{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:07:45Z","timestamp":1763467665129,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030101","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"121-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["On achieving software diversity for improved network security using distributed coloring algorithms"],"prefix":"10.1145","author":[{"given":"Adam J.","family":"O'Donnell","sequence":"first","affiliation":[{"name":"Drexel University"}]},{"given":"Harish","family":"Sethu","sequence":"additional","affiliation":[{"name":"Drexel University"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"378","volume":"406","author":"Albert R.","year":"2000","unstructured":"R. Albert , H. Jeong , and A. L. Barab\u00e1si . Error and Attack Tolerance of Complex Networks. Nature , 406 : 378 -- 382 , July 2000 . R. Albert, H. Jeong, and A. L. Barab\u00e1si. Error and Attack Tolerance of Complex Networks. Nature, 406:378--382, July 2000.","journal-title":"Error and Attack Tolerance of Complex Networks. Nature"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/586110.586140"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-58412-1","volume-title":"Complexity and Approximation: Combinatorial Optimization Problems and Their Approximability Properties","author":"Ausiello G.","year":"1999","unstructured":"G. Ausiello , M. Protasi , A. Marchetti-Spaccamela , G. Gambosi , P. Crescenzi , and V. Kann . Complexity and Approximation: Combinatorial Optimization Problems and Their Approximability Properties . Springer-Verlag New York, Inc. , 1999 . G. Ausiello, M. Protasi, A. Marchetti-Spaccamela, G. Gambosi, P. Crescenzi, and V. Kann. Complexity and Approximation: Combinatorial Optimization Problems and Their Approximability Properties. Springer-Verlag New York, Inc., 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 7th USENIX Security Symposium","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , H. Hinton , P. Bakke , S. Beattie , A. Grier , P. Wagle , and Q. Zhang . Automatic detection and prevention of buffer-overflow attacks . In Proceedings of the 7th USENIX Security Symposium , January 1998 . C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Automatic detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, January 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.5555\/314161.314387"},{"issue":"055103","key":"e_1_3_2_1_7_1","volume":"65","author":"Dezs\u00f6 Z.","year":"2002","unstructured":"Z. Dezs\u00f6 and A.-L. Barab\u00e1si . Halting viruses in scale-free networks. Physical Review E , 65 ( 055103 ), 2002 . Z. Dezs\u00f6 and A.-L. Barab\u00e1si. Halting viruses in scale-free networks. Physical Review E, 65(055103), 2002.","journal-title":"Physical Review E"},{"key":"e_1_3_2_1_8_1","volume-title":"Scale-free topology of e-mail networks. Physical Review E, 66(035103(R))","author":"Ebel H.","year":"2002","unstructured":"H. Ebel , L.-I. Mielsch , and S. Bornholdt . Scale-free topology of e-mail networks. Physical Review E, 66(035103(R)) , 2002 . H. Ebel, L.-I. Mielsch, and S. Bornholdt. Scale-free topology of e-mail networks. Physical Review E, 66(035103(R)), 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/ICASSP.2001.940390"},{"key":"e_1_3_2_1_10_1","volume-title":"GCC extension for protecting applications from stack-smashing attacks","author":"Etoh H.","year":"2004","unstructured":"H. Etoh . GCC extension for protecting applications from stack-smashing attacks , 2004 . http:\/\/www.trl.ibm.com\/projects\/security\/ssp\/. H. Etoh. GCC extension for protecting applications from stack-smashing attacks, 2004. http:\/\/www.trl.ibm.com\/projects\/security\/ssp\/."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_13_1","volume-title":"CCIA","author":"Geer D.","year":"2003","unstructured":"D. Geer , R. Bace , P. Gutmann , P. Metzger , C. P. Pfleeger , J. S. Quarterman , and B. Schneier . Cyberinsecurity: The cost of monopoly. Technical report , CCIA , 2003 . http:\/\/www.ccianet.org\/papers\/cyberinsecurity.pdf. D. Geer, R. Bace, P. Gutmann, P. Metzger, C. P. Pfleeger, J. S. Quarterman, and B. Schneier. Cyberinsecurity: The cost of monopoly. Technical report, CCIA, 2003. http:\/\/www.ccianet.org\/papers\/cyberinsecurity.pdf."},{"key":"e_1_3_2_1_14_1","volume-title":"Symantec","author":"Gudmundsson A.","year":"2001","unstructured":"A. Gudmundsson and E. Chien . Security response: W32.klez.a@mm. Technical report , Symantec , 2001 . http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.klez.a@mm.html. A. Gudmundsson and E. Chien. Security response: W32.klez.a@mm. Technical report, Symantec, 2001. http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.klez.a@mm.html."},{"key":"e_1_3_2_1_15_1","volume-title":"CERT, 2001","author":"Havrilla J. S.","year":"2001","unstructured":"J. S. Havrilla and S. V. Hernan . Advisory CA-2001-06: Automatic execution of embedded mime types. Technical report , CERT, 2001 . http:\/\/www.cert.org\/advisories\/CA- 2001 -06.html. J. S. Havrilla and S. V. Hernan. Advisory CA-2001-06: Automatic execution of embedded mime types. Technical report, CERT, 2001. http:\/\/www.cert.org\/advisories\/CA-2001-06.html."},{"key":"e_1_3_2_1_16_1","volume-title":"Genetic vulnerability of major crops","author":"Horsfall T. G.","year":"1972","unstructured":"T. G. Horsfall . Genetic vulnerability of major crops . National Academy of Sciences , 1972 . T. G. Horsfall. Genetic vulnerability of major crops. National Academy of Sciences, 1972."