메뉴 건너뛰기




Volumn 19, Issue 2, 1996, Pages 124-132

Model for network behaviour under viral attack

Author keywords

Computer viruses; Intrusion; Malicious software; Network; Security; Worms

Indexed keywords

COMPUTER NETWORKS; COMPUTER SIMULATION; COMPUTER SOFTWARE; COMPUTER VIRUSES; COMPUTER WORMS; DISTRIBUTED COMPUTER SYSTEMS;

EID: 0030073977     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/0140-3664(95)01033-5     Document Type: Article
Times cited : (3)

References (18)
  • 1
    • 0024682488 scopus 로고
    • Computational aspects of computer viruses
    • F. Cohen, 'Computational aspects of computer viruses', Computers & Security, Vol. 8 No 4 (1989) pp 325-344.
    • (1989) Computers & Security , vol.8 , Issue.4 , pp. 325-344
    • Cohen, F.1
  • 2
    • 0004246220 scopus 로고
    • PhD Dissertation University of Southern California
    • F. Cohen, Computer viruses, PhD Dissertation University of Southern California (1985).
    • (1985) Computer Viruses
    • Cohen, F.1
  • 3
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • F. Cohen, 'Computer viruses: Theory and experiments', Computers & Security, Vol. 6 No 1 (1987) pp 2-35.
    • (1987) Computers & Security , vol.6 , Issue.1 , pp. 2-35
    • Cohen, F.1
  • 4
    • 0038972993 scopus 로고
    • An abstract theory of computer viruses
    • L. Hoffman, (ed.), Van Nostrand-Rhineholt, New York
    • L. Adleman, 'An abstract theory of computer viruses' in L. Hoffman, (ed.), Rogue Programmes: Viruses, Worms and Trojan Horses, Van Nostrand-Rhineholt, New York (1990) pp 307-323.
    • (1990) Rogue Programmes: Viruses, Worms and Trojan Horses , pp. 307-323
    • Adleman, L.1
  • 7
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T. Lunt, 'A survey of intrusion detection techniques', Computers & Security, Vol. 12 No 4 (1993) pp 405-418.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.1
  • 9
    • 0040157258 scopus 로고
    • Prophylaxis for virus propagation and general computer security policy
    • D. Guinier, 'Prophylaxis for virus propagation and general computer security policy', ACM SIGSAG Rev, Vol 9 No 2 (1991) pp 1-10.
    • (1991) ACM SIGSAG Rev , vol.9 , Issue.2 , pp. 1-10
    • Guinier, D.1
  • 10
    • 85029996004 scopus 로고
    • Royal Signals and Radar Establishment NTIS AD-A229 274 report, RSAR, UK July
    • S. Giess, Network stability under viral attack, Royal Signals and Radar Establishment NTIS AD-A229 274 report, RSAR, UK (July 1990).
    • (1990) Network Stability under Viral Attack
    • Giess, S.1
  • 12
    • 85029974884 scopus 로고
    • IBM's high integrity computing laboratory
    • UK
    • S. White, 'IBM's High Integrity Computing Laboratory', Proc. 1st Int. Virus Conf., UK (1991) pp 75-82.
    • (1991) Proc. 1st Int. Virus Conf. , pp. 75-82
    • White, S.1
  • 13
    • 85029973005 scopus 로고
    • The problem with scanners and compressed files
    • The Netherlands
    • J. Walker, 'The problem with scanners and compressed files', Proc. 3rd Int. Virus Conf., The Netherlands (1993) pp 45-50.
    • (1993) Proc. 3rd Int. Virus Conf. , pp. 45-50
    • Walker, J.1
  • 14
    • 0039566064 scopus 로고
    • Greek Computer Society Monograph Series, Athens, Greece in Greek
    • D. Gritzalis, Information Systems Security, Greek Computer Society Monograph Series, Athens, Greece (1989) (in Greek).
    • (1989) Information Systems Security
    • Gritzalis, D.1
  • 18
    • 0040157259 scopus 로고
    • Computer virus identification with neural networks
    • D. Guinier, 'Computer virus identification with neural networks', ACM SIGSAC Rev., Vol 9 No 4 (1991) pp 49-59.
    • (1991) ACM SIGSAC Rev. , vol.9 , Issue.4 , pp. 49-59
    • Guinier, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.