{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T20:40:10Z","timestamp":1746045610597},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icon.2003.1266224","type":"proceedings-article","created":{"date-parts":[[2004,6,30]],"date-time":"2004-06-30T19:38:21Z","timestamp":1088624301000},"page":"403-408","source":"Crossref","is-referenced-by-count":33,"title":["A cooperative immunization system for an untrusting internet"],"prefix":"10.1109","author":[{"given":"K.G.","family":"Anagnostakis","sequence":"first","affiliation":[]},{"given":"M.B.","family":"Greenwald","sequence":"additional","affiliation":[]},{"given":"S.","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"A.D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"family":"Dekai Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2001","key":"ref10","article-title":"CERT Advisory CA-2001-19: &#x2018;Code Red&#x2019; Worm Exploiting Buffer Overflow in IIS Indexing Service DLL"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844104"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844105"},{"key":"ref15","article-title":"Open Packet Monitoring on FLAME: Safety, Performance and Applications","author":"anagnostakis","year":"2002","journal-title":"Proceeding of International Working Conference on Active Networks (IWAN'02)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"ref3","first-page":"149","article-title":"How to Own the Internet in Your Spare Time","author":"staniford","year":"2002","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/ACSAC.2000.898879","article-title":"On Computer Viral lnfection and the Effect of Immunization","author":"wang","year":"2000","journal-title":"Proceedings of the 16th Annual Computer Security Applications Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194893"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"journal-title":"The Shockwave Rider","year":"1975","author":"brunner","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/358453.358455"},{"key":"ref9","first-page":"130","article-title":"A Biologically Inspired Immune System for Computers","author":"kephart","year":"1994","journal-title":"Artificial Life IV Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems"}],"event":{"name":"The 11th IEEE International Conference on Networks, 2003. ICON2003.","location":"Sydney, Australia"},"container-title":["The 11th IEEE International Conference on Networks, 2003. ICON2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8945\/28322\/01266224.pdf?arnumber=1266224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T08:26:40Z","timestamp":1497601600000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1266224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icon.2003.1266224","relation":{},"subject":[]}}