{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:17:15Z","timestamp":1730218635871,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/eit53891.2022.9814002","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T15:32:19Z","timestamp":1657207939000},"page":"580-585","source":"Crossref","is-referenced-by-count":1,"title":["Active Cyber Defense by Benevolent Worms"],"prefix":"10.1109","author":[{"given":"Md Minhaz","family":"Chowdhury","sequence":"first","affiliation":[{"name":"East Stroudsburg University,Department of Computer Science,East Stroudsburg,USA"}]},{"given":"Joshua M. Del","family":"Toro","sequence":"additional","affiliation":[{"name":"East Stroudsburg University,Department of Computer Science,East Stroudsburg,USA"}]},{"given":"Krishna","family":"Kambhampaty","sequence":"additional","affiliation":[{"name":"York College of Pennsylvania,Department of Computer Science,York,PA,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME52200.2021.9590870"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EIT51626.2021.9491845"},{"key":"ref14","first-page":"33","volume":"31","author":"weaver","year":"2006","journal-title":"white worms don't work"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/358453.358455"},{"key":"ref16","first-page":"3","article-title":"Radio Shack goes to Microsoft's XENIX for Model 16 micros","volume":"5","author":"chin","year":"1983","journal-title":"Infoworld"},{"key":"ref17","article-title":"The Welchia Worm","author":"bransford","year":"2003","journal-title":"Global Information Assurance Certification Paper"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.47"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1361255.1361256"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME52200.2021.9590975"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME52200.2021.9590895"},{"key":"ref6","first-page":"3","author":"von neumann","year":"1966","journal-title":"Theory of Selfreproducing automata"},{"key":"ref5","article-title":"Measures to Protect Cloud Data","author":"mayerski","year":"2021","journal-title":"2021 IEEE International Conference on Electro Information Technology"},{"key":"ref8","article-title":"John Brunner's Dystopias: Heroic Man in Unheroic Society","volume":"5","author":"goldman","year":"1978","journal-title":"Science Fiction Studies"},{"journal-title":"The Shockwave Rider","year":"1975","author":"brunner","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME52200.2021.9590974"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/63526.63530"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2007.190"},{"journal-title":"A Short Course on Computer Viruses","year":"1994","author":"cohen","key":"ref20"},{"journal-title":"The Giant Black Book of Computer Viruses","year":"1998","author":"ludwig","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69471-9_24"},{"journal-title":"Nematodes &#x2013; beneficial worms","year":"2006","author":"aitel","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.03.032"}],"event":{"name":"2022 IEEE International Conference on Electro Information Technology (eIT)","start":{"date-parts":[[2022,5,19]]},"location":"Mankato, MN, USA","end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9813697\/9813750\/09814002.pdf?arnumber=9814002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T20:45:04Z","timestamp":1659645904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9814002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/eit53891.2022.9814002","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}