{"id":"https://openalex.org/W1988010134","doi":"https://doi.org/10.1145/1103626.1103629","title":"On instant messaging worms, analysis and countermeasures","display_name":"On instant messaging worms, analysis and countermeasures","publication_year":2005,"publication_date":"2005-11-11","ids":{"openalex":"https://openalex.org/W1988010134","doi":"https://doi.org/10.1145/1103626.1103629","mag":"1988010134"},"language":"en","primary_location":{"id":"doi:10.1145/1103626.1103629","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1103626.1103629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM workshop on Rapid malcode","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055898168","display_name":"Mohammad Mannan","orcid":"https://orcid.org/0000-0002-9630-5858"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mohammad Mannan","raw_affiliation_strings":["Carleton University, Ottawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, Ontario, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Paul C. van Oorschot","raw_affiliation_strings":["Carleton University, Ottawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, Ontario, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055898168"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":9.0793,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.98297003,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/instant-messaging","display_name":"Instant messaging","score":0.8514696359634399},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7417147159576416},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7241553068161011},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5382677316665649},{"id":"https://openalex.org/keywords/instant","display_name":"Instant","score":0.5303975343704224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44986724853515625},{"id":"https://openalex.org/keywords/minor","display_name":"Minor (academic)","score":0.4328072667121887},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38577502965927124},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2191910743713379}],"concepts":[{"id":"https://openalex.org/C2985487447","wikidata":"https://www.wikidata.org/wiki/Q58199","display_name":"Instant messaging","level":2,"score":0.8514696359634399},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7417147159576416},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7241553068161011},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5382677316665649},{"id":"https://openalex.org/C2779432360","wikidata":"https://www.wikidata.org/wiki/Q16963779","display_name":"Instant","level":2,"score":0.5303975343704224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44986724853515625},{"id":"https://openalex.org/C2779760435","wikidata":"https://www.wikidata.org/wiki/Q5396169","display_name":"Minor (academic)","level":2,"score":0.4328072667121887},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38577502965927124},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2191910743713379},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1103626.1103629","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1103626.1103629","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM workshop on Rapid malcode","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.59.9450","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9450","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.scs.carleton.ca/~paulv/papers/imworms.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320994","display_name":"Canada Research Chairs","ror":"https://ror.org/0517h6h17"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W18660370","https://openalex.org/W139772808","https://openalex.org/W1498585374","https://openalex.org/W1656469710","https://openalex.org/W1664986634","https://openalex.org/W1781758015","https://openalex.org/W1796231995","https://openalex.org/W1885428543","https://openalex.org/W2006071261","https://openalex.org/W2008620264","https://openalex.org/W2018934112","https://openalex.org/W2021590691","https://openalex.org/W2038195874","https://openalex.org/W2042728064","https://openalex.org/W2066968143","https://openalex.org/W2099256741","https://openalex.org/W2110035450","https://openalex.org/W2125927592","https://openalex.org/W2126193037","https://openalex.org/W2138451304","https://openalex.org/W2159919478","https://openalex.org/W2263617848","https://openalex.org/W2482917947","https://openalex.org/W2769133055","https://openalex.org/W2914982603","https://openalex.org/W2934726063","https://openalex.org/W4254475551","https://openalex.org/W4256295440","https://openalex.org/W6600760810","https://openalex.org/W6638056121"],"related_works":["https://openalex.org/W2799193527","https://openalex.org/W4249679496","https://openalex.org/W27875163","https://openalex.org/W4238418407","https://openalex.org/W2361008199","https://openalex.org/W2018813611","https://openalex.org/W2367021266","https://openalex.org/W2165646497","https://openalex.org/W1977341556","https://openalex.org/W2388757879"],"abstract_inverted_index":{"We":[0,25,87,100],"provide":[1,102],"a":[2,36,48,106,109,123],"collection":[3],"of":[4,10,39,50,53,70,78,105,114,138],"minor":[5,80],"results":[6,104],"on":[7],"the":[8,22,40,76,129,146],"area":[9],"Instant":[11],"Messaging":[12],"(IM)":[13],"worms,":[14],"which":[15,136],"has":[16],"received":[17],"relatively":[18],"little":[19],"attention":[20],"in":[21,55,68,122,144],"formal":[23],"literature.":[24],"review":[26],"selected":[27],"IM":[28,44,63,84,115,126],"worms":[29,54],"and":[30,47,72,94,108,118],"summarize":[31],"their":[32],"main":[33],"characteristics,":[34],"motivating":[35],"brief":[37,103],"overview":[38],"network":[41,127],"formed":[42],"by":[43],"contact":[45],"lists,":[46],"discussion":[49],"theoretical":[51],"consequences":[52],"such":[56,131],"networks.":[57],"Existing":[58],"methods":[59],"to":[60,75,82,133],"restrict":[61],"an":[62],"worm":[64,85],"epidemic":[65],"are":[66,91],"analyzed":[67],"terms":[69],"usability":[71],"effectiveness,":[73],"leading":[74],"suggestion":[77],"two":[79],"variations":[81,90],"limit":[83],"propagation.":[86],"believe":[88],"these":[89],"more":[92],"user-friendly":[93],"effective":[95],"than":[96],"existing":[97],"published":[98],"methods.":[99],"also":[101,142],"three":[107],"half":[110],"year":[111],"user":[112],"study":[113,132],"text":[116],"messaging":[117],"file":[119],"transfer":[120],"frequency":[121],"moderate-size":[124],"public":[125],"--":[128,135],"largest":[130],"date":[134],"is":[137],"independent":[139],"interest,":[140],"but":[141],"supports":[143],"part":[145],"preceding":[147],"claim":[148],"regarding":[149],"user-friendliness.":[150]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
