{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T11:27:49Z","timestamp":1716722869600},"reference-count":18,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[1995,9,1]],"date-time":"1995-09-01T00:00:00Z","timestamp":809913600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks and ISDN Systems"],"published-print":{"date-parts":[[1995,9]]},"DOI":"10.1016\/0169-7552(94)00084-7","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T22:57:10Z","timestamp":1027637830000},"page":"1447-1456","source":"Crossref","is-referenced-by-count":6,"title":["Quantitative risk assessment of computer virus attacks on computer networks"],"prefix":"10.1016","volume":"27","author":[{"given":"B.C.","family":"Soh","sequence":"first","affiliation":[]},{"given":"T.S.","family":"Dillon","sequence":"additional","affiliation":[]},{"given":"P.","family":"County","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0169-7552(94)00084-7_BIB1","series-title":"Advances in Cryptology \u2014 Crypto'88, Proceedings","first-page":"354","article-title":"An abstract theory of computer viruses","author":"Adleman","year":"1990"},{"key":"10.1016\/0169-7552(94)00084-7_BIB2","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0169-7552(89)90006-8","article-title":"Computer viruses and related threats to computer and network integrity","volume":"17","author":"Chess","year":"1989","journal-title":"Comput. Networks & ISDN Syst."},{"key":"10.1016\/0169-7552(94)00084-7_BIB3","article-title":"Computer viruses","author":"Cohen","year":"1985"},{"key":"10.1016\/0169-7552(94)00084-7_BIB4","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","article-title":"Computer viruses: theory and experiments","volume":"6","author":"Cohen","year":"1987","journal-title":"Comput. & Security"},{"key":"10.1016\/0169-7552(94)00084-7_BIB5","doi-asserted-by":"crossref","first-page":"835","DOI":"10.2307\/2324850","article-title":"There are no safe virus tests","author":"Dowling","year":"1989","journal-title":"Am. Math. Monthly"},{"key":"10.1016\/0169-7552(94)00084-7_BIB6","doi-asserted-by":"crossref","first-page":"257","DOI":"10.2307\/3212797","article-title":"The cost of a general stochastic epidemic","volume":"9","author":"Gani","year":"1972","journal-title":"J. Appl. Prob."},{"key":"10.1016\/0169-7552(94)00084-7_BIB7","author":"Garfinkel","year":"1992"},{"key":"10.1016\/0169-7552(94)00084-7_BIB8","series-title":"IFAC Proc. SAFECOMP'90","first-page":"43","article-title":"Protecting against viruses and designing virus-resistant operating systems","author":"Gorski","year":"1990"},{"key":"10.1016\/0169-7552(94)00084-7_BIB9","series-title":"Rogue Programs: Viruses, Worms, and Trojan Horses","year":"1990"},{"key":"10.1016\/0169-7552(94)00084-7_BIB10","first-page":"84","author":"Ieee Computer Society","year":"1989","journal-title":"Computer"},{"key":"10.1016\/0169-7552(94)00084-7_BIB11","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1214\/aoms\/1177697087","article-title":"Integral functionals of birth and death process and related limiting distributions","volume":"41","author":"McNeil","year":"1970","journal-title":"Ann. Math. Statist."},{"key":"10.1016\/0169-7552(94)00084-7_BIB12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/0167-4048(87)90067-8","article-title":"An approach to containing computer viruses","volume":"6","author":"Pozzo","year":"1987","journal-title":"Comput. & Security"},{"key":"10.1016\/0169-7552(94)00084-7_BIB13","doi-asserted-by":"crossref","first-page":"271","DOI":"10.2307\/3212022","article-title":"Two theorems on solutions of differential-difference equations and applications to epidemic theory","volume":"4","author":"Severo","year":"1967","journal-title":"J. Appl. Prob."},{"issue":"3","key":"10.1016\/0169-7552(94)00084-7_BIB14","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1145\/358453.358455","article-title":"The worm programs: early experience with a distributed computation","volume":"25","author":"Shoch","year":"1982","journal-title":"Comm. ACM"},{"key":"10.1016\/0169-7552(94)00084-7_BIB15","author":"Solomon","year":"1991"},{"key":"10.1016\/0169-7552(94)00084-7_BIB16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/66093.66095","article-title":"The Internet worm program: an analysis","volume":"19","author":"Spafford","year":"1989","journal-title":"Comput. Comm. Rev."},{"key":"10.1016\/0169-7552(94)00084-7_BIB17","article-title":"The Internet worm incident","author":"Spafford","year":"1991"},{"key":"10.1016\/0169-7552(94)00084-7_BIB18","author":"Wood","year":"1990"}],"container-title":["Computer Networks and ISDN Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0169755294000847?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0169755294000847?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T21:58:59Z","timestamp":1555192739000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0169755294000847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,9]]},"references-count":18,"journal-issue":{"issue":"10","published-print":{"date-parts":[[1995,9]]}},"alternative-id":["0169755294000847"],"URL":"https:\/\/doi.org\/10.1016\/0169-7552(94)00084-7","relation":{},"ISSN":["0169-7552"],"issn-type":[{"value":"0169-7552","type":"print"}],"subject":[],"published":{"date-parts":[[1995,9]]}}}