-
2
-
-
0028514027
-
A taxonomy of computer program security flaws
-
Sept.
-
C.E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A taxonomy of computer program security flaws," ACM Comput. Surv., vol. 26, no. 3, pp. 211-254, Sept. 1994.
-
(1994)
ACM Comput. Surv.
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
3
-
-
0013175067
-
Computer viruses
-
May-June
-
P. J. Denning, "Computer viruses," Amer. Scientist, pp. 236-238, May-June 1988.
-
(1988)
Amer. Scientist
, pp. 236-238
-
-
Denning, P.J.1
-
4
-
-
0023294949
-
Computer viruses: Theory and experiments
-
Feb.
-
F. Cohen, "Computer viruses: Theory and experiments," Comput. Security, vol. 6, no. 1, pp. 22-35, Feb. 1987.
-
(1987)
Comput. Security
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
5
-
-
0013131573
-
A computer virus primer
-
P. J. Denning, Ed. Reading, MA: Addison-Wesley, ch. 20
-
E. H. Spafford, K. A. Heaphy, and D. J. Ferbrache, "A computer virus primer," in Computers Under Attack: Intruders, Worms, and Viruses, P. J. Denning, Ed. Reading, MA: Addison-Wesley, 1990, ch. 20, pp. 316-355.
-
(1990)
Computers Under Attack: Intruders, Worms, and Viruses
, pp. 316-355
-
-
Spafford, E.H.1
Heaphy, K.A.2
Ferbrache, D.J.3
-
7
-
-
0013135152
-
Analysis and detection of computer viruses and worms: An annotated bibliography
-
Feb.
-
P. K. Singh and A. Lakhotia, "Analysis and detection of computer viruses and worms: An annotated bibliography," ACM SIGPLAN Notices, vol. 37, no. 2, pp. 29-35, Feb. 2002.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.2
, pp. 29-35
-
-
Singh, P.K.1
Lakhotia, A.2
-
8
-
-
0003602325
-
RFC 1321: The MD5 message-digest algorithm
-
Apr.
-
R. Rivest, "RFC 1321: The MD5 message-digest algorithm," Status: INFORMATIONAL, Apr. 1992.
-
(1992)
Status: INFORMATIONAL
-
-
Rivest, R.1
-
9
-
-
84976781807
-
Reflections on trusting trust
-
Aug.
-
K. L. Thompson, "Reflections on trusting trust," Commun. ACM, vol. 27, no. 8, pp, 761-763, Aug. 1984.
-
(1984)
Commun. ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.L.1
-
10
-
-
0001082723
-
Experience with viruses on UNIX systems
-
Spring
-
T. Duff, "Experience with viruses on UNIX systems," Computing Syst., vol. 2, no. 2, pp. 155-171, Spring 1989.
-
(1989)
Computing Syst.
, vol.2
, Issue.2
, pp. 155-171
-
-
Duff, T.1
-
11
-
-
0013083839
-
Virology 101
-
Spring
-
M. D. McIlroy, "Virology 101," Computing Syst., vol. 2, no. 2, pp. 173-184, Spring 1989.
-
(1989)
Computing Syst.
, vol.2
, Issue.2
, pp. 173-184
-
-
McIlroy, M.D.1
-
12
-
-
0013141938
-
-
June. Online
-
F. Perriot, P. Ferric, and P. Ször. (2002, June) W32/Simile. [Online]. Available: http://www.virusbtn.com/resources/viruses/indepth/simile.xml.
-
(2002)
W32/Simile
-
-
Perriot, F.1
Ferric, P.2
Ször, P.3
-
13
-
-
0024682488
-
Computational aspects of computer viruses
-
June
-
F. Cohen, "Computational aspects of computer viruses," Computers & Security, vol. 8, no. 4, pp. 325-344, June 1989.
-
(1989)
Computers & Security
, vol.8
, Issue.4
, pp. 325-344
-
-
Cohen, F.1
-
14
-
-
84960561455
-
On computable numbers, with an application to the Entscheidungs problem
-
corrections in vol. 2, no. 43, pp. 544-546
-
A. M. Turing, "On computable numbers, with an application to the Entscheidungs problem," in Proc. London Math. Soc., vol. 2, pp. 230-265, 1936, corrections in vol. 2, no. 43, pp. 544-546.
-
(1936)
Proc. London Math. Soc.
, vol.2
, pp. 230-265
-
-
Turing, A.M.1
-
15
-
-
77954744592
-
An undetectable computer virus
-
Online. June
-
D. M. Chess and S. R. White, "An undetectable computer virus," in Virus Bulletin Conf, Sept. 2000, [Online]. Available: http://www.research.ibm.com/antivirus/SciPapers/VB2000DC.pdf, June 2002.
-
(2002)
Virus Bulletin Conf, Sept. 2000
-
-
Chess, D.M.1
White, S.R.2
-
16
-
-
0017547820
-
A fast string searching algorithm
-
Oct.
-
R. S. Boyer and J. S. Moore, "A fast string searching algorithm," Commun. ACM, vol. 20, no. 10, pp, 262-272, Oct. 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.10
, pp. 262-272
-
-
Boyer, R.S.1
Moore, J.S.2
-
17
-
-
85059770931
-
The complexity of theorem proving procedures
-
S. A. Cook, "The complexity of theorem proving procedures," in Proc. 3rd ACM Symp. Theory of Computing, 1971, pp. 151-158.
-
(1971)
Proc. 3rd ACM Symp. Theory of Computing
, pp. 151-158
-
-
Cook, S.A.1
-
18
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
Hilton Head, SC, Jan.
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, "Buffer overflows: Attacks and defenses for the vulnerability of the decade," in Proc. DARPA Information Survivability Conf. and Exposition. Hilton Head, SC, Jan. 2000, pp. 119-129.
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition
, pp. 119-129
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
19
-
-
0024663403
-
With microscope and tweezers: An analysis of the internet vires of November 1988
-
Oakland, CA, May
-
M. W. Eichlin and J. A. Rochlis, "With microscope and tweezers: An analysis of the internet vires of November 1988," in Proc. IEEE Symp. Research in Security and Privacy, Oakland, CA, May 1989, pp. 326-345.
-
(1989)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 326-345
-
-
Eichlin, M.W.1
Rochlis, J.A.2
|