{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T17:00:45Z","timestamp":1725382845858},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5198577","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T20:20:30Z","timestamp":1250022030000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["A Behaviour Study of Network-Aware Stealthy Worms"],"prefix":"10.1109","author":[{"given":"C.","family":"Smith","sequence":"first","affiliation":[]},{"given":"A.","family":"Matrawy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2005.24"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.22"},{"journal-title":"Symantec summary of W32 Gnuman Worm","year":"0","key":"3"},{"key":"2","article-title":"advanced polymorphic worms: evading ids by blending in with normal traffic","author":"kolesnikov","year":"2006","journal-title":"USENIX Security Symposium"},{"key":"1","article-title":"how to 0wn the internet in your spare time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium (Security '02)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"7","first-page":"1384","article-title":"defending against internet worms: a signature-based approach","author":"tang","year":"2005","journal-title":"Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM 2005)"},{"key":"6","first-page":"207","article-title":"polymorphic worm detection using structural information of executables","author":"kruegel","year":"2005","journal-title":"Recent Advances in Intrusion Detection 8th International Symposium (RAID)"},{"key":"5","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/11856214_12","article-title":"anagram: a content anomaly detector resistant to mimicry attack","author":"wang","year":"2006","journal-title":"Recent Advances in Intrusion Detection 9th International Symposium (RAID)"},{"key":"4","first-page":"203","article-title":"anomalous payload-based network intrusion detection","author":"wang","year":"2004","journal-title":"Recent Advances in Intrusion Detection 7th International Symposium RAID 2004"},{"key":"9","first-page":"271","article-title":"autograph: toward automated, distributed worm signature detection","author":"kim","year":"2004","journal-title":"USENIX Security Symposium"},{"key":"8","first-page":"45","article-title":"automated worm fingerprinting","author":"singh","year":"2004","journal-title":"Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","start":{"date-parts":[[2009,6,14]]},"location":"Dresden, Germany","end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05198577.pdf?arnumber=5198577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:44:54Z","timestamp":1497825894000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5198577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5198577","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}