{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:26:25Z","timestamp":1740201985765,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"abstract":"<jats:p>One of the most widely used peer-to-peer file sharing protocols is BitTorrent. In this article we focus on the possible use of bittorrent protocol and applications that make use it, as platform for the spread of new computer-worms.<\/jats:p>","DOI":"10.3233\/978-1-58603-900-4-108","type":"book-chapter","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:21:00Z","timestamp":1740133260000},"source":"Crossref","is-referenced-by-count":0,"title":["Torrent worms"],"prefix":"10.3233","author":[{"family":"Patsakis Constantinos","sequence":"additional","affiliation":[]},{"family":"Alexandris Nikolaos","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Knowledge-Based Software Engineering"],"original-title":[],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:29:56Z","timestamp":1740133796000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=0922-6389&volume=180&spage=108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-58603-900-4-108","relation":{},"ISSN":["0922-6389"],"issn-type":[{"value":"0922-6389","type":"print"}],"subject":[],"published":{"date-parts":[[2008]]}}}