{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:11:27Z","timestamp":1725412287266},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6824987","type":"proceedings-article","created":{"date-parts":[[2014,6,16]],"date-time":"2014-06-16T21:53:24Z","timestamp":1402955604000},"page":"207-210","source":"Crossref","is-referenced-by-count":0,"title":["Modeling the propagation of XSS worm on social networks"],"prefix":"10.1109","author":[{"family":"Ying Zhao","sequence":"first","affiliation":[]},{"family":"Pingke Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr082"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20835"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.026107"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.250"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242685"},{"key":"3","first-page":"149","author":"staniford","year":"2002","journal-title":"How to Own the internet in your spare time"},{"year":"0","key":"2"},{"journal-title":"Cross Site Scripting Worms and Viruses the Impending Threat and the Best Defense","year":"2006","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2011.01252"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.424"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"4","first-page":"495","article-title":"Measurement and analysis of worm propagation on internet network topology","author":"kim","year":"2004","journal-title":"13th International Conference on Computer Communi-cations and Networks"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059959"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2010.5488333"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06824987.pdf?arnumber=6824987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T13:18:03Z","timestamp":1490275083000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6824987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6824987","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}