{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T00:13:38Z","timestamp":1648512818569},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2005,9,17]],"date-time":"2005-09-17T00:00:00Z","timestamp":1126915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2005,11]]},"DOI":"10.1007\/s11416-005-0003-8","type":"journal-article","created":{"date-parts":[[2005,9,16]],"date-time":"2005-09-16T14:41:17Z","timestamp":1126881677000},"page":"4-12","source":"Crossref","is-referenced-by-count":1,"title":["Suppressing the Spread of Email Malcode using Short-term Message Recall"],"prefix":"10.1007","volume":"1","author":[{"given":"Ibrahim K.","family":"El-Far","sequence":"first","affiliation":[]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[]},{"given":"Attila","family":"Ondi","sequence":"additional","affiliation":[]},{"given":"Manan","family":"Pancholi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Adleman LM (1990) An abstract theory of computer viruses. In: CRYPTO \u201988: Proceedings of the 8th Annual International Conference on Advances in Cryptology (Lecture Notes in Computer Science; Vol. 403), Springer-Verlag, pp 354\u2013374","DOI":"10.1007\/0-387-34799-2_28"},{"issue":"12","key":"3_CR2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/501317.501328","volume":"44","author":"H. Berghel","year":"2001","unstructured":"2. Berghel H. (2001). The code red worm. Communications of the ACM 44(12):15\u201319","journal-title":"Communications of the ACM"},{"key":"3_CR3","unstructured":"Cohen F. (1986). Computer Viruses. Ph.d. thesis, University of Southern California"},{"key":"3_CR4","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"4. Cohen F. (1987). Computer viruses: Theory and experiments. Computers and Security 6:22\u201335","journal-title":"Computers and Security"},{"key":"3_CR5","unstructured":"Microsoft Corporation. Messaging application programming interface (mapi), 2004. http:\/\/msdn.microsoft.com\/library\/default. asp?url=\/library\/en- us\/e2k3\/e2k3\/ _techsel_tech_13.asp"},{"key":"3_CR6","unstructured":"De Vivanco A (2002) Comprehensive Non-Intrusive Protection with Data-Restoration: A Proactive Approach against Malicious Mobile Code. Master\u2019s thesis, Florida Institute of Technology"},{"key":"3_CR7","unstructured":"Ediger B. (2005) Simulating network worms. http:\/\/www.users. qwest.net\/eballen1\/nws\/"},{"key":"3_CR8","unstructured":"Ford R. (2003). Microsoft, monopolies and migraines: the role of monoculture. Virus Bulletin Magazine"},{"key":"3_CR9","unstructured":"Ford R., Thompson HH. (2004). Future of proactive virus detection. In: Proceedings of the EICAR Conference, Luxembourg"},{"key":"3_CR10","unstructured":"Ford R., Wagner ME., Michalske J. (2004). Gatekeeper ii: New approaches to generic virus prevention. In:Proceedings of the International Virus Bulletin Conference Chicago, IL, USA"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kephart JO., White SR. (1991). Directed-graph epidemiological models of computer viruses. In: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy Oakland, California, USA IEEE pp 343\u2013359","DOI":"10.1109\/RISP.1991.130801"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Kolter JZ., Maloof MA. (2004). Learning to detect malicious executables in the wild. In: Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining. USA, ACM Press pp 470\u2013478","DOI":"10.1145\/1014052.1014105"},{"key":"3_CR13","unstructured":"Legon J. Tricky \u2018mydoom\u2019 e-mail worm spreading quickly, 27 January 2004. http:\/\/www.cnn.com\/2004\/TECH\/internet\/01\/26\/mydoom.worm\/index.html"},{"key":"3_CR14","unstructured":"Liljenstam M. (2003). Ssf.app.worm: A network worm modeling package for ssfnet, http:\/\/www.crhc.uiuc.edu\/mili\/research\/ ssf\/worm\/"},{"issue":"1","key":"3_CR15","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1023\/A:1008731200105","volume":"8","author":"P. Liu","year":"2000","unstructured":"15. Liu P., Ammann P., Jajodia S. (2000). Rewriting histories: Recovering from malicious transactions. Distributed and Parallel databases 8(1):7\u201340","journal-title":"Distributed and Parallel databases"},{"issue":"4","key":"3_CR16","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","volume":"1","author":"V. MooreD. Paxson","year":"2003","unstructured":"16. Moore D. Paxson V., Savage S., Shannon C., Staniford S., Weaver N. (2003). Inside the slammer worm. IEEE Security and Privacy 1(4):33\u201339","journal-title":"IEEE Security and Privacy"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Moore D, Shannon C, Claffy K (2002) Code-red: a case study on the spread and victims of an internet worm. In: IMW \u201902: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment Marseille, France pp 