{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:51:56Z","timestamp":1747806716006,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dsn.2005.66","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T17:52:28Z","timestamp":1122486748000},"page":"528-537","source":"Crossref","is-referenced-by-count":26,"title":["Modeling and Automated Containment of Worms"],"prefix":"10.1109","author":[{"given":"S.","family":"Sellke","sequence":"first","affiliation":[]},{"given":"N.B.","family":"Shroff","sequence":"additional","affiliation":[]},{"given":"S.","family":"Bagchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176279"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311878"},{"key":"15","first-page":"149","article-title":"How to own the Internet in your spare time","author":"staniford","year":"2002","journal-title":"Proc 11th USENIX Security Symposium (SEC 02)"},{"key":"16","article-title":"Containment of scanning worms in enterprise networks","author":"staniford","year":"0","journal-title":"Journal of Computer Security"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"14","article-title":"Stochastic processes, 2nd edition","author":"ross","year":"1996","journal-title":"John Wiley & Sons Inc"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948197"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/948134.948136"},{"journal-title":"2001 Economic Impact of Malicious Code Attacks","year":"0","key":"22"},{"key":"23","article-title":"Using sensor networks and data fusion for early detection of active worms","author":"berk","year":"2003","journal-title":"Proceedings of AeroSense 2003 SPIE's 17th Annual International Symposium on Aerospace\/Defense Sensing Simulation and Controls"},{"journal-title":"Thirty Days' Wide-area TCP Connections","year":"0","key":"24"},{"key":"25","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1137\/S0036144500371907","article-title":"The mathematics of infectious diseases","volume":"42","author":"hethcote","year":"2000","journal-title":"SIAM Review"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"journal-title":"The Cost of Code Red $1 2 Billion","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948193"},{"journal-title":"CAIDA Analysis of Code-Red","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"key":"6","article-title":"A first course in stochastic processes, second edition","author":"karlin","year":"1975","journal-title":"Academic Press"},{"key":"5","article-title":"Epidemic modelling, An introduction","author":"daley","year":"1999","journal-title":"Cambridge University Press"},{"key":"4","article-title":"Generalized poisson distributions, properties and applications","volume":"99","author":"consul","year":"0","journal-title":"STATISTICS Textboods and Monographs"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287647"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/6.275061"}],"event":{"name":"2005 International Conference on Dependable Systems and Networks (DSN'05)","location":"Yokohama, Japan"},"container-title":["2005 International Conference on Dependable Systems and Networks (DSN'05)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9904\/31476\/01467827.pdf?arnumber=1467827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T21:35:53Z","timestamp":1497648953000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1467827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dsn.2005.66","relation":{},"subject":[]}}