{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:53:31Z","timestamp":1771703611952,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/wowmom.2008.4594898","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T19:35:49Z","timestamp":1218656149000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["di-jest: Autonomic neighbour management for worm resilience in p2p systems"],"prefix":"10.1109","author":[{"given":"Douglas","family":"McIlwraith","sequence":"first","affiliation":[]},{"given":"Micael","family":"Paquier","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Kotsovinos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103642"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1236233"},{"key":"15","author":"maniatis","year":"2005","journal-title":"The lockss peer-to-peer digital preservation system"},{"key":"16","article-title":"kademlia: a peer-to-peer information system based on the xor metric","author":"maymounkov","year":"2002","journal-title":"IPTPS"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244137"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_9"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2004.06.005"},{"key":"12","year":"0"},{"key":"21","article-title":"how to own the internet in your spare time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium (Security '02)"},{"key":"20","year":"0"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1145\/383059.383071","article-title":"chord: a scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"2001","journal-title":"Proceedings of the ACM SIGCOMM '01 Conference"},{"key":"23","year":"0"},{"key":"24","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/ICCCN.2004.1401717","article-title":"analyzing the performance of internet worm attack approaches","author":"yu","year":"2004","journal-title":"13th International Conference on Computer Communications and Networks (ICCCN 2004)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1341811.1341818"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_3"},{"key":"3","year":"0"},{"key":"2","year":"0"},{"key":"10","first-page":"109","article-title":"multi-user cryptographic techniques","volume":"45","author":"diffie","year":"1976","journal-title":"AFIPS Conference Proceedings"},{"key":"1","year":"0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.48"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.106"},{"key":"5","article-title":"the internet motion sensor - a distributed blackhole monitoring system","author":"bailey","year":"2005","journal-title":"NDSS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/945721.945729"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.055103"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1146847.1146876"}],"event":{"name":"2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM)","location":"Newport Beach, CA, USA","start":{"date-parts":[[2008,6,23]]},"end":{"date-parts":[[2008,6,26]]}},"container-title":["2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586176\/4594794\/04594898.pdf?arnumber=4594898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:53:19Z","timestamp":1497783199000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4594898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2008.4594898","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}