{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:33:06Z","timestamp":1729675986793,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/imcsit.2008.4747333","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T15:30:21Z","timestamp":1232119821000},"page":"791-798","source":"Crossref","is-referenced-by-count":1,"title":["A new worm propagation threat in BitTorrent: Modeling and analysis"],"prefix":"10.1109","author":[{"given":"Sinan","family":"Hatahet","sequence":"first","affiliation":[]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[]},{"given":"Yacine","family":"Challal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"modeling the spread of","author":"chen","year":"2003","journal-title":"Proceedings oflEEEINFOCOM San Francisco"},{"key":"18","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.cose.2006.10.003","article-title":"modeling and analyzing the spread of active worms based on p2p systems","volume":"26","author":"tao li","year":"2007","journal-title":"Computers & Secu-rity"},{"year":"0","journal-title":"Theory org","article-title":"bittorrent protocol specification vl.0","key":"15"},{"key":"16","article-title":"the bittorrent p2p file-sharing system: measure-ments and analysis","author":"pouwelse","year":"2005","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"year":"0","journal-title":"CERT","key":"13"},{"key":"14","article-title":"the emerging threat of peer-to-peer worms","author":"khiat","year":"2006","journal-title":"MonAM 2006 Workshop"},{"year":"2007","author":"robert","journal-title":"2007 CSI Computer Crime and Security Survey","key":"11"},{"year":"0","author":"sharma","journal-title":"Worms Attacks Defense and Models","key":"12"},{"year":"2003","author":"cohen","journal-title":"Incentives build robustness in Bittorrent","key":"3"},{"year":"2002","author":"wallach","journal-title":"A Survey of Peer-to-Peer Security Issues","key":"2"},{"year":"2004","author":"androutsellis-theotokis","journal-title":"A Survey of Peer-to-Peer Content Distribution Technologies","key":"1"},{"key":"10","article-title":"internet worms as internet-wide threat","author":"joukov","year":"2003","journal-title":"Experimental Computer Systems Lab Tech Rep TR-143 September"},{"year":"2005","author":"go?ldi","journal-title":"Scan Detection Based Identification of Worm Infected Hosts","key":"7"},{"key":"6","article-title":"peer-to-peer system-based active worm attacks: modeling and analysis","author":"yu","year":"2005","journal-title":"IEEE International Con-ference on Communications (ICC)"},{"key":"5","first-page":"26","author":"dale","year":"2007","journal-title":"A Measurement Study of Piece Population in BitTorrent"},{"year":"0","journal-title":"P2P Survey 2007","key":"4"},{"year":"2004","author":"david","journal-title":"Measurement and Analysis of BitTorrent Signaling Traffic","key":"9"},{"year":"0","author":"hales","journal-title":"How to Cheat BitTorrent and Why Nobody Does","key":"8"}],"event":{"name":"2008 International Multiconference on Computer Science and Information Technology (IMCSIT)","start":{"date-parts":[[2008,10,20]]},"location":"Wisla, Poland","end":{"date-parts":[[2008,10,22]]}},"container-title":["2008 International Multiconference on Computer Science and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4731350\/4747203\/04747333.pdf?arnumber=4747333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T15:50:53Z","timestamp":1497801053000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4747333\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/imcsit.2008.4747333","relation":{},"ISSN":["1896-7094"],"issn-type":[{"type":"print","value":"1896-7094"}],"subject":[],"published":{"date-parts":[[2008,10]]}}}