459","volume":"435","author":"A.L. Barab\u00e1si","year":"2005","unstructured":"Barab\u00e1si, A.L.: The origin of bursts and heavy tails in human dynamics. Nature\u00a0435(7039), 207\u2013211 (2005)","journal-title":"Nature"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Sarat, S., Terzis, A.: On using mobility to propagate malware. In: 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops (WiOpt 2007), pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/WIOPT.2007.4480052"},{"key":"22_CR8","unstructured":"KYXK BBS, http:\/\/kyxk.net"},{"key":"22_CR9","unstructured":"SMTH BBS, http:\/\/www.smth.edu.cn"},{"key":"22_CR10","unstructured":"Tencent QQ, http:\/\/www.qq.com"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Towsley, D., Gong, W.: Email worm modeling and defense. In: 13th International Conference on Computer Communications and Networks (ICCCN 2004), pp. 409\u2013414 (2004)","DOI":"10.1109\/ICCCN.2004.1401687"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Yan, G., Chen, G., Eidenbenz, S., Li, N.: Malware propagation in online social networks: nature, dynamics, and defense implications. In: 6th ACM Symposium on Information, Computer and Communications Security, pp. 196\u2013206 (2011)","DOI":"10.1145\/1966913.1966939"},{"issue":"1","key":"22_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/LCOMM.2010.01.100830","volume":"15","author":"S.M. Cheng","year":"2011","unstructured":"Cheng, S.M., Ao, W.C., Chen, P.Y., Chen, K.C.: On Modeling Malware Propagation in Generalized Social Networks. IEEE Communications Letters\u00a015(1), 25\u201327 (2011)","journal-title":"IEEE Communications Letters"},{"key":"22_CR14","unstructured":"Dagon, D., Zou, C., Lee, W.: Modeling botnet propagation using time zones. In: 13th Annual Network and Distributed System Security Symposium (NDSS 2006) (2006)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Varga, A., Hornig, R.: An overview of the OMNeT++ simulation environment. In: 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, pp. 1\u201310 (2008)","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T10:08:03Z","timestamp":1743242883000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_22","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}