{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:09:59Z","timestamp":1730279399713,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iwcmc.2013.6583808","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T15:31:30Z","timestamp":1377790290000},"page":"1678-1682","source":"Crossref","is-referenced-by-count":2,"title":["Determining vulnerability resolution time by examining malware proliferation rates"],"prefix":"10.1109","author":[{"given":"Jeremy D.","family":"Seideman","sequence":"first","affiliation":[]},{"given":"Bilal","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Ghassen","family":"Ben Brahim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Recent advances in malware detection and classification: A survey","author":"seideman","year":"2009","journal-title":"The Graduate School and University Center of the City University of New York Tech Rep"},{"year":"2008","journal-title":"Virus Total","key":"17"},{"year":"2009","journal-title":"Norman Sandbox","key":"18"},{"year":"2012","journal-title":"Symantec","key":"15"},{"year":"2012","journal-title":"Threat Explorer - Spyware and Adware Dialers Hack Tools Hoaxes and Other Risks","key":"16"},{"year":"2010","journal-title":"Offensive Computing Community Malicious Code Research and Analysis","key":"13"},{"year":"2010","journal-title":"VX heavens","key":"14"},{"year":"2012","journal-title":"Dionaea - Catches Bugs","key":"11"},{"year":"2010","journal-title":"The Honeynet Project","key":"12"},{"key":"3","article-title":"Windows operating system vulnerabilities","volume":"1","author":"sharma","year":"2011","journal-title":"International Journal of Computing and Corporate Re-search"},{"year":"2005","author":"cencini","journal-title":"Software Vulnerabilities Full- Responsible- and Non-Disclosure","key":"2"},{"year":"2012","journal-title":"Metasploit","key":"1"},{"year":"2010","journal-title":"Nepenthes - finest collection","key":"10"},{"year":"2012","journal-title":"The Evolution of Malware and the Threat Landscape - A 10-year Review Key Findings","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1314257.1314261"},{"key":"5","article-title":"Impact of vulnerability disclosure and patch availability - An empirical analysis","author":"arora","year":"2004","journal-title":"Third Workshop on the Economics of Information Security"},{"year":"2004","author":"chambers","journal-title":"National Infrastructure Advisory Council Vulnerability Disclosure Framework Final Report and Recommendations by the Council","key":"4"},{"year":"2012","journal-title":"ISC Security Vulnerability Disclosure Policy","key":"9"},{"year":"2005","author":"arora","journal-title":"Competitive and Strategic Effects in the Timing of Patch Release","key":"8"}],"event":{"name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013)","start":{"date-parts":[[2013,7,1]]},"location":"Sardinia, Italy","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6578011\/6583517\/06583808.pdf?arnumber=6583808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:00:22Z","timestamp":1602673222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6583808"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2013.6583808","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}