{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:09:26Z","timestamp":1729678166082,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/pccc.2008.4745139","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T11:04:49Z","timestamp":1232103889000},"page":"51-58","source":"Crossref","is-referenced-by-count":10,"title":["Understanding Divide-Conquer-Scanning Worms"],"prefix":"10.1109","author":[{"given":"Yubin","family":"Li","sequence":"first","affiliation":[]},{"given":"Zesheng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359549"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.229"},{"key":"18","doi-asserted-by":"crossref","first-page":"359","DOI":"10.3233\/JCS-2006-14403","article-title":"effective worm detection for various scan techniques","volume":"14","author":"xia","year":"2006","journal-title":"Computers & Security"},{"key":"15","first-page":"45","article-title":"automated worm fingerprinting","author":"singh","year":"2004","journal-title":"Proc of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI'04)"},{"key":"16","article-title":"how to own the internet in your spare time","author":"staniford","year":"2002","journal-title":"Proc of the 11th USENIX Security Symposium (Security'02)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103638"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.59"},{"key":"11","article-title":"a multi-perspective analysis of the storm (peacomm) worm","author":"porras","year":"2007","journal-title":"SRI Technical Report"},{"key":"12","first-page":"225","article-title":"on the effectiveness of distributed worm monitoring","author":"rajab","year":"2005","journal-title":"Proc of the 14th USENIX Security Symposium (Security'05)"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.07.032"},{"key":"20","article-title":"on detecting camouflaging worm","author":"yu","year":"2006","journal-title":"Proc of Annual Computer Security Applications Conference (ACSAC06)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1177\/0037549706065344"},{"journal-title":"Network telescope","year":"0","key":"23"},{"journal-title":"Grand research challenges in information security & assurance","year":"0","key":"24"},{"year":"0","key":"25"},{"journal-title":"Logistic function","year":"0","key":"26"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2007.358894"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/637241.637244"},{"key":"1","article-title":"toward a model for sources of internet background radiation","author":"barford","year":"2006","journal-title":"Proc of the Passive and Active Measurement Conference (PAM'06)"},{"journal-title":"Introduction to Algorithms","year":"2002","author":"cormen","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.299"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.22"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2007.012826"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"}],"event":{"name":"2008 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2008,12,7]]},"location":"Austin, TX, USA","end":{"date-parts":[[2008,12,9]]}},"container-title":["2008 IEEE International Performance, Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4712735\/4745069\/04745139.pdf?arnumber=4745139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T11:51:11Z","timestamp":1497786671000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4745139\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/pccc.2008.4745139","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}