{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T06:15:59Z","timestamp":1725430559564},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/dsn.2009.5270341","type":"proceedings-article","created":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T18:41:36Z","timestamp":1254336096000},"page":"155-164","source":"Crossref","is-referenced-by-count":5,"title":["Verme: Worm containment in overlay networks"],"prefix":"10.1109","author":[{"given":"Filipe","family":"Freitas","sequence":"first","affiliation":[]},{"given":"Edgar","family":"Marques","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Ribeiro","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2006.1639704"},{"key":"17","article-title":"a performance vs. cost framework for evaluating dht design tradeoffs under churn","author":"li","year":"0","journal-title":"Proc IEEE INFOCOM '05"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"15","article-title":"surviving internet catastrophes","author":"junqueira","year":"2005","journal-title":"Proceedings of USENIX Annual Tech Conference"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972384"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637203"},{"journal-title":"Verme Worm containment in overlay networks","year":"2008","author":"freitas","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270341"},{"key":"21","article-title":"how to 0wn the internet in your spare time","author":"staniford","year":"0","journal-title":"Proc of USENIX Security Symposium 2002"},{"key":"20","article-title":"automated worm fingerprinting","author":"singh","year":"0","journal-title":"Proceedings of 6th Symposium on operating design and implementation 2004 (OSDI 2004)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2009053"},{"key":"23","article-title":"chord: a scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"0","journal-title":"Proc of SIGCOMM '01"},{"key":"24","article-title":"experience with an object reputation system for peer-to-peer filesharing","author":"walsh","year":"0","journal-title":"3rd Symposium on Networked Systems Design and Implementation (NSDI 06)"},{"key":"25","article-title":"peer-to-peer system-based active worm attacks: modeling and analysis","author":"yu","year":"0","journal-title":"IEEE International Conference on Communications (ICC)"},{"key":"26","article-title":"how to model an internetwork","author":"zegura","year":"1996","journal-title":"Proc INFOCOM"},{"key":"27","article-title":"a first look at peer-to-peer worms: threats and defenses","author":"zhou","year":"0","journal-title":"Proceedings of 4th International Workshop on Peer-to-Peer Systems (IPTPS'05)"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857113"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","article-title":"the sybil attack","author":"douceur","year":"0","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"6","article-title":"incentives build robustness in bittorrent","author":"cohen","year":"2003","journal-title":"Proceedings of the 1st Workshop on the Economics of Peer-to-Peer Systems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1146847.1146876"},{"year":"0","key":"4"},{"key":"9","article-title":"designing a dht for low latency and high throughput","author":"dabek","year":"0","journal-title":"Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI '04)"},{"key":"8","article-title":"widearea cooperative storage with cfs","author":"dabek","year":"0","journal-title":"Proceedings of the 18th ACM Symposium on Operating System Principles (SOSP'01)"}],"event":{"name":"2009 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks (DSN)","start":{"date-parts":[[2009,6,29]]},"location":"Lisbon","end":{"date-parts":[[2009,7,2]]}},"container-title":["2009 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5243642\/5270274\/05270341.pdf?arnumber=5270341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T09:28:51Z","timestamp":1585301331000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5270341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/dsn.2009.5270341","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}