{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T08:49:13Z","timestamp":1742633353480},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icccn.2004.1401717","type":"proceedings-article","created":{"date-parts":[[2005,3,21]],"date-time":"2005-03-21T20:07:39Z","timestamp":1111435659000},"page":"501-506","source":"Crossref","is-referenced-by-count":3,"title":["Analyzing the performance of Internet worm attack approaches"],"prefix":"10.1109","author":[{"family":"Wei Yu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209209"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948197"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060317"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1145\/586110.586136","article-title":"Query-flood DoS attack in gnutella","author":"daswani","year":"2002","journal-title":"Proceedings of the 9-th ACM conference on Computer and Communications Security (CCS)"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/964723.383071","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"2001","journal-title":"Proceedings of ACM SIGCOMM 2001"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818805"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"year":"0","author":"last","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258762"},{"year":"0","key":"6"},{"journal-title":"Slyck news","year":"0","key":"5"},{"key":"4","article-title":"Containment of scanning worms in enterprise Networks","author":"staniford","year":"2004","journal-title":"Journal of Computer Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"journal-title":"Quantitative Analysis of the Gnutella Network Traffic","year":"2002","author":"yazti","key":"8"}],"event":{"name":"13th International Conference on Computer Communications and Networks","acronym":"ICCCN-04","location":"Chicago, IL, USA"},"container-title":["Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9617\/30391\/01401717.pdf?arnumber=1401717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T02:17:50Z","timestamp":1625624270000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1401717\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icccn.2004.1401717","relation":{},"subject":[]}}