{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:45:42Z","timestamp":1725615942520},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,3,18]]},"DOI":"10.1145\/1167253.1167298","type":"proceedings-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T20:15:56Z","timestamp":1168978556000},"page":"193-194","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Early detection and propagation mitigation of worm programs"],"prefix":"10.1145","author":[{"given":"Xin","family":"Xu","sequence":"first","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]},{"given":"Weihua","family":"Song","sequence":"additional","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]},{"given":"Vir","family":"Phoha","sequence":"additional","affiliation":[{"name":"Louisiana Tech University, Ruston, LA"}]}],"member":"320","published-online":{"date-parts":[[2005,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"61","volume-title":"Proceedings of the 18th Annual Computer Security Applications Conference","author":"Williamson Matthew M.","year":"2002","unstructured":"Matthew M. Williamson , Throttling Viruses : Restricting propagation to defeat malicious mobile code , in Proceedings of the 18th Annual Computer Security Applications Conference , 2002 , Page 61 Matthew M. Williamson, Throttling Viruses: Restricting propagation to defeat malicious mobile code, in Proceedings of the 18th Annual Computer Security Applications Conference, 2002, Page 61"},{"key":"e_1_3_2_1_2_1","volume-title":"A tour of the worm. In processing of the Winter Usenix Conference","author":"Seeley D.","year":"1989","unstructured":"D. Seeley . A tour of the worm. In processing of the Winter Usenix Conference , San Diego, CA , 1989 D. Seeley. A tour of the worm. In processing of the Winter Usenix Conference, San Diego, CA, 1989"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63859"},{"key":"e_1_3_2_1_5_1","unstructured":"USA today news. The cost of Code Red: $1.2 billion. http:\/\/www.usatoday.com\/tech\/news\/2001-08-01-code-red-costs.htm last accessed January 31 2005.  USA today news. The cost of Code Red: $1.2 billion. http:\/\/www.usatoday.com\/tech\/news\/2001-08-01-code-red-costs.htm last accessed January 31 2005."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004)","author":"Wong Cynthia","year":"2004","unstructured":"Cynthia Wong , Chenxi Wang , Dawn Song , Stan Bielski , Gregory R. Ganger , Dynamic Quarantine of Internet Worms , in Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004) , Italy. June , 2004 Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger, Dynamic Quarantine of Internet Worms, in Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004), Italy. June, 2004"},{"key":"e_1_3_2_1_7_1","volume-title":"Ghare, Quality Control and Application","author":"Hansen Bertrand L.","year":"1987","unstructured":"Bertrand L. Hansen and Proabhakar M . Ghare, Quality Control and Application , Prentice-Hall 1987 . Bertrand L. Hansen and Proabhakar M. Ghare, Quality Control and Application, Prentice-Hall 1987."},{"key":"e_1_3_2_1_8_1","volume-title":"Possible Code Red Connection Attempts, available at: http:\/\/lists.jammed.com\/incidents\/2001\/07\/0158.html, last accessed","author":"Goldsmith Dave","year":"2005","unstructured":"Dave Goldsmith , Possible Code Red Connection Attempts, available at: http:\/\/lists.jammed.com\/incidents\/2001\/07\/0158.html, last accessed January 31, 2005 . Dave Goldsmith, Possible Code Red Connection Attempts, available at: http:\/\/lists.jammed.com\/incidents\/2001\/07\/0158.html, last accessed January 31, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.1007\/b97673","volume-title":"Design and Analysis of Experiments","author":"Dean Angela","year":"1999","unstructured":"Angela Dean and Daniel Voss , Design and Analysis of Experiments , Springer-Verlag , New York , 1999 . Angela Dean and Daniel Voss, Design and Analysis of Experiments, Springer-Verlag, New York, 1999."}],"event":{"name":"ACM SE05: ACM Southeast Regional Conference 2005","sponsor":["ACM Association for Computing Machinery"],"location":"Kennesaw Georgia","acronym":"ACM SE05"},"container-title":["Proceedings of the 43rd annual Southeast regional conference - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1167253.1167298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T19:55:38Z","timestamp":1673294138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1167253.1167298"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3,18]]},"references-count":8,"alternative-id":["10.1145\/1167253.1167298","10.1145\/1167253"],"URL":"https:\/\/doi.org\/10.1145\/1167253.1167298","relation":{},"subject":[],"published":{"date-parts":[[2005,3,18]]},"assertion":[{"value":"2005-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}