<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/1433367> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/AcademicArticle> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/dc/terms/title> "Hybrid Epidemics - A Case Study on Computer Worm Conficker"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/ontology/bibo/abstract> "Conficker is a computer worm that erupted on the Internet in 2008. It is unique in combining three different spreading strategies: local probing, neighbourhood probing, and global probing. We propose a mathematical model that combines three modes of spreading, local, neighbourhood and global to capture the worm's spreading behaviour. The parameters of the model are inferred directly from network data obtained during the first day of the Conifcker epidemic. The model is then used to explore the trade-off between spreading modes in determining the worm's effectiveness. Our results show that the Conficker epidemic is an example of a critically hybrid epidemic, in which the different modes of spreading in isolation do not lead to successful epidemics. Such hybrid spreading strategies may be used beneficially to provide the most effective strategies for promulgating information across a large population. When used maliciously, however, they can present a dangerous challenge to current internet security protocols."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/dc/terms/date> "2014-06-22" .
<https://discovery.ucl.ac.uk/id/document/134138> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/ontology/bibo/volume> "10" .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/ontology/bibo/issue> "5" .
<https://discovery.ucl.ac.uk/id/publication/ext-ceb82ca513fc49ffe2f82b12464bffce> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> .
<https://discovery.ucl.ac.uk/id/publication/ext-ceb82ca513fc49ffe2f82b12464bffce> <http://xmlns.com/foaf/0.1/name> "PLoS One"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-ceb82ca513fc49ffe2f82b12464bffce> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-62b5dcb76d47fba55fc53afa8b1059f7> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/1433367#authors> .
<https://discovery.ucl.ac.uk/id/eprint/1433367#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-62b5dcb76d47fba55fc53afa8b1059f7> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-436bc0503266353f5c915eabf6c86d01> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/1433367#authors> .
<https://discovery.ucl.ac.uk/id/eprint/1433367#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-436bc0503266353f5c915eabf6c86d01> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-e3281b45868dd0a6b23dff71fb68add2> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/1433367#authors> .
<https://discovery.ucl.ac.uk/id/eprint/1433367#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-e3281b45868dd0a6b23dff71fb68add2> .
<https://discovery.ucl.ac.uk/id/person/ext-436bc0503266353f5c915eabf6c86d01> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-436bc0503266353f5c915eabf6c86d01> <http://xmlns.com/foaf/0.1/givenName> "S"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-436bc0503266353f5c915eabf6c86d01> <http://xmlns.com/foaf/0.1/familyName> "Zhou"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-436bc0503266353f5c915eabf6c86d01> <http://xmlns.com/foaf/0.1/name> "S Zhou"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-62b5dcb76d47fba55fc53afa8b1059f7> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-62b5dcb76d47fba55fc53afa8b1059f7> <http://xmlns.com/foaf/0.1/givenName> "C"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-62b5dcb76d47fba55fc53afa8b1059f7> <http://xmlns.com/foaf/0.1/familyName> "Zhang"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-62b5dcb76d47fba55fc53afa8b1059f7> <http://xmlns.com/foaf/0.1/name> "C Zhang"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-e3281b45868dd0a6b23dff71fb68add2> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-e3281b45868dd0a6b23dff71fb68add2> <http://xmlns.com/foaf/0.1/givenName> "BM"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-e3281b45868dd0a6b23dff71fb68add2> <http://xmlns.com/foaf/0.1/familyName> "Chain"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-e3281b45868dd0a6b23dff71fb68add2> <http://xmlns.com/foaf/0.1/name> "BM Chain"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ArticleEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134138> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/134138> <http://www.w3.org/2000/01/rdf-schema#label> "Hybrid Epidemics - A Case Study on Computer Worm Conficker (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/134138> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/1433367/1/journal.pone.0127478.pdf> .
<https://discovery.ucl.ac.uk/id/document/134138> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/1433367/1/journal.pone.0127478.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/1433367/1/journal.pone.0127478.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "journal.pone.0127478.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/134139> .
<https://discovery.ucl.ac.uk/id/document/134139> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/134139> <http://www.w3.org/2000/01/rdf-schema#label> "Hybrid Epidemics - A Case Study on Computer Worm Conficker (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/134139> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134139> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134139> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134139> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/1433367/2/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/document/134139> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/1433367/2/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/1433367/2/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/134140> .
<https://discovery.ucl.ac.uk/id/document/134140> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/134140> <http://www.w3.org/2000/01/rdf-schema#label> "Hybrid Epidemics - A Case Study on Computer Worm Conficker (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/134140> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134140> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134140> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134140> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/1433367/3/preview.jpg> .
<https://discovery.ucl.ac.uk/id/document/134140> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/1433367/3/preview.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/1433367/3/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/134141> .
<https://discovery.ucl.ac.uk/id/document/134141> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/134141> <http://www.w3.org/2000/01/rdf-schema#label> "Hybrid Epidemics - A Case Study on Computer Worm Conficker (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/134141> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134141> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134141> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134141> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/1433367/4/medium.jpg> .
<https://discovery.ucl.ac.uk/id/document/134141> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/1433367/4/medium.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/1433367/4/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/134142> .
<https://discovery.ucl.ac.uk/id/document/134142> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/134142> <http://www.w3.org/2000/01/rdf-schema#label> "Hybrid Epidemics - A Case Study on Computer Worm Conficker (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/134142> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134142> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134142> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134142> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/1433367/5/small.jpg> .
<https://discovery.ucl.ac.uk/id/document/134142> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/1433367/5/small.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/1433367/5/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/134143> .
<https://discovery.ucl.ac.uk/id/document/134143> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/134143> <http://www.w3.org/2000/01/rdf-schema#label> "Hybrid Epidemics - A Case Study on Computer Worm Conficker (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/134143> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134143> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134143> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/134138> .
<https://discovery.ucl.ac.uk/id/document/134143> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/1433367/6/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/document/134143> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/1433367/6/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/eprint/1433367/6/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/1433367> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/1433367/> .
<https://discovery.ucl.ac.uk/id/eprint/1433367/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #1433367 \n\nHybrid Epidemics - A Case Study on Computer Worm Conficker\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/1433367/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/1433367/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/1433367> .