{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:56:57Z","timestamp":1729641417588,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541851","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T15:51:40Z","timestamp":1281455500000},"page":"607-611","source":"Crossref","is-referenced-by-count":1,"title":["Combating self-learning worms by using predators"],"prefix":"10.1109","author":[{"given":"Fangwei","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yunkai","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Honggang Guo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Changguang Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"38","article-title":"Models and analysis of active worm defense","author":"nicol","year":"2005","journal-title":"Proceedings of the Workshop on Mathematical Methods and Models and Architecture for Computer Networks Security May"},{"key":"ref11","first-page":"157","article-title":"Model-based analysis of two fighting worms","author":"tamimi","year":"2006","journal-title":"IEEE\/IIU Proceedings of International Conference on Computer & Communication Engineering (lCCCE'06)"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1002\/wcm.703"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/S0025-5564(02)00108-6"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/MSP.2005.106"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MSECP.2003.1219056"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICDCS.2004.1281596"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1002\/sec.51"},{"year":"2005","author":"szor","journal-title":"The Art of Computer Virus Research and Defense","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.adhoc.2009.02.004"},{"key":"ref3","first-page":"535","article-title":"Computer worm ecology in encounter-based networks","author":"tanachaimiwat","year":"2007","journal-title":"The Fourth International Conference on Broadband Communications Networks and Systems (BROADNETS)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MSP.2004.59"},{"year":"2004","author":"shannon","article-title":"The CAIDA dataset on the Witty worm","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2005.63","article-title":"Collaborative Internet worm containment","volume":"3","author":"cai","year":"2005","journal-title":"IEEE Security & Privacy"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1029618.1029631"},{"key":"ref2","first-page":"649","article-title":"Modeling and analysis of worm interactions (war of the worms)","author":"tanachaimiwat","year":"2007","journal-title":"The Fourth International Conference on Broadband Communications Networks and Systems (BROADNETS)"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/844102.844105"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CSAC.2004.47"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541851.pdf?arnumber=5541851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:22:39Z","timestamp":1497874959000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541851","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}