{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:50:47Z","timestamp":1730209847360,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/commnet.2018.8360274","type":"proceedings-article","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T18:37:38Z","timestamp":1526582258000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Simulating worm propagation in interconnected peer-to-peer networks"],"prefix":"10.1109","author":[{"given":"Mohamed Amine","family":"Rguibi","sequence":"first","affiliation":[]},{"given":"Najem","family":"Moussa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"watts","year":"1998","journal-title":"Nature"},{"key":"ref11","article-title":"Peer-to-peer architecture case study: Gnutella network","author":"ripeanu","year":"2001","journal-title":"Peer-to-Peer Computing 2001 Proceedings First International Conference on"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2006.1639704"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/971497"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2005.1689197"},{"journal-title":"Worm The First Digital World War","year":"2011","author":"bowden","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2014.11.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2013.10.046"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71661-7_4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS-ICNS.2005.96"},{"key":"ref2","article-title":"Cisco Visual Networking Index: Forecast and Methodology, 20162021","volume":"1465272001663118","year":"2017","journal-title":"Cisco white paper"},{"journal-title":"Sand Report","article-title":"BitTorrent Still Dominates Internets Upstream Traffic","year":"2015","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39408-9_14"}],"event":{"name":"2018 International Conference on Advanced Communication Technologies and Networking (CommNet)","start":{"date-parts":[[2018,4,2]]},"location":"Marrakech","end":{"date-parts":[[2018,4,4]]}},"container-title":["2018 International Conference on Advanced Communication Technologies and Networking (CommNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8356883\/8360243\/08360274.pdf?arnumber=8360274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:07:37Z","timestamp":1643155657000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8360274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/commnet.2018.8360274","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}