{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:13Z","timestamp":1763468233712,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999405","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:44:39Z","timestamp":1421721879000},"page":"101-108","source":"Crossref","is-referenced-by-count":1,"title":["Bacterial quorum sensing for coordination of targeted malware"],"prefix":"10.1109","author":[{"given":"Mark E.","family":"Fioravanti","sequence":"first","affiliation":[]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.cellbio.21.012704.131001"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2180-6-53"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314394"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v2i5.528"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1101\/cshperspect.a012427"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-genet-102108-134304"},{"key":"14","article-title":"Camouflaging worm detection using psd and sfm scheme","volume":"1","author":"prasanth","year":"2012","journal-title":"National Conference on Future Computing"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.micro.112408.134306"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.micro.55.1.165"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2958.2004.04234.x"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1126\/science.284.5418.1318"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.161"},{"key":"2","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/1030083.1030108","article-title":"Ip covert timing channels: Design and detection","author":"cabuk","year":"2004","journal-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-8674(02)00749-3"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1038\/nrmicro1557"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2012.6393579"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1128\/MMBR.00002-06"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.97.7.3526"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2007.2045"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2958.2003.03688.x"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999405.pdf?arnumber=6999405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T01:43:47Z","timestamp":1651023827000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999405","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}