{"id":"https://openalex.org/W2341203409","doi":"https://doi.org/10.1145/1016978.1016980","title":"Blaster Revisited","display_name":"Blaster Revisited","publication_year":2004,"publication_date":"2004-06-01","ids":{"openalex":"https://openalex.org/W2341203409","doi":"https://doi.org/10.1145/1016978.1016980","mag":"2341203409"},"language":"en","primary_location":{"id":"doi:10.1145/1016978.1016980","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1016978.1016980","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1016978.1016980","source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/1016978.1016980","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028812890","display_name":"Jim Morrison","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jim Morrison","raw_affiliation_strings":["Symantec Security Services"],"affiliations":[{"raw_affiliation_string":"Symantec Security Services","institution_ids":["https://openalex.org/I1308906816"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5028812890"],"corresponding_institution_ids":["https://openalex.org/I1308906816"],"apc_list":null,"apc_paid":null,"fwci":0.927,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81515116,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"4","first_page":"34","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5774999856948853,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5774999856948853,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11515","display_name":"Bacillus and Francisella bacterial research","score":0.5058000087738037,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.9307591915130615},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.597636342048645},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43615996837615967},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.33812326192855835},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.10567736625671387}],"concepts":[{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.9307591915130615},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.597636342048645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43615996837615967},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.33812326192855835},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.10567736625671387},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1016978.1016980","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1016978.1016980","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1016978.1016980","source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/1016978.1016980","is_oa":true,"landing_page_url":"https://doi.org/10.1145/1016978.1016980","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/1016978.1016980","source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2341203409.pdf","grobid_xml":"https://content.openalex.org/works/W2341203409.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4241263575","https://openalex.org/W2317823609","https://openalex.org/W3130462184","https://openalex.org/W2902287117","https://openalex.org/W4318256508","https://openalex.org/W2401463593","https://openalex.org/W2349808627","https://openalex.org/W2391671934","https://openalex.org/W3023500690"],"abstract_inverted_index":{"What":[0],"lessons":[1],"can":[2],"we":[3],"learn":[4],"from":[5,20,42],"the":[6,8,30,46],"carnage":[7],"Blaster":[9,31],"worm":[10],"created?":[11],"The":[12,38],"following":[13],"tale":[14],"is":[15],"based":[16],"upon":[17],"actual":[18],"circumstances":[19],"corporate":[21],"enterprises":[22],"that":[23],"were":[24],"faced":[25],"with":[26],"confronting":[27],"and":[28,48],"eradicating":[29],"worm,":[32],"which":[33],"hit":[34],"in":[35],"August":[36],"2003.":[37],"story":[39],"provides":[40],"views":[41],"many":[43],"perspectives,":[44],"illustrating":[45],"complexity":[47],"sophistication":[49],"needed":[50],"to":[51],"combat":[52],"new":[53],"blended":[54],"threats.":[55]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
