{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:04:28Z","timestamp":1725573868851},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/dsnw.2010.5542598","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T20:22:40Z","timestamp":1281471760000},"page":"170-175","source":"Crossref","is-referenced-by-count":6,"title":["RAVE: Replicated antivirus engine"],"prefix":"10.1109","author":[{"given":"Carlos","family":"Silva","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Verissimo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Enhancing fault \/ intrusion tolerance through design and configuration diversity","author":"bessani","year":"2009","journal-title":"Proceedings of the 3rd Workshop on Recent Advances on Intrusion-Tolerant (WRAITS 2009)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.83"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"article-title":"Rave: Replicated antivirus engine","year":"2009","author":"silva","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"year":"2000","key":"ref16","article-title":"Interscan message security suite"},{"year":"2006","key":"ref17","article-title":"Kaspersky mail gateway"},{"year":"1999","key":"ref18","article-title":"Clamav antivirus toolkit"},{"journal-title":"TrendMicro","year":"1988","key":"ref4"},{"key":"ref3","article-title":"CSI computer crime and security survey","author":"richardson","year":"2008","journal-title":"Computer Security Institute"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2002.1180168"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1122480.1122497"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1988.5327"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.158"},{"key":"ref2","article-title":"Cloudav: N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2009.14"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/40.259898"}],"event":{"name":"2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)","start":{"date-parts":[[2010,6,28]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2010,7,1]]}},"container-title":["2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5532085\/5542594\/05542598.pdf?arnumber=5542598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:05:57Z","timestamp":1602687957000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5542598"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/dsnw.2010.5542598","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}