{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:31:58Z","timestamp":1730233918576,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,6]]},"DOI":"10.1109\/icccnt56998.2023.10307246","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T13:54:40Z","timestamp":1700747680000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["The Spread of Malicious Activity in a Computer Network"],"prefix":"10.1109","author":[{"given":"Shiju","family":"Rawther","sequence":"first","affiliation":[{"name":"Hindustan Institute of Technology &#x0026; Science,Dept. of CSE,Chennai,India"}]},{"given":"S","family":"Sathyalakshmi","sequence":"additional","affiliation":[{"name":"Hindustan Institute of Technology &#x0026; Science,Dept. of CSE,Chennai,India"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"A comprehensive survey of cyber security threats, vulnerabilities, and attacks","volume":"109","author":"Alharbi","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"ref2","first-page":"9","article-title":"A review of network security threats and their countermeasures","volume":"46","author":"Dua","year":"2012","journal-title":"International Journal of Computer Applications"},{"issue":"1","key":"ref3","first-page":"92","article-title":"Malware propagation modeling and analysis","volume":"20","author":"Kwong","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"4","key":"ref5","first-page":"47","article-title":"The impact of ransomware attack and its preventive measures","volume":"11","author":"Islam","year":"2020","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"3","key":"ref6","first-page":"55","article-title":"Detecting botnet command and control traffic using machine learning techniques","volume":"11","author":"Chandrasekaran","year":"2019","journal-title":"International Journal of Network Security & Its Applications"},{"issue":"2","key":"ref7","first-page":"26","article-title":"Network intrusion detection system: A comprehensive review","volume":"2","author":"Jaju","year":"2015","journal-title":"International Journal of Computer Networks and Applications"},{"key":"ref8","first-page":"488","article-title":"An overview of cyber threats and cyber security solutions","volume":"23","author":"Popescu","year":"2015","journal-title":"Procedia Economics and Finance"},{"issue":"18","key":"ref9","first-page":"28","article-title":"A comparative study of machine learning algorithms for malware detection","volume":"116","author":"Ghaleb","year":"2015","journal-title":"International Journal of Computer Applications"},{"issue":"5","key":"ref10","first-page":"48","article-title":"Botnet detection: Complexity and computation","volume":"14","author":"Stolfo","year":"2016","journal-title":"IEEE Security & Privacy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"ref12","first-page":"646","article-title":"Before the storm: An early warning system for botnet attacks","volume-title":"ACM Conference on Computer and Communications Security","author":"Bilge"},{"issue":"11","key":"ref13","first-page":"2527","article-title":"A novel approach for detecting zero-day polymorphic malware based on behavior analysis","volume":"11","author":"Liao","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref14","first-page":"S41","article-title":"Machine learning-based malware detection: A survey","volume":"16","author":"Ali","year":"2016","journal-title":"Digital Investigation"},{"key":"ref15","first-page":"74","article-title":"A network security model based on the Kermack-McKendrick model","volume":"60","author":"Chen","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"ref16","first-page":"1","article-title":"A survey of data mining techniques for malware detection using file features","volume":"45","author":"Minaei-Bidgoli","year":"2012","journal-title":"ACM Computing Surveys"},{"key":"ref17","first-page":"1227","article-title":"A comparative analysis of intrusion detection system techniques for cyber security","author":"Singh","year":"2017","journal-title":"IEEE International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques"},{"key":"ref18","first-page":"11","article-title":"Hybrid IDS framework for detecting and mitigating DDoS attacks in cloud","volume":"52","author":"Muhaimin","year":"2015","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"ref19","first-page":"602","article-title":"A survey of methods for defending against DDoS attacks","volume":"18","author":"Han","year":"2016","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref20","first-page":"36","article-title":"Machine learning-based anomaly detection for cyber security: A survey","volume":"137","author":"Wang","year":"2019","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"ref21","first-page":"1399","article-title":"Characterizing the Propagation Dynamics of Malware in Large-Scale Networks","volume":"8","author":"Wang","year":"2021","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V71I5P220"},{"key":"ref23","first-page":"102366","article-title":"Modeling and Analyzing the Impact of User Behavior on Malware Propagation in Online Social Networks","volume":"105","author":"Lv","year":"2021","journal-title":"Computers & Security"},{"key":"ref24","first-page":"1969","article-title":"Modeling the Dynamics of Malware Propagation with Temporal and Spatial Heterogeneities","volume":"15","author":"Luo","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"ref25","first-page":"5810","article-title":"Modeling the Spread of Ransomware in Cyber-Physical Systems","volume":"16","author":"Hu","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"ref26","first-page":"112","article-title":"A Time-Scale Analysis of Malware Propagation in Networks with Temporal Heterogeneity","volume":"7","author":"Zhu","year":"2020","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT54827.2022.9984480"}],"event":{"name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2023,7,6]]},"location":"Delhi, India","end":{"date-parts":[[2023,7,8]]}},"container-title":["2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10306338\/10306339\/10307246.pdf?arnumber=10307246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T08:14:10Z","timestamp":1710404050000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10307246\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icccnt56998.2023.10307246","relation":{},"subject":[],"published":{"date-parts":[[2023,7,6]]}}}