{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:53Z","timestamp":1750307513180,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T00:00:00Z","timestamp":1222041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,22]]},"DOI":"10.1145\/1595676.1595692","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T14:08:35Z","timestamp":1251122915000},"page":"99-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["The ecology of Malware"],"prefix":"10.1145","author":[{"given":"Jedidiah R.","family":"Crandall","sequence":"first","affiliation":[{"name":"University of New Mexico, Albuquerque, NM"}]},{"given":"Roya","family":"Ensafi","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, NM"}]},{"given":"Stephanie","family":"Forrest","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, NM"}]},{"given":"Joshua","family":"Ladau","sequence":"additional","affiliation":[{"name":"Santa Fe Institute, Santa Fe, New Mexico"}]},{"given":"Bilal","family":"Shebaro","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, NM"}]}],"member":"320","published-online":{"date-parts":[[2008,9,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00317508"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1095845"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_4_1","volume-title":"Virus Bulletin","author":"Baumgartner K.","year":"2007","unstructured":"K. Baumgartner . Storm 2007 : Malware 2.0 has arrived . Virus Bulletin , 2007. K. Baumgartner. Storm 2007: Malware 2.0 has arrived. Virus Bulletin, 2007."},{"key":"e_1_3_2_1_5_1","volume-title":"12th USENIX Security Symposium","author":"Bhatkar S.","year":"2003","unstructured":"S. Bhatkar , D.C. DuVarney , and R. Sekar . Address obfuscation: an efficient approach to combat a broad range of memory error exploits . In 12th USENIX Security Symposium , Washington, DC , August 2003 . S. Bhatkar, D.C. DuVarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In 12th USENIX Security Symposium, Washington, DC, August 2003."},{"issue":"2","key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"445","DOI":"10.2307\/1935620","volume":"58","author":"Brown J.H.","year":"1977","unstructured":"J.H. Brown and A. Kodric-Brown . Turnover Rates in Insular Biogeography: Effect of Immigration on Extinction. Ecology , 58 ( 2 ): 445 -- 449 , 1977 . J.H. Brown and A. Kodric-Brown. Turnover Rates in Insular Biogeography: Effect of Immigration on Extinction. Ecology, 58(2):445--449, 1977.","journal-title":"Ecology"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029631"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/1936961"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1086\/283438"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168862"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1187976.1187977"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008)","author":"Dagon D.","year":"2008","unstructured":"D. Dagon , N. Provos , C.P. Lee , and W. Lee . Corrupted DNS resolution paths: The rise of a malicious resolution authority . In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008) , Feb. 2008 . D. Dagon, N. Provos, C.P. Lee, and W. Lee. Corrupted DNS resolution paths: The rise of a malicious resolution authority. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), Feb. 2008."},{"key":"e_1_3_2_1_13_1","volume-title":"Malware: future trends (white paper)","author":"Danchev D.","year":"2006","unstructured":"D. Danchev . Malware: future trends (white paper) , 2006 . D. Danchev. Malware: future trends (white paper), 2006."},{"key":"e_1_3_2_1_14_1","volume-title":"Mindstreams of information security knowledge (http:\/\/ddanchev.blogspot.com\/)","author":"Danchev D.","year":"2008","unstructured":"D. Danchev . Mindstreams of information security knowledge (http:\/\/ddanchev.blogspot.com\/) , 2008 . D. Danchev. Mindstreams of information security knowledge (http:\/\/ddanchev.blogspot.com\/), 2008."},{"issue":"3","key":"e_1_3_2_1_15_1","first-page":"345","article-title":"Species assemblages and indicator species: The need for a flexible asymmetrical approach","volume":"67","author":"Dufrene M.","year":"1997","unstructured":"M. Dufrene and P. Legendre . Species assemblages and indicator species: The need for a flexible asymmetrical approach . Ecological Monographs , 67 ( 3 ): 345 -- 366 , 1997 . M. Dufrene and P. Legendre. Species assemblages and indicator species: The need for a flexible asymmetrical approach. Ecological Monographs, 67(3):345--366, 1997.","journal-title":"Ecological Monographs"},{"key":"e_1_3_2_1_16_1","volume-title":"Feynman Lectures on Computation","author":"Feynman R.P.","year":"2000","unstructured":"R.P. Feynman . Feynman Lectures on Computation . Perseus Books , Cambridge, MA, USA , 2000 . R.P. Feynman. Feynman Lectures on Computation. Perseus Books, Cambridge, MA, USA, 2000."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02067551"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00349014"},{"key":"e_1_3_2_1_20_1","unstructured":"John Canavan. Me code write good: The l33t skillz of the virus writer (Symantec White Paper).  