{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T12:28:46Z","timestamp":1648556926746},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T00:00:00Z","timestamp":1199404800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1007\/s11416-007-0080-y","type":"journal-article","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T15:37:44Z","timestamp":1199374664000},"page":"197-210","source":"Crossref","is-referenced-by-count":4,"title":["On the adaptive real-time detection of fast-propagating network worms"],"prefix":"10.1007","volume":"4","author":[{"given":"Jaeyeon","family":"Jung","sequence":"first","affiliation":[]},{"given":"Rodolfo A.","family":"Milito","sequence":"additional","affiliation":[]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,1,4]]},"reference":[{"key":"80_CR1","unstructured":"Nmap\u2014free security scanner for network exploration & security audits. http:\/\/www.insecure.org\/nmap\/"},{"key":"80_CR2","doi-asserted-by":"crossref","unstructured":"Chen, S., Tang, Y.: Slowing down internet worms. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS\u201904), Tokyo, Japan, March 2004","DOI":"10.1109\/ICDCS.2004.1281596"},{"key":"80_CR3","unstructured":"Ehtereal.com. Ethereal. http:\/\/www.ethereal.com\/"},{"key":"80_CR4","doi-asserted-by":"crossref","unstructured":"Eichin, M.W., Rochlis, J.A.: With microscope and tweezers: an analysis of the Internet virus of November 1988. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1989)","DOI":"10.1109\/SECPRI.1989.36307"},{"key":"80_CR5","unstructured":"F-Secure: F-Secure Virus Descriptions: Santy. http:\/\/www.f-secure.com\/v-descs\/santy_a.shtml"},{"key":"80_CR6","unstructured":"Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast portscan detection using sequential hypothesis testing. In: Proceedings of the IEEE Symposium on Security and Privacy, 9\u201312 May 2004"},{"issue":"4","key":"80_CR7","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1145\/1090191.1080119","volume":"35","author":"T. Karagiannis","year":"2005","unstructured":"Karagiannis T., Papagiannaki K. and Faloutsos M. (2005). Blinc: multilevel traffic classification in the dark. SIGCOMM Comput. Commun. Rev. 35(4): 229\u2013240","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"80_CR8","unstructured":"Kim, H.-A., Karp, B.: Autograph: toward automated distributed worm signature detection. In: Proceedings of the 13th USENIX Security Symposium, August 9\u201313 (2004)"},{"key":"80_CR9","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: Proceedings of the Seventh International Symposium on Recent Advances in Intrusion Detection (RAID 2004), September 15\u201317 (2004)","DOI":"10.1007\/978-3-540-30143-1_4"},{"key":"80_CR10","unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 13th Operating Systems Design and Implementation OSDI (December 2004)"},{"key":"80_CR11","doi-asserted-by":"crossref","unstructured":"Spafford, E.H.: A failure to learn from the past. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 217\u2013233, December 8\u201312 (2003)","DOI":"10.1109\/CSAC.2003.1254327"},{"key":"80_CR12","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to own the Internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium (Berkeley, CA, USA), pp. 149\u2013170. USENIX Association, August 5\u20139 (2002)"},{"key":"80_CR13","unstructured":"Turkey, J.W.: A survey of sampling from contaminated distributions. In: Contributions to Probability and Statistics. Stanford University Press (1960)"},{"key":"80_CR14","unstructured":"Twycross, J., Williamson, M.M.: Implementing and testing a virus throttle. In: Proceedings of the 12th USENIX Security Symposium, August 4\u20138 (2003)"},{"key":"80_CR15","volume-title":"Sequential Analysis","author":"A. Wald","year":"1947","unstructured":"Wald A. (1947). Sequential Analysis. Wiley, New York"},{"key":"80_CR16","doi-asserted-by":"crossref","unstructured":"Wang, K., Cretu, G., Stolfo, S.J.: Anomalous payload-based worm detection and signature generation. In: Proceedings of the Eighth International Symposium on Recent Advances in Intrusion Detection (RAID 2005) (September 2005)","DOI":"10.1007\/11663812_12"},{"key":"80_CR17","doi-asserted-by":"crossref","unstructured":"Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp. 11\u201318. ACM Press, New York, October 27 (2003)","DOI":"10.1145\/948187.948190"},{"key":"80_CR18","unstructured":"Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13th USENIX Security Symposium, August 9\u201313 (2004)"},{"key":"80_CR19","unstructured":"Whyte, D., Kranakis, E., van Oorschot, P.: DNS-based detection of scanning worms in an enterprise network. In: Proceedings of the Network and Distributed System Security Symposium (NDSS\u201905) (February 2005)"},{"key":"80_CR20","doi-asserted-by":"crossref","unstructured":"Williamson, M.M.: Throttling viruses: restricting propagation to defeat malicious mobile code. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), December 9\u201313 (2002)","DOI":"10.1109\/CSAC.2002.1176279"},{"key":"80_CR21","doi-asserted-by":"crossref","unstructured":"Wong, C., Bielski, S., Studer, A., Wang, C.: Empirical analysis of rate limiting mechanisms. In: Proceedings of the Eighth International Symposium on Recent Advances in Intrusion Detection (RAID 2005) (September 2005)","DOI":"10.1007\/11663812_2"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-007-0080-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-007-0080-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-007-0080-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:45:42Z","timestamp":1559400342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-007-0080-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,4]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["80"],"URL":"https:\/\/doi.org\/10.1007\/s11416-007-0080-y","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1,4]]}}}