{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:28:20Z","timestamp":1762032500511,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029618.1029630","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"73-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["A hybrid quarantine defense"],"prefix":"10.1145","author":[{"given":"Phillip","family":"Porras","sequence":"first","affiliation":[{"name":"SRI International, Menlo Park, CA"}]},{"given":"Linda","family":"Briesemeister","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA"}]},{"given":"Keith","family":"Skinner","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA"}]},{"given":"Karl","family":"Levitt","sequence":"additional","affiliation":[{"name":"University of California at Davis, Davis, CA"}]},{"given":"Jeff","family":"Rowe","sequence":"additional","affiliation":[{"name":"University of California at Davis, Davis, CA"}]},{"given":"Yu-Cheng Allen","family":"Ting","sequence":"additional","affiliation":[{"name":"University of California at Davis, Davis, CA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Cooperative Immunization System for an Untrusting Internet,\" in Proceedings of the 11th IEEE International Conference on Networks (ICON)","author":"Anagnostakis K.","year":"2003","unstructured":"K. Anagnostakis , M. Greenwald , S. Ioannidis , A. Keromytis , and D. Li , \" A Cooperative Immunization System for an Untrusting Internet,\" in Proceedings of the 11th IEEE International Conference on Networks (ICON) , Sydney, Australia , September 2003 . K. Anagnostakis, M. Greenwald, S. Ioannidis, A. Keromytis, and D. Li, \"A Cooperative Immunization System for an Untrusting Internet,\" in Proceedings of the 11th IEEE International Conference on Networks (ICON), Sydney, Australia, September 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971646"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948200"},{"key":"e_1_3_2_1_5_1","volume-title":"Least Effort Strategies for Cybersecurity,\" George Mason University","author":"Gorman S.","year":"2003","unstructured":"S. Gorman , R. Kulkarni , L. Schintler , and R. Stough , \" Least Effort Strategies for Cybersecurity,\" George Mason University , 2003 . S. Gorman, R. Kulkarni, L. Schintler, and R. Stough, \"Least Effort Strategies for Cybersecurity,\" George Mason University, 2003."},{"key":"e_1_3_2_1_6_1","volume-title":"Limiting Worms via QoS Degradation,\" University of Pittsburgh","author":"Gualtieri M.","year":"2003","unstructured":"M. Gualtieri and D. Mosse , \" Limiting Worms via QoS Degradation,\" University of Pittsburgh , 2003 . M. Gualtieri and D. Mosse, \"Limiting Worms via QoS Degradation,\" University of Pittsburgh, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"e_1_3_2_1_8_1","volume-title":"Internet Quarantine: Requirements for Containing Self- Propagating Code","author":"Moore D.","year":"2003","unstructured":"D. Moore , C. Shannon , G. Voelker , and S. Savage , \" Internet Quarantine: Requirements for Containing Self- Propagating Code ,\" 2003 . D. Moore, C. Shannon, G. Voelker, and S. Savage, \"Internet Quarantine: Requirements for Containing Self- Propagating Code,\" 2003."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Measurement, Modeling and Analysis of the Internet (IMA Workshop '04)","author":"Nicol D.","year":"2004","unstructured":"D. Nicol , \" Models of Active Worm Defense ,\" in Proceedings of the Measurement, Modeling and Analysis of the Internet (IMA Workshop '04) , Urbana-Champaign, Illinois , January 2004 . D. Nicol, \"Models of Active Worm Defense,\" in Proceedings of the Measurement, Modeling and Analysis of the Internet (IMA Workshop '04), Urbana-Champaign, Illinois, January 2004."},{"key":"e_1_3_2_1_10_1","volume-title":"April","author":"Nojiri D.","year":"2003","unstructured":"D. Nojiri , J. Rowe , and K. Levitt , \" Cooperative Response Strategies for Large Scale Attack Mitigation,\" in Proceedings of the 3rd DARPA Information Survivability Conference and Exposition , April 2003 . D. Nojiri, J. Rowe, and K. Levitt, \"Cooperative Response Strategies for Large Scale Attack Mitigation,\" in Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, April 2003."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 12th USENIX Security Symposium","author":"Provos N.","year":"2004","unstructured":"N. Provos , \" A Virtual Honeypot Framework ,\" in Proceedings of the 12th USENIX Security Symposium , San Diego, California , August 2004 . N. Provos, \"A Virtual Honeypot Framework,\" in Proceedings of the 12th USENIX Security Symposium, San Diego, California, August 2004."},{"key":"e_1_3_2_1_12_1","unstructured":"S. Staniford \"Containment of Scanning Worms in Enterprise Networks \" in Journal of Computer Security 2003.  S. Staniford \"Containment of Scanning Worms in Enterprise Networks \" in Journal of Computer Security 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844105"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948190"},{"key":"e_1_3_2_1_16_1","volume-title":"June","author":"Williamson M.","year":"2002","unstructured":"M. Williamson , \" Throttling Viruses : Restricting Propagation to Defeat Malicious Mobile Code,\" Hewlett Packard , June 2002 . M. Williamson, \"Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code,\" Hewlett Packard, June 2002."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004)","author":"Wong C.","year":"2004","unstructured":"C. Wong , C. Wang , D. Song , S. Bielski , G.R. Granger , \" Dynamic Quarantine of Internet Worms ,\" in Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004) , Florence, Italy , June 2004 . C. Wong, C. Wang, D. Song, S. Bielski, G.R. Granger, \"Dynamic Quarantine of Internet Worms,\" in Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004), Florence, Italy, June 2004."}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Rapid malcode"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029618.1029630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029618.1029630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:00Z","timestamp":1750264260000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029618.1029630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":15,"alternative-id":["10.1145\/1029618.1029630","10.1145\/1029618"],"URL":"https:\/\/doi.org\/10.1145\/1029618.1029630","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}