John Canavan. Me code write good: The l33t skillz of the virus writer (Symantec White Paper)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_22_1","volume-title":"IJCAI '95. International Joint Conference on Artificial Intelligence","author":"Kephart J.O.","year":"1995","unstructured":"J.O. Kephart , G.B. Sorkin , W.C. Arnold , D.M. Chess , G.J. Tesauro , and S.R. White . Biologically inspired defenses against computer viruses . In IJCAI '95. International Joint Conference on Artificial Intelligence , 1995 . J.O. Kephart, G.B. Sorkin, W.C. Arnold, D.M. Chess, G.J. Tesauro, and S.R. White. Biologically inspired defenses against computer viruses. In IJCAI '95. International Joint Conference on Artificial Intelligence, 1995."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/6.275061"},{"key":"e_1_3_2_1_24_1","volume-title":"IMC '05: Proceedings of the 5th ACM SIGCOMM conference on Internet measurement","author":"Kumar A.","year":"2006","unstructured":"A. Kumar , V. Paxson , and N. Weaver . Exploiting underlying structure for detailed reconstruction of an internet-scale event . In IMC '05: Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , New York, NY, USA , 2006 . ACM Press. A. Kumar, V. Paxson, and N. Weaver. Exploiting underlying structure for detailed reconstruction of an internet-scale event. In IMC '05: Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, New York, NY, USA, 2006. ACM Press."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00285-008-0176-0"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00285-008-0176-0"},{"key":"e_1_3_2_1_27_1","series-title":"Monographs in Population Biology","volume-title":"The Theory of Island Biogeography","author":"MacArthur R.H.","year":"1967","unstructured":"R.H. MacArthur and E.O. Wilson . The Theory of Island Biogeography , volume 1 of Monographs in Population Biology . Princeton Press , 1967 . R.H. MacArthur and E.O. Wilson. The Theory of Island Biogeography, volume 1 of Monographs in Population Biology. Princeton Press, 1967."},{"issue":"035101","key":"e_1_3_2_1_28_1","article-title":"Email networks and the spread of computer viruses","volume":"66","author":"Newman M.","year":"2002","unstructured":"M. Newman , S. Forrest , and J. Balthrop . Email networks and the spread of computer viruses . Physical Review E , 66 ( 035101 ), 2002 . M. Newman, S. Forrest, and J. Balthrop. Email networks and the spread of computer viruses. Physical Review E, 66(035101), 2002.","journal-title":"Physical Review E"},{"key":"e_1_3_2_1_29_1","volume-title":"546 p","author":"E.P. Odum. Fundamentals of ecology. W.B. Saunders Co.","year":"1959","unstructured":"E.P. Odum. Fundamentals of ecology. W.B. Saunders Co. , Philadelphia and London . 546 p ., 1959 . E.P. Odum. Fundamentals of ecology. W.B. Saunders Co., Philadelphia and London. 546 p., 1959."},{"key":"e_1_3_2_1_30_1","volume-title":"Biodiversity Dynamics","author":"Rosenzweig M.","year":"1998","unstructured":"M. Rosenzweig . Preston's ergodic conjecture : the accumulation of species in space and time . Biodiversity Dynamics , July 1998 . M. Rosenzweig. Preston's ergodic conjecture: the accumulation of species in space and time. Biodiversity Dynamics, July 1998."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600185"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315312"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00317345"},{"key":"e_1_3_2_1_34_1","volume-title":"The Art of Computer Virus Research and Defense","author":"Szor P.","year":"2005","unstructured":"P. Szor . The Art of Computer Virus Research and Defense . Symantec Press , 2005 . P. Szor. The Art of Computer Virus Research and Defense. Symantec Press, 2005."},{"key":"e_1_3_2_1_35_1","volume-title":"Animal Ecology","author":"Volterra V.","year":"1931","unstructured":"V. Volterra . Variations and fluctuations of the number of individuals in animal species living together . Animal Ecology , August 1931 . V. Volterra. Variations and fluctuations of the number of individuals in animal species living together. Animal Ecology, August 1931."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299017"},{"key":"e_1_3_2_1_37_1","volume-title":"An introduction to general systems thinking (silver anniversary ed.)","author":"Weinberg G.M.","year":"2001","unstructured":"G.M. Weinberg . An introduction to general systems thinking (silver anniversary ed.) . Dorset House Publishing Co., Inc. , New York, NY, USA , 2001 . G.M. Weinberg. An introduction to general systems thinking (silver anniversary ed.). Dorset House Publishing Co., Inc., New York, NY, USA, 2001."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.276.5309.122"}],"event":{"name":"NSPW '08: 2008 New Security Paradigms Workshop","sponsor":["ACM Association for Computing Machinery"],"location":"Lake Tahoe California USA","acronym":"NSPW '08"},"container-title":["Proceedings of the 2008 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595676.1595692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1595676.1595692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:04Z","timestamp":1750249084000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1595676.1595692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,22]]},"references-count":37,"alternative-id":["10.1145\/1595676.1595692","10.1145\/1595676"],"URL":"https:\/\/doi.org\/10.1145\/1595676.1595692","relation":{},"subject":[],"published":{"date-parts":[[2008,9,22]]},"assertion":[{"value":"2008-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}