{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:28:20Z","timestamp":1762032500277,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029618.1029620","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["A study of mass-mailing worms"],"prefix":"10.1145","author":[{"given":"Cynthia","family":"Wong","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Stan","family":"Bielski","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Jonathan M.","family":"McCune","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Network Associates and 2000-05. Vbs\/loveletter@mm. World Wide Web http:\/\/vil.nai.com\/vil\/content\/v_98617.htm 2000.  Network Associates and 2000-05. Vbs\/loveletter@mm. World Wide Web http:\/\/vil.nai.com\/vil\/content\/v_98617.htm 2000."},{"key":"e_1_3_2_1_2_1","unstructured":"Network Associates and 2001-07. W32\/sircam@mm. World Wide Web http:\/\/vil.nai.com\/vil\/content\/v_99141.htm 2001.  Network Associates and 2001-07. W32\/sircam@mm. World Wide Web http:\/\/vil.nai.com\/vil\/content\/v_99141.htm 2001."},{"key":"e_1_3_2_1_3_1","unstructured":"Network Associates and 2003-08. W32\/sobig.f@mm. World Wide Web http:\/\/vil.nai.com\/vil\/content\/v_100561.htm 2003.  Network Associates and 2003-08. W32\/sobig.f@mm. World Wide Web http:\/\/vil.nai.com\/vil\/content\/v_100561.htm 2003."},{"key":"e_1_3_2_1_4_1","unstructured":"Network Associates and 2004-01. W32\/mydoom@mm. World Wide Web http:\/\/vil.nai.com\/vil\/content\/v_100983.htm 2004.  Network Associates and 2004-01. W32\/mydoom@mm. World Wide Web http:\/\/vil.nai.com\/vil\/content\/v_100983.htm 2004."},{"key":"e_1_3_2_1_5_1","unstructured":"CERT. CERT Advisory CA-2003-04 MS-SQL Server Worm. World Wide Web http:\/\/www.cert.org\/advisories\/CA-2003-04.html.  CERT. CERT Advisory CA-2003-04 MS-SQL Server Worm. World Wide Web http:\/\/www.cert.org\/advisories\/CA-2003-04.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/977400.977961"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"e_1_3_2_1_9_1","volume-title":"An approach for detecting self-propagating email using anomaly detection","author":"Gupta A.","year":"2003","unstructured":"A. Gupta and R. Sekar . An approach for detecting self-propagating email using anomaly detection . September 2003 A. Gupta and R. Sekar. An approach for detecting self-propagating email using anomaly detection. September 2003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720288"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238052"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948198"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 18th Annual Computer Security Applications Conference","author":"Williamson Matthew M","year":"2002","unstructured":"Matthew M Williamson . Throttling viruses : Restricting propagation to defeat malicious mobile code . In Proceedings of the 18th Annual Computer Security Applications Conference , Las Vegas, Nevada , December 2002 . Matthew M Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2002."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956450"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009382.1009723"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Rapid malcode"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029618.1029620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029618.1029620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:00Z","timestamp":1750264260000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029618.1029620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":17,"alternative-id":["10.1145\/1029618.1029620","10.1145\/1029618"],"URL":"https:\/\/doi.org\/10.1145\/1029618.1029620","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}