{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:07Z","timestamp":1750307527137,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2009,10]]},"abstract":"<jats:p>An insider's view of the analysis and implications of the Conficker conundrum.<\/jats:p>","DOI":"10.1145\/1562764.1562777","type":"journal-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T18:18:59Z","timestamp":1254853139000},"page":"23-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Inside risksReflections on Conficker"],"prefix":"10.1145","volume":"52","author":[{"given":"Phillip","family":"Porras","sequence":"first","affiliation":[{"name":"SRI International"}]}],"member":"320","published-online":{"date-parts":[[2009,10]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Conficker Working Group Web site (June 2009); http:\/\/www.confickerworkinggroup.org  Conficker Working Group Web site (June 2009); http:\/\/www.confickerworkinggroup.org"},{"key":"e_1_2_1_2_1","volume-title":"New Scientist Journal (June 12, 2009","author":"Giles J.","year":"2022","unstructured":"Giles , J. The inside story of the Conficker worm . New Scientist Journal (June 12, 2009 ); http:\/\/www.newscientist.com\/article\/mg 2022 7121.500-the-inside-story-of-the-conficker-worm.html?full=true Giles, J. The inside story of the Conficker worm. New Scientist Journal (June 12, 2009); http:\/\/www.newscientist.com\/article\/mg20227121.500-the-inside-story-of-the-conficker-worm.html?full=true"},{"key":"e_1_2_1_3_1","volume-title":"The Washington Post (Mar. 16, 2009","author":"Krebs B.","year":"2009","unstructured":"Krebs , B. Massive profits fueling rogue antivirus market . The Washington Post (Mar. 16, 2009 ); http:\/\/voices.washingtonpost.com\/securityfix\/ 2009 \/03\/obscene_profits_fuel_rogue_ant.html Krebs, B. Massive profits fueling rogue antivirus market. The Washington Post (Mar. 16, 2009); http:\/\/voices.washingtonpost.com\/securityfix\/2009\/03\/obscene_profits_fuel_rogue_ant.html"},{"key":"e_1_2_1_4_1","volume-title":"Security Focus (Feb. 13","author":"Lemos R.","year":"2009","unstructured":"Lemos , R. Cabal forms to fight Conficker, offers bounty . Security Focus (Feb. 13 , 2009 ); http:\/\/www.securityfocus.com\/news\/11546 Lemos, R. Cabal forms to fight Conficker, offers bounty. Security Focus (Feb. 13, 2009); http:\/\/www.securityfocus.com\/news\/11546"},{"key":"e_1_2_1_5_1","volume-title":"Bits: The New York Times (Mar. 19, 2009","author":"Markoff J.","year":"2009","unstructured":"Markoff , J. The Conficker worm: April Fool's joke or unthinkable disaster ? Bits: The New York Times (Mar. 19, 2009 ); http:\/\/bits.blogs.nytimes.com\/ 2009 \/03\/19\/the-conficker-worm-april-fools-joke-or-unthinkable-disaster\/ Markoff, J. The Conficker worm: April Fool's joke or unthinkable disaster? Bits: The New York Times (Mar. 19, 2009); http:\/\/bits.blogs.nytimes.com\/2009\/03\/19\/the-conficker-worm-april-fools-joke-or-unthinkable-disaster\/"},{"key":"e_1_2_1_7_1","volume-title":"Conficker seizes city's hospital network. The Register (U.K.) (Jan. 20,2009)","author":"Williams C.","year":"2009","unstructured":"Williams , C. Conficker seizes city's hospital network. The Register (U.K.) (Jan. 20,2009) ; http:\/\/www.theregister.co.uk\/ 2009 \/01\/20\/sheffield_conficker\/ Williams, C. Conficker seizes city's hospital network. The Register (U.K.) (Jan. 20,2009); http:\/\/www.theregister.co.uk\/2009\/01\/20\/sheffield_conficker\/"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1562764.1562777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1562764.1562777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:05Z","timestamp":1750249385000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1562764.1562777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":6,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["10.1145\/1562764.1562777"],"URL":"https:\/\/doi.org\/10.1145\/1562764.1562777","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2009,10]]},"assertion":[{"value":"2009-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}