{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:36:11Z","timestamp":1729672571914,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541811","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T15:51:40Z","timestamp":1281455500000},"page":"416-420","source":"Crossref","is-referenced-by-count":0,"title":["The research of worm distributed detection technology based on network security"],"prefix":"10.1109","author":[{"family":"Tong Xiaojun","sequence":"first","affiliation":[]},{"family":"Zhao Zhangquan","sequence":"additional","affiliation":[]},{"family":"Shuai Huimin","sequence":"additional","affiliation":[]},{"family":"Wang Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Design of the worm detection system Based on the worm propagation characteristics","year":"0","author":"guangsong","key":"ref4"},{"key":"ref3","first-page":"412","article-title":"A Coordinated Worm Detection Method Based on Local Nets","author":"xin-yu","year":"2007","journal-title":"Journal of Software"},{"journal-title":"Proceedings of Fifth Annual Computer Security Applications Conference New Orleans 1989","article-title":"Model of Security Monitoring","year":"1989","key":"ref10"},{"key":"ref6","first-page":"609","article-title":"Statistical Inference for Stochastic Epidemic Models [A]","author":"streftaris","year":"2002","journal-title":"Proceedings of the 17th International Workshop on Statistical Modeling [C]"},{"key":"ref5","first-page":"17","volume":"23","author":"eugene","year":"1989","journal-title":"The Internet worm programs ACM Computer"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1145\/586110.586130","article-title":"Code Red Worm Propagation Modeling and Analysis [A]","author":"zou","year":"2002","journal-title":"Proc of the 9th ACM Symp on Computer and Communication Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948198"},{"key":"ref2","article-title":"Research the Propagation Model of Internet Worm","volume":"1244~1246","author":"dian-xu","year":"2007","journal-title":"Network Communication and Security 2007"},{"key":"ref9","first-page":"419","author":"dantu","year":"2004","journal-title":"Dynamic control of worm propagation Information Technology"},{"key":"ref1","article-title":"Routing worm propagation model in IPv6 networks","volume":"3920","author":"yan-gui","year":"2009","journal-title":"Application Research of Computers"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541811.pdf?arnumber=5541811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T08:30:32Z","timestamp":1711701032000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541811","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}