{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:15:43Z","timestamp":1742386543323},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/.2006.1629453","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T20:26:01Z","timestamp":1148588761000},"page":"559-566","source":"Crossref","is-referenced-by-count":2,"title":["Towards a framework for worm-defense evaluation"],"prefix":"10.1109","author":[{"given":"S.G.","family":"Cheetancheri","sequence":"first","affiliation":[]},{"family":"Denys L. Ma","sequence":"additional","affiliation":[]},{"given":"K.N.","family":"Levitt","sequence":"additional","affiliation":[]},{"given":"T.L.","family":"Heberlein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029628"},{"journal-title":"Evaluation of Collaborative Worm Containment Strategies","year":"0","author":"ting","key":"17"},{"journal-title":"NTGC A Tool for Network Traffic Generation Control and Coordination","year":"0","author":"ting","key":"18"},{"journal-title":"An Internet Worm Propagation Data Model","year":"2004","author":"mcalerney","key":"15"},{"journal-title":"Insertion Evasion and Denial-of-Service Eluding Network Intrusion Detection","year":"1998","author":"ptacek","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948193"},{"key":"14","article-title":"Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation","author":"lippmann","year":"2000","journal-title":"Proc 2000 DARPA Information Survivability Conference and Exposition (DISCEX 00)"},{"journal-title":"Cooperative Response Strategies for Large Sacle Attack Mitigation","year":"2002","author":"noijiri","key":"11"},{"key":"12","article-title":"On interactive internet traffic replay","author":"hong","year":"2005","journal-title":"Proceedings of the Eighth International Symposium on Recent Advances in Intrusion Detection"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060313"},{"journal-title":"EMIST Project Overview","year":"0","key":"3"},{"key":"20","article-title":"Very fast containment of scanning worms","author":"weaver","year":"2004","journal-title":"Proceedings of the USENIX Security Symposium"},{"journal-title":"EMIST ESVT Software Version 2 0","year":"0","key":"2"},{"year":"0","key":"1"},{"journal-title":"Modelling Worm Defense Systems","year":"2004","author":"cheetancheri","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2005.8"},{"journal-title":"SSFNet","year":"0","key":"6"},{"journal-title":"NS Nework Simulator","year":"0","key":"5"},{"journal-title":"EMIST Tool Suite","year":"0","key":"4"},{"key":"9","article-title":"A formal model of worm quarantine and counter-quarantine under a group defnese","author":"briesemeister","year":"2006","journal-title":"Proceedings of Malware'06"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2005.13"}],"event":{"name":"2006 IEEE International Performance Computing and Communications Conference","location":"Phoenix, AX, USA"},"container-title":["2006 IEEE International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10845\/34183\/01629453.pdf?arnumber=1629453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T22:33:24Z","timestamp":1489530804000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1629453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/.2006.1629453","relation":{},"subject":[]}}