{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:19:11Z","timestamp":1694650751779},"reference-count":28,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1016\/j.cose.2007.11.001","type":"journal-article","created":{"date-parts":[[2007,12,5]],"date-time":"2007-12-05T19:16:23Z","timestamp":1196882183000},"page":"48-62","source":"Crossref","is-referenced-by-count":9,"title":["Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies"],"prefix":"10.1016","volume":"27","author":[{"given":"Francesco","family":"Palmieri","sequence":"first","affiliation":[]},{"given":"Ugo","family":"Fiore","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2007.11.001_bib26","author":"Bristow"},{"key":"10.1016\/j.cose.2007.11.001_bib4","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","article-title":"Computer viruses \u2013 theory and experiments","volume":"6","author":"Cohen","year":"1987","journal-title":"Computers and Security"},{"key":"10.1016\/j.cose.2007.11.001_bib10","unstructured":"Chen E, Rekhter Y. Cooperative route filtering capability for BGP-4. IETF draft-ietf-idr-route-filter-10.txt; March 2004."},{"key":"10.1016\/j.cose.2007.11.001_bib11","doi-asserted-by":"crossref","unstructured":"Chandra R, Scudder J. Capabilities advertisement with BGP-4. IETF RFC 2842; May 2000.","DOI":"10.17487\/rfc2842"},{"key":"10.1016\/j.cose.2007.11.001_bib12","doi-asserted-by":"crossref","unstructured":"Chen E. Route refresh capability for BGP-4. IETF RFC 2918; September 2000.","DOI":"10.17487\/rfc2918"},{"issue":"1","key":"10.1016\/j.cose.2007.11.001_bib16","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/5992.743621","article-title":"Modeling the global Internet","volume":"1","author":"Cowie","year":"1999","journal-title":"IEEE Computing in Science & Engineering"},{"key":"10.1016\/j.cose.2007.11.001_bib20","doi-asserted-by":"crossref","unstructured":"Chen Z, Gao L, Kwiat K. Modeling the spread of active worms. In: Proceedings of the IEEE INFOCOM 2003; March 2003.","DOI":"10.1109\/INFCOM.2003.1209211"},{"key":"10.1016\/j.cose.2007.11.001_bib28","series-title":"Proceedings of 40th Hawaii international conference on system sciences (HICSS-40)","article-title":"On the development of an internetwork-centric defense for scanning worms","author":"Coull","year":"2007"},{"key":"10.1016\/j.cose.2007.11.001_bib15","series-title":"Epidemic modeling: an introduction","author":"Daley","year":"1999"},{"key":"10.1016\/j.cose.2007.11.001_bib13","series-title":"Mathematical modeling in epidemiology","author":"Frauenthal","year":"1980"},{"key":"10.1016\/j.cose.2007.11.001_bib21","doi-asserted-by":"crossref","unstructured":"Jung J, Schechter SE, Berger AW. Fast detection of scanning worm infections. In: Proceedings of RAID'2004; September 2004.","DOI":"10.1007\/978-3-540-30143-1_4"},{"issue":"5","key":"10.1016\/j.cose.2007.11.001_bib17","doi-asserted-by":"crossref","DOI":"10.1109\/6.275061","article-title":"Computers and epidemiology","volume":"30","author":"Kephart","year":"1993","journal-title":"IEEE Spectrum"},{"key":"10.1016\/j.cose.2007.11.001_bib7","doi-asserted-by":"crossref","unstructured":"Moore D, Shannon C, Brown J. Code-Red: a case study on the spread and victims of an Internet Worm. In: Proceedings ACM\/USENIX Internet Measurement Workshop, France; November 2002.","DOI":"10.1145\/637241.637244"},{"issue":"4","key":"10.1016\/j.cose.2007.11.001_bib8","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","article-title":"Inside the slammer worm","volume":"1","author":"Moore","year":"2003","journal-title":"IEEE Security and Privacy Magazine"},{"key":"10.1016\/j.cose.2007.11.001_bib23","unstructured":"Moore D, Shannon C, Voelker GM, Savage S. Internet quarantine: requirements for containing selfpropagating code. In: Proceedings of the IEEE INFOCOM 2003, March 2003."},{"key":"10.1016\/j.cose.2007.11.001_bib25","author":"Moore"},{"key":"10.1016\/j.cose.2007.11.001_bib27","author":"Moore"},{"key":"10.1016\/j.cose.2007.11.001_bib1","unstructured":"Nachenberg C. The evolving virus threat. In: 23rd NISSC Proceedings, Baltimore, Maryland; 2000."},{"issue":"6","key":"10.1016\/j.cose.2007.11.001_bib5","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1145\/63526.63528","article-title":"With microscope and tweezers: the worm from MIT's perspective","volume":"32","author":"Rochlis","year":"1989","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.cose.2007.11.001_bib9","doi-asserted-by":"crossref","unstructured":"Rekhter Y, Li T. A border gateway protocol 4 (BGP-4). IETF RFC 1771; March 1995.","DOI":"10.17487\/rfc1771"},{"issue":"3","key":"10.1016\/j.cose.2007.11.001_bib3","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1145\/358453.358455","article-title":"The worm programs: early experience with a distributed computation","volume":"25","author":"Shoch","year":"1982","journal-title":"Communications of the ACM"},{"issue":"6","key":"10.1016\/j.cose.2007.11.001_bib6","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1145\/63526.63527","article-title":"The Internet worm: crisis and aftermath","volume":"32","author":"Spafford","year":"1989","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.cose.2007.11.001_bib18","author":"Staniford"},{"key":"10.1016\/j.cose.2007.11.001_bib2","doi-asserted-by":"crossref","unstructured":"Weaver N, Paxson V, Staniford S, Cunningham, R. A taxonomy of computer worms. In: ACM CCS workshop on rapid mal-code (WORM'03); Oct 27, 2003.","DOI":"10.1145\/948187.948190"},{"key":"10.1016\/j.cose.2007.11.001_bib22","unstructured":"Weaver N, Staniford S, Paxson V. Very fast containment of scanning worms. In: Proceedings of 13 USENIX Security Symposium (Security'04); October 2004."},{"key":"10.1016\/j.cose.2007.11.001_bib24","series-title":"Throttling viruses: restricting propagation to defeat malicious mobile code","author":"Williamson","year":"2002"},{"key":"10.1016\/j.cose.2007.11.001_bib14","series-title":"ACM conference on computer and communication security","article-title":"Code read worm propagation modeling and analysis","author":"Zou","year":"2002"},{"key":"10.1016\/j.cose.2007.11.001_bib19","doi-asserted-by":"crossref","unstructured":"Zou C, Gong W, Towsley D. Worm propagation modeling and analysis under dynamic quarantine defense. In: Proceedings of ACM WORM'2003; October 2003.","DOI":"10.1145\/948187.948197"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404807001241?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404807001241?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T04:57:41Z","timestamp":1588136261000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404807001241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":28,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["S0167404807001241"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2007.11.001","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2008,3]]}}}