},{"key":"e_1_3_2_1_17_1","volume-title":"CERT, 2003","author":"Householder A.","year":"2003","unstructured":"A. Householder and R. Danyliw . Advisory CA-2003-08: Increased activity targeting windows shares. Technical report , CERT, 2003 . http:\/\/www.cert.org\/advisories\/CA- 2003 -08.html. A. Householder and R. Danyliw. Advisory CA-2003-08: Increased activity targeting windows shares. Technical report, CERT, 2003. http:\/\/www.cert.org\/advisories\/CA-2003-08.html."},{"key":"e_1_3_2_1_18_1","first-page":"49","volume-title":"Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02)","author":"Jha S.","unstructured":"S. Jha , O. Sheyner , and J. Wing . Two formal analyses of attack graphs . In Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02) , page 49 . IEEE Computer Society, 2002. S. Jha, O. Sheyner, and J. Wing. Two formal analyses of attack graphs. In Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW'02), page 49. IEEE Computer Society, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/SECPRI.1988.8097"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_21_1","volume-title":"CERT, 2003","author":"Lanza J. P.","year":"2003","unstructured":"J. P. Lanza and S. V. Hernan . Advisory CA-2003-07: Remote buffer overflow in sendmail. Technical report , CERT, 2003 . http:\/\/www.cert.org\/advisories\/CA- 2003 -07.html. J. P. Lanza and S. V. Hernan. Advisory CA-2003-07: Remote buffer overflow in sendmail. Technical report, CERT, 2003. http:\/\/www.cert.org\/advisories\/CA-2003-07.html."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/874070.876066"},{"key":"e_1_3_2_1_23_1","first-page":"346","volume-title":"Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'01)","author":"Medina A.","unstructured":"A. Medina , A. Lakhina , I. Matta , and J. Byers . Brite: An approach to universal topology generation . In Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'01) , page 346 . IEEE Computer Society, 2001. A. Medina, A. Lakhina, I. Matta, and J. Byers. Brite: An approach to universal topology generation. In Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS'01), page 346. IEEE Computer Society, 2001."},{"key":"e_1_3_2_1_24_1","volume-title":"Email networks and the spread of computer viruses. Physical Review E, 66(035101)","author":"Newman M. E. J.","year":"2002","unstructured":"M. E. J. Newman , S. Forrest , and J. Balthrop . Email networks and the spread of computer viruses. Physical Review E, 66(035101) , 2002 . M. E. J. Newman, S. Forrest, and J. Balthrop. Email networks and the spread of computer viruses. Physical Review E, 66(035101), 2002."},{"key":"e_1_3_2_1_25_1","first-page":"113","volume-title":"Handbook of Graphs and Networks: From the Genome to the Internet","author":"Pastor-Satorras R.","year":"2002","unstructured":"R. Pastor-Satorras and A. Vespignani . Epidemics and immunization in scale-free networks . In S. Bornholdt and H. G. Schuster, editors, Handbook of Graphs and Networks: From the Genome to the Internet , pages 113 -- 132 . Wiley-VCH , May 2002 . R. Pastor-Satorras and A. Vespignani. Epidemics and immunization in scale-free networks. In S. Bornholdt and H. G. Schuster, editors, Handbook of Graphs and Networks: From the Genome to the Internet, pages 113--132. Wiley-VCH, May 2002."},{"issue":"036104","key":"e_1_3_2_1_26_1","volume":"65","author":"Pastor-Satorras R.","year":"2002","unstructured":"R. Pastor-Satorras and A. Vespignani . Immunization of complex networks. Physical Review E , 65 ( 036104 ), 2002 . R. Pastor-Satorras and A. Vespignani. Immunization of complex networks. Physical Review E, 65(036104), 2002.","journal-title":"Immunization of complex networks. Physical Review E"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/310889.310919"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/971617.971650"},{"key":"e_1_3_2_1_29_1","volume-title":"Springer-Verlang New York","author":"Vazirani V. V.","year":"2001","unstructured":"V. V. Vazirani . Approximation Algorithms . Springer-Verlang New York , Inc ., 2001 . V. V. Vazirani. Approximation Algorithms. Springer-Verlang New York, Inc., 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/948187.948198"},{"key":"e_1_3_2_1_31_1","first-page":"61","volume-title":"Proceedings of the 18th Annual Computer Security Applications Conference","author":"Williamson M. M.","unstructured":"M. M. Williamson . Throttling viruses : Restricting propagation to defeat malicious mobile code . In Proceedings of the 18th Annual Computer Security Applications Conference , page 61 . IEEE Computer Society, 2002. M. M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. In Proceedings of the 18th Annual Computer Security Applications Conference, page 61. IEEE Computer Society, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.5555\/1895868.1895900"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/508171.508177"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS04","name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030101","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":32,"alternative-id":["10.1145\/1030083.1030101","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030101","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}