{"id":"https://openalex.org/W2139610926","doi":"https://doi.org/10.1145/1103626.1103637","title":"Worm evolution tracking via timing analysis","display_name":"Worm evolution tracking via timing analysis","publication_year":2005,"publication_date":"2005-11-11","ids":{"openalex":"https://openalex.org/W2139610926","doi":"https://doi.org/10.1145/1103626.1103637","mag":"2139610926"},"language":"en","primary_location":{"id":"doi:10.1145/1103626.1103637","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1103626.1103637","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM workshop on Rapid malcode","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011746325","display_name":"Moheeb Abu Rajab","orcid":null},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Moheeb Abu Rajab","raw_affiliation_strings":["Johns Hopkins University","Johns Hopkins University ("],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]},{"raw_affiliation_string":"Johns Hopkins University (","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069862528","display_name":"Fabian Monrose","orcid":"https://orcid.org/0000-0002-9805-2217"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fabian Monrose","raw_affiliation_strings":["Johns Hopkins University","Johns Hopkins University ("],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]},{"raw_affiliation_string":"Johns Hopkins University (","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103331911","display_name":"Andreas Terzis","orcid":"https://orcid.org/0000-0002-5681-3399"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andreas Terzis","raw_affiliation_strings":["Johns Hopkins University","Johns Hopkins University ("],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University","institution_ids":["https://openalex.org/I145311948"]},{"raw_affiliation_string":"Johns Hopkins University (","institution_ids":["https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011746325"],"corresponding_institution_ids":["https://openalex.org/I145311948"],"apc_list":null,"apc_paid":null,"fwci":2.7358,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.91753174,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"52","last_page":"59"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10482","display_name":"Mathematical and Theoretical Epidemiology and Ecology Models","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7515231370925903},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.5946599841117859},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.5700223445892334},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5105836987495422},{"id":"https://openalex.org/keywords/population-size","display_name":"Population size","score":0.4948417544364929},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.45951950550079346},{"id":"https://openalex.org/keywords/infection-rate","display_name":"Infection rate","score":0.44700998067855835},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.43214625120162964},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4095655381679535},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39582160115242004},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37768030166625977},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36760520935058594},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.131953626871109},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.12131103873252869},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11552399396896362}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7515231370925903},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.5946599841117859},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.5700223445892334},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5105836987495422},{"id":"https://openalex.org/C169733012","wikidata":"https://www.wikidata.org/wiki/Q1613416","display_name":"Population size","level":3,"score":0.4948417544364929},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.45951950550079346},{"id":"https://openalex.org/C2781254715","wikidata":"https://www.wikidata.org/wiki/Q28454687","display_name":"Infection rate","level":2,"score":0.44700998067855835},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.43214625120162964},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4095655381679535},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39582160115242004},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37768030166625977},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36760520935058594},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.131953626871109},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.12131103873252869},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11552399396896362},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C141071460","wikidata":"https://www.wikidata.org/wiki/Q40821","display_name":"Surgery","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1103626.1103637","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1103626.1103637","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM workshop on Rapid malcode","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.60.6242","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.6242","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www1.cs.columbia.edu/~angelos/worm05/moheeb-paper.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W71235019","https://openalex.org/W1498585374","https://openalex.org/W1546137167","https://openalex.org/W1563061804","https://openalex.org/W1781758015","https://openalex.org/W1980065740","https://openalex.org/W1989121667","https://openalex.org/W2023955403","https://openalex.org/W2031006315","https://openalex.org/W2039390926","https://openalex.org/W2083477206","https://openalex.org/W2103315222","https://openalex.org/W2123770058","https://openalex.org/W2134006599","https://openalex.org/W2137754263","https://openalex.org/W2159919478","https://openalex.org/W2161728228","https://openalex.org/W3171759437"],"related_works":["https://openalex.org/W2381850946","https://openalex.org/W4380449851","https://openalex.org/W3125091513","https://openalex.org/W4318832338","https://openalex.org/W1919390113","https://openalex.org/W4248383205","https://openalex.org/W4234745530","https://openalex.org/W2146383839","https://openalex.org/W2231829109","https://openalex.org/W2916591301"],"abstract_inverted_index":{"We":[0,18,103],"present":[1],"a":[2,6,15,84,198],"technique":[3],"to":[4,126,140,178,189],"infer":[5],"worm's":[7],"infection":[8,24],"sequence":[9],"from":[10],"traffic":[11],"traces":[12,191],"collected":[13],"at":[14,65],"network":[16],"telescope.":[17],"analyze":[19],"the":[20,23,39,43,45,48,52,55,63,109,112,119,128,134,144,149,152,161,164,180,193,202],"fidelity":[21],"of":[22,42,47,54,114,122,133,151,163,173,182,192],"evolution":[25],"as":[26],"inferred":[27],"by":[28,107],"our":[29,67,105,183,187],"technique,":[30],"and":[31,51,130,148,155,196],"explore":[32],"its":[33],"effectiveness":[34],"under":[35,167],"varying":[36,141],"constraints":[37],"including":[38,91],"scanning":[40,146],"rate":[41,147],"worm,":[44],"size":[46,53,132,150],"vulnerable":[49,153],"population,":[50,154],"telescope":[56],"itself.":[57],"Moreover,":[58],"we":[59,75,185],"provide":[60,157,197],"guidance":[61],"regarding":[62],"point":[64,79],"which":[66],"method's":[68],"accuracy":[69],"diminishes":[70],"beyond":[71],"practical":[72],"value.":[73],"As":[74],"show":[76],"empirically,":[77],"this":[78],"is":[80,138],"reached":[81],"well":[82],"after":[83],"few":[85],"hundred":[86],"initial":[87],"infected":[88],"hosts":[89],"(possibly":[90],"\"patient":[92],"zero'')":[93],"has":[94],"been":[95],"reliably":[96],"identified":[97],"with":[98],"more":[99],"than":[100],"80%":[101],"accuracy.":[102],"generalize":[104],"mechanism":[106,137],"exploiting":[108],"change":[110],"in":[111],"pattern":[113],"inter-arrival":[115],"times":[116],"exhibited":[117],"during":[118],"early":[120],"stages":[121],"such":[123],"an":[124],"outbreak":[125],"detect":[127],"presence":[129],"approximate":[131],"hit-list.":[135],"Our":[136],"resilient":[139],"parameters":[142],"like":[143],"worm":[145,195],"can":[156],"significant":[158],"insights":[159],"into":[160],"characteristics":[162],"hit-list":[165,205],"even":[166],"spreading":[168],"dynamics":[169],"that":[170,172],"exceed":[171],"currently":[174],"known":[175],"worms.":[176],"Lastly,":[177],"illustrate":[179],"practicality":[181],"solution,":[184],"apply":[186],"approach":[188],"real-world":[190],"Witty":[194],"refined":[199],"estimate":[200],"on":[201],"previously":[203],"suspected":[204],"size.":[206]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