273\u2013284","DOI":"10.1145\/637201.637244"},{"issue":"4","key":"3_CR18","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1016978.1016980","volume":"2","author":"J. Morrison","year":"2004","unstructured":"18. Morrison J. (2004). Blaster revisited. Queue 2(4):34\u201343","journal-title":"Queue"},{"key":"3_CR19","unstructured":"Cable News Network. Code red computer worms targets white house, 2001. http:\/\/archives.cnn.com\/2001\/TECH\/internet\/07\/20\/code.red.worm\/index. html"},{"key":"3_CR20","unstructured":"Cable News Network Microsoft offers virus bounty, 5 November 2003 2003. http:\/\/www.cnn.com\/2003\/TECH\/biztech\/11\/05\/microsoft.bounty\/index.html"},{"key":"3_CR21","unstructured":"Cable News Network. Slammer wormcould pick up steam monday: New vulnerabilities might arise as businesses boot up, 27 January 2005 2003.http:\/\/www.cnn.com\/2003\/TECH\/internet\/01\/26\/internet.attack\/index.html."},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Newman MEJ., Forrest S., Balthrop J. (2002). Email networks and the spread of computer viruses. Physics Review E (Statistical, Nonlinear, and Soft Matter Physics) 66(035101)","DOI":"10.1103\/PhysRevE.66.035101"},{"key":"3_CR23","unstructured":"Wild List Organization. The wild list, 2005. http:\/\/www.wildlist.org\/WildList."},{"key":"3_CR24","unstructured":"Postel JB. (1982). Simple mail transfer protocol (rfc821), http:\/\/www.ietf.org\/rfc\/rfc0821.txt."},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Povey D. (2000). Optimistic security: a new access control paradigm. In: NSPW \u201999: Proceedings of the 1999 workshop on New security paradigms Caledon Hills, Ontario, Canada, 2000. ACM Press pp 40\u201345","DOI":"10.1145\/335169.335188"},{"key":"3_CR26","unstructured":"DDoSVax Project, 2004. http:\/\/www.tik.ee.ethz.ch\/~ddosvax\/"},{"key":"3_CR27","unstructured":"Shirey CB (2004) Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation. Master\u2019s thesis, Florida Institute of Technology"},{"key":"3_CR28","unstructured":"Solomon A (1990) Epidemiology and computerviruses.http:\/\/ftp.cerias.purdue.edu\/pub\/doc\/viruses\/epidemiology_and_viruses.txt"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Tallis M, Balzer R (2001) Document integrity through mediated interfaces. In: Proceedings of the second DARPA Information Survivability Conference and Exposition, Anaheim, CA, USA, 2001. IEEE pp 263\u2013270","DOI":"10.1109\/DISCEX.2001.932178"},{"key":"3_CR30","unstructured":"Wagner ME (2004) Behavior Oriented Detection of Malicious Code at Run-Time. Master\u2019s thesis, Florida Institute of Technology"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Wang Y, Wang C (2003) Modeling the effects of timing parameters on virus propagation. In: WORM\u201903: Proceedings of the 2003 ACM workshop on Rapid Malcode, Washigton, DC, USA. ACM Press pp 61\u201366","DOI":"10.1145\/948187.948198"},{"key":"3_CR32","unstructured":"Weaver N, Warhol worms: The potential for very fast internet plagues, 2001. http:\/\/www.cs.berkeley.edu\/~nweaver\/warhol.html"},{"key":"3_CR33","unstructured":"White SR (1998) Open problems in computer virus research. In: International Virus Bulletin Conference, Munich, Germany"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Whittaker JA De Vivanco A (2002) Neutralizing windows-based malicious mobile code. In: SAC \u201902: Proceedings of the 2002 ACM symposium on Applied computing, Madrid, Spain. ACM Press pp 242\u2013246","DOI":"10.1145\/508791.508841"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Wong C., Bielski S., McCune JM., Wang C. (2004). A study of mass-mailing worms. In: WORM \u201904: Proceedings of the 2004 ACM workshop on Rapid malcode, Washington DC, USA, ACM Press pp 1\u201310","DOI":"10.1145\/1029618.1029620"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Zou CC, Gong W, Towsley D (2002) Code red worm propagation modeling and analysis. In: CCS \u201902: Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, ACM Press pp 138\u2013147","DOI":"10.1145\/586110.586130"},{"key":"3_CR37","unstructured":"Zou CC, Towsley D, Gong W (2003) Email virus propagation modeling and analysis. Technical Report TR-CSE-03-04, University of Massachusetts"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-005-0003-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-005-0003-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-005-0003-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T15:11:42Z","timestamp":1586445102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-005-0003-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,17]]},"references-count":37,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2005,11]]}},"alternative-id":["3"],"URL":"https:\/\/doi.org\/10.1007\/s11416-005-0003-8","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9,17]]}}}