{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:08:55Z","timestamp":1761401335743},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,28]]},"DOI":"10.1145\/1161289.1161307","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"95-104","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Proactive security for mobile messaging networks"],"prefix":"10.1145","author":[{"given":"Abhijit","family":"Bose","sequence":"first","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"The University of Michigan, Ann Arbor, MI"}]}],"member":"320","published-online":{"date-parts":[[2006,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Symantec \"Symantec internet security threat report \" http:\/\/www.symantec.com\/enterprise\/threatreport\/index.jsp March 2006.  Symantec \"Symantec internet security threat report \" http:\/\/www.symantec.com\/enterprise\/threatreport\/index.jsp March 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"August","author":"Bose A.","year":"2006","unstructured":"A. Bose and K. G. Shin , \" On mobile viruses exploiting messaging and bluetooth services,\" in Accepted for 2nd IEEE International Conference on Security and Privacy in Communication Networks (SecureComm) , August 2006 . A. Bose and K. G. Shin, \"On mobile viruses exploiting messaging and bluetooth services,\" in Accepted for 2nd IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), August 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.28"},{"key":"e_1_3_2_1_4_1","volume-title":"August","author":"Staniford S.","year":"2002","unstructured":"S. Staniford , V. Paxson , and N. Weaver , \" How to 0wn the internet in your spare time,\" 11th USENIX Security Symposium , August 2002 . S. Staniford, V. Paxson, and N. Weaver, \"How to 0wn the internet in your spare time,\" 11th USENIX Security Symposium, August 2002."},{"key":"e_1_3_2_1_5_1","unstructured":"Viruslist.com \"Instant messaging worm win32.opanki.d \" http:\/\/www.viruslist.com\/en\/viruses\/encyclopedia?virusid=84950.  Viruslist.com \"Instant messaging worm win32.opanki.d \" http:\/\/www.viruslist.com\/en\/viruses\/encyclopedia?virusid=84950."},{"key":"e_1_3_2_1_6_1","first-page":"61","volume-title":"December 2002","author":"Williamson M. M.","unstructured":"M. M. Williamson , \"Throttling viruses : restricting propagation to defeat malicious mobile code,\" in 18th Annual Computer Security Applications Conference , December 2002 , pp. 61 -- 68 . M. M. Williamson, \"Throttling viruses: restricting propagation to defeat malicious mobile code,\" in 18th Annual Computer Security Applications Conference, December 2002, pp. 61--68."},{"key":"e_1_3_2_1_7_1","unstructured":"3GPP \"Ts 32.205 charging data description for the circuit switched (cs) domain \" March 2003.  3GPP \"Ts 32.205 charging data description for the circuit switched (cs) domain \" March 2003."},{"key":"e_1_3_2_1_8_1","unstructured":"IBM \"Ibm tivoli configuration manager \" http:\/\/www-306.ibm.com\/software\/tivoli\/products\/config-mgr\/.  IBM \"Ibm tivoli configuration manager \" http:\/\/www-306.ibm.com\/software\/tivoli\/products\/config-mgr\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Forecasting and Time Series Analysis","author":"Montgomery D.","year":"1990","unstructured":"D. Montgomery , L. Johnson , and J. Gardner , Forecasting and Time Series Analysis , 2 nd Edition, McGraw-Hill, Inc. , 1990 . D. Montgomery, L. Johnson, and J. Gardner, Forecasting and Time Series Analysis, 2nd Edition, McGraw-Hill, Inc., 1990.","edition":"2"},{"key":"e_1_3_2_1_10_1","volume-title":"GrIDS --- A graph-based intrusion detection system for large networks,\" in Proceedings of the 19th National Information Systems Security Conference","author":"Staniford-Chen S.","year":"1996","unstructured":"S. Staniford-Chen , S. Cheung , R. Crawford , M. Dilger , J. Frank , J. Hoagland , K. Levitt , C. Wee , R. Yip , and D. Zerkle , \" GrIDS --- A graph-based intrusion detection system for large networks,\" in Proceedings of the 19th National Information Systems Security Conference , 1996 . S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle, \"GrIDS --- A graph-based intrusion detection system for large networks,\" in Proceedings of the 19th National Information Systems Security Conference, 1996."