{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:10:10Z","timestamp":1750291810928,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1460877.1460893","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["On capturing malware dynamics in mobile power-law networks"],"prefix":"10.1145","author":[{"given":"Abhijit","family":"Bose","sequence":"first","affiliation":[{"name":"IBM T J Watson Research, Hawthorne, NY"}]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"The University of Michigan, Ann Arbor, MI"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1095845"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-3513-x"},{"key":"e_1_3_2_1_4_1","first-page":"7280","volume-title":"PNAS","volume":"99","author":"Bonabeau E.","year":"2002","unstructured":"E. Bonabeau . Agent-based modeling : Methods and techniques for simulating human systems . In PNAS , volume 99 , pages 7280 -- 7287 , 2002 . E. Bonabeau. Agent-based modeling: Methods and techniques for simulating human systems. In PNAS, volume 99, pages 7280--7287, 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948200"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.72"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.035103"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948196"},{"key":"e_1_3_2_1_9_1","unstructured":"FSecure. F-secure virus descriptions: Cardtrap.a. http:\/\/www.f-secure.com\/v-descs\/cardtrap_a.shtml December 2004.  FSecure. F-secure virus descriptions: Cardtrap.a. http:\/\/www.f-secure.com\/v-descs\/cardtrap_a.shtml December 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.036123"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.752157"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948193"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103629"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2004.7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080806"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"D. Moore V. Paxson S. Savage C. Shannon S. Staniford and N. Weaver. Inside the slammer worm. http:\/\/www.computer.org\/security\/v1n4\/j4wea.htm 2003.  D. Moore V. Paxson S. Savage C. Shannon S. Staniford and N. Weaver. Inside the slammer worm. http:\/\/www.computer.org\/security\/v1n4\/j4wea.htm 2003.","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"e_1_3_2_1_19_1","first-page":"319","volume-title":"Proceedings of the 15th International Conference on Modeling and Simulation","author":"Navidi W.","year":"2004","unstructured":"W. Navidi , T. Camp , and N. Bauer . Improving the accuracy of random waypoint simulations through steady-state initialization . In Proceedings of the 15th International Conference on Modeling and Simulation , pages 319 --- 326 , March 2004 . W. Navidi, T. Camp, and N. Bauer. Improving the accuracy of random waypoint simulations through steady-state initialization. In Proceedings of the 15th International Conference on Modeling and Simulation, pages 319---326, March 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_3_2_1_21_1","volume-title":"Handbook of Graphs and Networks","author":"Pastor-Satorras R.","year":"2003","unstructured":"R. Pastor-Satorras and A. Vespignani . Epidemics and immunization in scale-free networks . In Handbook of Graphs and Networks , Wiley-VCH , Berlin , 2003 . R. Pastor-Satorras and A. Vespignani. Epidemics and immunization in scale-free networks. In Handbook of Graphs and Networks, Wiley-VCH, Berlin, 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.21"},{"key":"e_1_3_2_1_23_1","volume-title":"The Ghost In The Browser: Analysis of Web-based Malware. Workshop on Hot Topics in Understanding Botnets (HotBots), April, 10","author":"Provos N.","year":"2007","unstructured":"N. Provos , D. McNamee , P. Mavrommatis , K. Wang , and N. Modadugu . The Ghost In The Browser: Analysis of Web-based Malware. Workshop on Hot Topics in Understanding Botnets (HotBots), April, 10 , 2007 . N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The Ghost In The Browser: Analysis of Web-based Malware. Workshop on Hot Topics in Understanding Botnets (HotBots), April, 10, 2007."},{"key":"e_1_3_2_1_24_1","volume-title":"A study of mobile messaging services. UCLA Master's Thesis","author":"Samanta V.","year":"2005","unstructured":"V. Samanta . A study of mobile messaging services. UCLA Master's Thesis , 2005 . V. Samanta. A study of mobile messaging services. UCLA Master's Thesis, 2005."},{"key":"e_1_3_2_1_25_1","volume-title":"In Proceedings of Multimedia Computing and Networking","author":"Saroiu S.","year":"2002","unstructured":"S. Saroiu , P. K. Gummadi , and S. D. Gribble . A measurement study of peer-to-peer file sharing systems . In In Proceedings of Multimedia Computing and Networking , 2002 . S. Saroiu, P. K. Gummadi, and S. D. Gribble. A measurement study of peer-to-peer file sharing systems. In In Proceedings of Multimedia Computing and Networking, 2002."},{"key":"e_1_3_2_1_26_1","volume-title":"First Workshop on Semantics in P2P and Grid Computing","author":"Schlosser M. T.","year":"2002","unstructured":"M. T. Schlosser , T. E. Condie , and S. D. Kamvar . Simulating a file-sharing p2p network . In First Workshop on Semantics in P2P and Grid Computing , 2002 . M. T. Schlosser, T. E. Condie, and S. D. Kamvar. Simulating a file-sharing p2p network. In First Workshop on Semantics in P2P and Grid Computing, 2002."},{"volume-title":"September","year":"2001","key":"e_1_3_2_1_27_1","unstructured":"Symantec. W32.nimda.a@mm virus description. http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.nimda.a@mm.html , September 2001 . Symantec. W32.nimda.a@mm virus description. http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.nimda.a@mm.html, September 2001."},{"volume-title":"http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.hllw.fizzer@mm.html","year":"2003","key":"e_1_3_2_1_28_1","unstructured":"Symantec. W32.hllw.fizzer@mm worm. http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.hllw.fizzer@mm.html , 2003 . Symantec. W32.hllw.fizzer@mm worm. http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.hllw.fizzer@mm.html, 2003."},{"volume-title":"April","year":"2005","key":"e_1_3_2_1_29_1","unstructured":"Symantec. Symbos.mabir worm description. http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/symbos.mabir.html , April 2005 . Symantec. Symbos.mabir worm description. http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/symbos.mabir.html, April 2005."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948194"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2005.7"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_3"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2004.1401687"}],"event":{"name":"Securecomm08: Fourth International Conference On Security on Privacy for communication Networks","sponsor":["Create-Net","INRIA Institut Natl de Recherche en Info et en Automatique","SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Istanbul Turkey","acronym":"Securecomm08"},"container-title":["Proceedings of the 4th international conference on Security and privacy in communication netowrks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460893","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460877.1460893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:49Z","timestamp":1750290229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460877.1460893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":33,"alternative-id":["10.1145\/1460877.1460893","10.1145\/1460877"],"URL":"https:\/\/doi.org\/10.1145\/1460877.1460893","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}