{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:49:05Z","timestamp":1729651745199,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/srdsw.2014.26","type":"proceedings-article","created":{"date-parts":[[2015,1,7]],"date-time":"2015-01-07T13:26:34Z","timestamp":1420637194000},"page":"14-19","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating the Spread of a Virus in the Internet"],"prefix":"10.1109","author":[{"given":"Thanh Dang","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Francois","family":"Bonnet","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Defago","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.13"},{"key":"ref10","first-page":"15","article-title":"Average firefighting on infinite grids","volume":"41","author":"messinger","year":"2008","journal-title":"Australian Journal of Combinatorics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/280361a0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/280455a0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0025-5564(82)90036-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"key":"ref16","first-page":"2","article-title":"Measuring and modeling computer virus prevalence","year":"1993","journal-title":"Proceedings of the 14th IEEE Symposium on Security and Privacy (S&P'93)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.63.066117"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284681"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.41"},{"key":"ref4","first-page":"24","author":"zhou","year":"2005","journal-title":"Proceedings of the 4th International Conference on Peer-to-Peer Systems (IPTPS'05)"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/11663812_11","author":"kruegel","year":"2006","journal-title":"Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection (RAID'05)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.29"},{"key":"ref29","first-page":"32","article-title":"Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience","author":"li","year":"2006","journal-title":"Proc IEEE Security and Privacy Symposium (S&P'06)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.1001"},{"key":"ref8","article-title":"Firefighter! an application of domination, presentation","author":"hartnell","year":"1995","journal-title":"20th Conference on Numerical Mathematics and Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920264"},{"year":"2014","key":"ref2","article-title":"Ipv4 routed dataset"},{"article-title":"Catching the fire on grids","year":"2003","author":"fogarty","key":"ref9"},{"key":"ref1","first-page":"273","author":"moore","year":"2002","journal-title":"Internet Measurement Workshop 2002 (IMW"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925623"},{"key":"ref22","first-page":"149","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium (USENIX '02)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-011-0155-y"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"359","DOI":"10.3233\/JCS-2006-14403","article-title":"Effective worm detection for various scan techniques","volume":"14","author":"xia","year":"2006","journal-title":"Journal of Computer Security"},{"article-title":"Sality: Story of a peer-to-peer viral network","year":"2011","author":"falliere","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.100830"}],"event":{"name":"2014 IEEE 33rd International Symposium on Reliable Distributed Systems Workshops (SRDSW)","start":{"date-parts":[[2014,10,6]]},"location":"Nara, Japan","end":{"date-parts":[[2014,10,9]]}},"container-title":["2014 IEEE 33rd International Symposium on Reliable Distributed Systems Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979353\/7000117\/07000129.pdf?arnumber=7000129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T07:05:50Z","timestamp":1566198350000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7000129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/srdsw.2014.26","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}