{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:16Z","timestamp":1750307896363,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,23]],"date-time":"2007-03-23T00:00:00Z","timestamp":1174608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,23]]},"DOI":"10.1145\/1233341.1233410","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"379-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling malcode with Hephaestus"],"prefix":"10.1145","author":[{"given":"Attila","family":"Ondi","sequence":"first","affiliation":[{"name":"Florida Institute of Technology, Melbourne, FL"}]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[{"name":"Florida Institution of Technology, Melbourne, FL"}]}],"member":"320","published-online":{"date-parts":[[2007,3,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1249\/01.MSS.0000065004.05033.42"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/977400.977961"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"key":"e_1_3_2_1_5_1","volume-title":"Caida analysis of code-red","author":"Moore D.","year":"2001","unstructured":"D. Moore and C. Shannon . Caida analysis of code-red , 2001 . http:\/\/www.caida.org\/analysis\/security\/code-red\/. D. Moore and C. Shannon. Caida analysis of code-red, 2001. http:\/\/www.caida.org\/analysis\/security\/code-red\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185609"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032659.1034211"},{"key":"e_1_3_2_1_9_1","volume-title":"Modeling the spread and prevention of malicious mobile code via simulation. Master's thesis","author":"Shirey C. B.","year":"2004","unstructured":"C. B. Shirey . Modeling the spread and prevention of malicious mobile code via simulation. Master's thesis , Florida Institute of Technology , 2004 . C. B. Shirey. Modeling the spread and prevention of malicious mobile code via simulation. Master's thesis, Florida Institute of Technology, 2004."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI)","author":"Singh S.","year":"2004","unstructured":"S. Singh , C. Estan , G. Varghese , and S. Savage . Automated worm fingerprinting . In Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI) , December 2004 . S. Singh, C. Estan, G. Varghese, and S. Savage. Automated worm fingerprinting. In Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI), December 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720288"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633040"},{"key":"e_1_3_2_1_14_1","volume-title":"Security Focus","author":"Vogt T.","year":"2003","unstructured":"T. Vogt . Simulating and optimising worm propagation algorithms. Technical report , Security Focus , 2003 . T. Vogt. Simulating and optimising worm propagation algorithms. Technical report, Security Focus, 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2005 Symposium on Modelling and Simulation of Malware","author":"Wei S.","year":"2005","unstructured":"S. Wei , J. Mirkovic , and M. Swany . Distributed worm simulation with a realistic internet model . In Proceedings of the 2005 Symposium on Modelling and Simulation of Malware , 2005 . S. Wei, J. Mirkovic, and M. Swany. Distributed worm simulation with a realistic internet model. In Proceedings of the 2005 Symposium on Modelling and Simulation of Malware, 2005."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Virus Bulletin Conference","author":"Williamson M. M.","year":"2003","unstructured":"M. M. Williamson and J. L\u00e9vill\u00e9 . An epidemiological model of virus spread and cleanup . In Proceedings of the Virus Bulletin Conference , 2003 . M. M. Williamson and J. L\u00e9vill\u00e9. An epidemiological model of virus spread and cleanup. In Proceedings of the Virus Bulletin Conference, 2003."}],"event":{"name":"ACM SE07: ACM Southeast Regional Conference","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Winston-Salem North Carolina","acronym":"ACM SE07"},"container-title":["Proceedings of the 45th annual southeast regional conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1233341.1233410","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1233341.1233410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:26Z","timestamp":1750258046000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1233341.1233410"}},"subtitle":["beyond simple spread"],"short-title":[],"issued":{"date-parts":[[2007,3,23]]},"references-count":16,"alternative-id":["10.1145\/1233341.1233410","10.1145\/1233341"],"URL":"https:\/\/doi.org\/10.1145\/1233341.1233410","relation":{},"subject":[],"published":{"date-parts":[[2007,3,23]]},"assertion":[{"value":"2007-03-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}