{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:10:37Z","timestamp":1761401437647},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5062064","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T15:10:14Z","timestamp":1244041814000},"source":"Crossref","is-referenced-by-count":65,"title":["A Social Network Based Patching Scheme for Worm Containment in Cellular Networks"],"prefix":"10.1109","author":[{"given":"Z.","family":"Zhu","sequence":"first","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA"}]},{"given":"G.","family":"Cao","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA"}]},{"given":"S.","family":"Zhu","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA"}]},{"given":"S.","family":"Ranjan","sequence":"additional","affiliation":[]},{"given":"A.","family":"Nucci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"multimedia messaging service: system description and performance analysis","author":"keshav","year":"2005","journal-title":"Proceedings of the First International Conference on Wireless Internet"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1970.tb01770.x"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1137\/S1064827595287997"},{"key":"16","year":"0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/98.824570"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(00)00048-X"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314402"},{"key":"12","author":"garey","year":"1979","journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080806"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.211"},{"key":"22","author":"moore","year":"2003","journal-title":"The Spread of the Sapphire\/Slammer Worm"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"24","article-title":"graph partitioning for high performance scientific simulations","author":"schloegel","year":"2004","journal-title":"Computing Reviews"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103634"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(00)00046-6"},{"key":"27","article-title":"white worms don't work","author":"weaver","year":"0","journal-title":"USENIX"},{"key":"28","article-title":"empirical analysis of rate limiting mechanisms","author":"wong","year":"0","journal-title":"RAID 2005"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374640"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247690"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378626"},{"key":"10","year":"0","journal-title":"F-secure virus information pages Commwarrior"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.856838"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062173"},{"key":"7","year":"0","journal-title":"F-secure deepguard - a proactive response to the evolving threat scenario"},{"key":"6","year":"0","journal-title":"Close the zero-hour gap Protection"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-74853-3_24","article-title":"exploiting social interactions in mobile systems","author":"miklas","year":"2007","journal-title":"UbiComp 2007 Ubiquitous Computing"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857113"},{"key":"4","year":"0"},{"key":"9","year":"0","journal-title":"F-secure virus information pages Cabir"},{"key":"8","year":"0","journal-title":"F-secure malware information pages Sms-worm symbos\/feak"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2009,4,19]]},"end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05062064.pdf?arnumber=5062064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T18:21:36Z","timestamp":1677781296000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5062064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5062064","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}