{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:40:51Z","timestamp":1725720051490},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/nas.2018.8515718","type":"proceedings-article","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T20:39:51Z","timestamp":1542659991000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Worm Containment Approach Towards Online Social Networks"],"prefix":"10.1109","author":[{"given":"Zhaolong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhichao","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.3724\/SP.J.1001.2008.01508"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TDSC.2007.1002"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"ref15","first-page":"335","article-title":"Spectator: detection and containment of JavaScript worms","author":"livshits","year":"2008","journal-title":"USENIX 2008 Annual Technical Conference on Annual Technical Conference USENIX Association"},{"key":"ref16","article-title":"Pathcutter: Severing the self-propagation path of xss javascript worms in social web networks","author":"cao","year":"2012","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref17","first-page":"331","article-title":"Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers","author":"terlouw","year":"2009","journal-title":"Proceedings of the 2009 30th IEEE Symposium on Security and Privacy (SP '09) IEEE Computer Society"},{"year":"2010","key":"ref4"},{"year":"0","key":"ref3"},{"key":"ref6","article-title":"A social network based patching scheme for worm containment in cellulat networks","author":"zhu","year":"2009","journal-title":"IEEE INFOCOM'09 USA"},{"year":"0","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TDSC.2007.1002"},{"key":"ref7","article-title":"A novel method for worm containment on dynamic social netowrks","author":"nguyen","year":"2010","journal-title":"The 2010 Military Communications Conference"},{"year":"0","key":"ref2"},{"year":"2007","author":"grossman","journal-title":"Cross-Site Scripting Worms and Viruses The Impending Thread and the Best Defense","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.3724\/SP.J.1001.2013.04295"}],"event":{"name":"2018 IEEE International Conference on Networking, Architecture and Storage (NAS)","start":{"date-parts":[[2018,10,11]]},"location":"Chongqing","end":{"date-parts":[[2018,10,14]]}},"container-title":["2018 IEEE International Conference on Networking, Architecture and Storage (NAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8515292\/8515684\/08515718.pdf?arnumber=8515718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T19:28:24Z","timestamp":1598210904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8515718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/nas.2018.8515718","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}