},{"key":"e_1_3_2_1_11_1","volume-title":"August","author":"Weaver N.","year":"2004","unstructured":"N. Weaver , S. Staniford , and V. Paxson , \" Very fast containment of scanning worms,\" in 13th USENIX Security Symposium , August 2004 . N. Weaver, S. Staniford, and V. Paxson, \"Very fast containment of scanning worms,\" in 13th USENIX Security Symposium, August 2004."},{"key":"e_1_3_2_1_12_1","volume-title":"May","author":"Jung J.","year":"2004","unstructured":"J. Jung , V. Paxson , A. Berger , and H. Balakrishnan , \" Fast portscan detection using sequential hypothesis testing,\" in In Proceedings of the IEEE Symposium on Security and Privacy , May 2004 . J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, \"Fast portscan detection using sequential hypothesis testing,\" in In Proceedings of the IEEE Symposium on Security and Privacy, May 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"Virus throttling for instant messaging,\" in Virus Bulletin Conference","author":"Williamson M.","year":"2004","unstructured":"M. Williamson , A. Parry , and A. Byde , \" Virus throttling for instant messaging,\" in Virus Bulletin Conference , 2004 . M. Williamson, A. Parry, and A. Byde, \"Virus throttling for instant messaging,\" in Virus Bulletin Conference, 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_2"},{"key":"e_1_3_2_1_15_1","unstructured":"Cisco \"Cisco network admission control \" http:\/\/www.cisco.com 2003.  Cisco \"Cisco network admission control \" http:\/\/www.cisco.com 2003."},{"key":"e_1_3_2_1_16_1","unstructured":"Inc. Trend Micro \"Network viruswall outbreak prevention appliance \" http:\/\/www.trendmicro.com 2004.  Inc. Trend Micro \"Network viruswall outbreak prevention appliance \" http:\/\/www.trendmicro.com 2004."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029630"},{"key":"e_1_3_2_1_19_1","unstructured":"V. Samanta \"A study of mobile messaging services \" UCLA Master's Thesis 2005.  V. Samanta \"A study of mobile messaging services \" UCLA Master's Thesis 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029625"},{"key":"e_1_3_2_1_21_1","volume-title":"Primary response technical white paper,\" in Sana Security","author":"Hofmeyr S.","year":"2005","unstructured":"S. Hofmeyr and M. Williamson , \" Primary response technical white paper,\" in Sana Security , 2005 . S. Hofmeyr and M. Williamson, \"Primary response technical white paper,\" in Sana Security, 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103629"},{"key":"e_1_3_2_1_23_1","volume-title":"Enterprise security: A community of interest based approach,\" in In Proc. of NDSS","author":"McDaniel P.","year":"2006","unstructured":"P. McDaniel , S. Sen , O. Spatscheck , J. Van der Merwe , B. Aiello , and C. Kalmanek , \" Enterprise security: A community of interest based approach,\" in In Proc. of NDSS , 2006 . P. McDaniel, S. Sen, O. Spatscheck, J. Van der Merwe, B. Aiello, and C. Kalmanek, \"Enterprise security: A community of interest based approach,\" in In Proc. of NDSS, 2006."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948197"}],"event":{"name":"DIWANS06: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks 2006","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Los Angeles California","acronym":"DIWANS06"},"container-title":["Proceedings of the 5th ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161289.1161307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T19:16:39Z","timestamp":1673205399000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161289.1161307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,28]]},"references-count":23,"alternative-id":["10.1145\/1161289.1161307","10.1145\/1161289"],"URL":"https:\/\/doi.org\/10.1145\/1161289.1161307","relation":{},"subject":[],"published":{"date-parts":[[2006,9,28]]},"assertion":[{"value":"2006-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}