{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T05:38:34Z","timestamp":1733377114049,"version":"3.30.1"},"reference-count":7,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[1998,6,1]],"date-time":"1998-06-01T00:00:00Z","timestamp":896659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1998,6]]},"DOI":"10.1016\/s0140-3664(98)00131-5","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T19:03:07Z","timestamp":1027623787000},"page":"670-674","source":"Crossref","is-referenced-by-count":2,"title":["Distributed computing: an experimental investigation of a malicious denial-of-service applet"],"prefix":"10.1016","volume":"21","author":[{"given":"B.C","family":"Soh","sequence":"first","affiliation":[]},{"given":"S","family":"Young","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(98)00131-5_BIB1","doi-asserted-by":"crossref","unstructured":"J. Gosling, H. McGilton, The Java Language Environment, A White Paper, Sun Microsystems Computer Company, May 1995.","DOI":"10.1145\/202529.202541"},{"key":"10.1016\/S0140-3664(98)00131-5_BIB2","unstructured":"Sun Microsystems Computer Company, The Java Language Specification, Release 1.0 Alpha 3, May 1995."},{"key":"10.1016\/S0140-3664(98)00131-5_BIB3","doi-asserted-by":"crossref","unstructured":"P.J. Denning, (ed.), Computers Under Attack: Intruders, Worms and Viruses, ACM Press, 1990.","DOI":"10.1145\/102616"},{"key":"10.1016\/S0140-3664(98)00131-5_BIB4","unstructured":"D. Flanagan, Java in a Nutshell, O'Reilly and Associates, 1996."},{"key":"10.1016\/S0140-3664(98)00131-5_BIB5","unstructured":"Sun Microsystems Computer Company, Frequently Asked Questions\u2014Applet Security, Version 1.0, available from http:\/\/www.javasoft.com\/sfaq\/."},{"key":"10.1016\/S0140-3664(98)00131-5_BIB6","doi-asserted-by":"crossref","unstructured":"S.K. Baruah, A.K. Mok, L.E. Rosier, Preemptively scheduling hard-real-time sporadic tasks on one processor, In Proc. IEEE Real-Time Systems Symposium, 5\u20137 Dec. 1990, IEEE Computer Press, 1990, pp. 182\u2013190.","DOI":"10.1109\/REAL.1990.128746"},{"key":"10.1016\/S0140-3664(98)00131-5_BIB7","doi-asserted-by":"crossref","unstructured":"R.I. Davis, K.W. Tindell, A. Burns, Scheduling slack time in fixed priority preemptive systems, In Proc. 14th IEEE Real-Time Systems Symposium, Dec. 1993, pp. 222\u2013231.","DOI":"10.1109\/REAL.1993.393496"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498001315?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498001315?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:22:43Z","timestamp":1733358163000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366498001315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,6]]},"references-count":7,"journal-issue":{"issue":"7","published-print":{"date-parts":[[1998,6]]}},"alternative-id":["S0140366498001315"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(98)00131-5","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[1998,6]]}}}