{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:13:45Z","timestamp":1774541625693,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/infcom.2003.1209211","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"1890-1900 vol.3","source":"Crossref","is-referenced-by-count":258,"title":["Modeling the spread of active worms"],"prefix":"10.1109","author":[{"given":"Z.","family":"Chen","sequence":"first","affiliation":[]},{"given":"L.","family":"Gao","sequence":"additional","affiliation":[]},{"given":"K.","family":"Kwiat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","author":"last","year":"0"},{"key":"13","year":"0","journal-title":"CAIDA Analysis of Code-Red"},{"key":"14","author":"liston","year":"0","journal-title":"Welcome to My Tarpit - The Tactical and Strategic use of LaBrea"},{"key":"11","author":"moore","year":"0","journal-title":"The spread of the code-red worm (CRv2)"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1145\/586110.586130","article-title":"Code red worm propagation modeling and analysis","author":"zou","year":"2002","journal-title":"9th ACM Conference on Computer and Communication Security"},{"key":"3","year":"2001","journal-title":"CERT advisory ca-2001-26 Nimda worm"},{"key":"2","article-title":"Nimda worm analysis","author":"machie","year":"2001","journal-title":"Tech Rep"},{"key":"1","article-title":"Code red II worm","author":"russell","year":"2001","journal-title":"Tech Rep"},{"key":"10","author":"weaver","year":"0","journal-title":"Warhol Worms The Potential for Very Fast Internet Plagues"},{"key":"7","first-page":"447","article-title":"How topology affects population dynamics","author":"kephart","year":"1994","journal-title":"Artificial Life III Studies in the Sciences of Complexity"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287647"},{"key":"5","article-title":"How to own the internet in your spare time","author":"staniford","year":"2002","journal-title":"Proc of the 11th USENIX Security Symposium (Security '02)"},{"key":"4","article-title":"A snapshot of global internet worm activity","author":"song","year":"2001","journal-title":"Tech Rep"},{"key":"9","article-title":"Open problems in computer virus research","author":"white","year":"1998","journal-title":"Virus Bulletin Conference"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"}],"event":{"name":"IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies","location":"San Francisco, CA","start":{"date-parts":[[2003,3,30]]},"end":{"date-parts":[[2003,4,3]]}},"container-title":["IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8585\/27207\/01209211.pdf?arnumber=1209211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T13:21:47Z","timestamp":1734268907000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1209211\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/infcom.2003.1209211","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}