-
1
-
-
0004246220
-
-
PhD Thesis, University of Southern California
-
Cohen, F.: Computer Viruses. PhD Thesis, University of Southern California (1985)
-
(1985)
Computer Viruses
-
-
Cohen, F.1
-
2
-
-
84952737129
-
An abstract theory of computer viruses
-
Goldwasser, S. (ed.) Berlin Heidelberg New York: Springer
-
Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) Advances in cryptology - CRYPTO'88 - Lecture notes in computer science, vol. 403, pp. 354-374, Berlin Heidelberg New York: Springer 1988
-
(1988)
Advances in Cryptology - CRYPTO'88 - Lecture Notes in Computer Science
, vol.403
, pp. 354-374
-
-
Adleman, L.M.1
-
3
-
-
8644268199
-
Some further theoretical results about computer viruses
-
Zuo, Z., Zhou, M.: Some further theoretical results about computer viruses. Comput J 47(6), 627-633 (2004)
-
(2004)
Comput J
, vol.47
, Issue.6
, pp. 627-633
-
-
Zuo, Z.1
Zhou, M.2
-
4
-
-
33746879580
-
On abstract computer virology from a recursion-theoretic perspective
-
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: On abstract computer virology from a recursion-theoretic perspective. J Comput Virol 1(3-4), 45-54 (2006)
-
(2006)
J Comput Virol
, vol.1
, Issue.3-4
, pp. 45-54
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
5
-
-
33646424622
-
Toward an abstract computer virology
-
Proceedings of the ICTAC'05, Berlin Heidelberg New York: Springer 2002, 41p
-
Bonfante, G., Kaczmarek, M., Marion, J.-Y: Toward an abstract computer virology. In: Proceedings of the ICTAC'05, lecture notes in computer science, vol. 3722, pp. 579-593. Berlin Heidelberg New York: Springer 2002, 41p (2005)
-
(2005)
Lecture Notes in Computer Science
, vol.3722
, pp. 579-593
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
7
-
-
0037269111
-
Reliable identification of bounded-length viruses is np-complete
-
Spinellis. D.: Reliable identification of bounded-length viruses is np-complete. IEEE Trans Inf Theory 49(1), 280-284 (2003)
-
(2003)
IEEE Trans Inf Theory
, vol.49
, Issue.1
, pp. 280-284
-
-
Spinellis, D.1
-
10
-
-
23844438042
-
On the time complexity of computer viruses
-
Zuo, Z., Zhou, M.: On the time complexity of computer viruses. IEEE Trans Inf Theo 51(8), 2962-2966 (2003)
-
(2003)
IEEE Trans Inf Theo
, vol.51
, Issue.8
, pp. 2962-2966
-
-
Zuo, Z.1
Zhou, M.2
-
16
-
-
6544287071
-
A bibliography of quantum cryptography
-
Brassard, G.: A bibliography of quantum cryptography. SIGACT News 24(3), 16-20 (1993)
-
(1993)
SIGACT News
, vol.24
, Issue.3
, pp. 16-20
-
-
Brassard, G.1
-
19
-
-
8644273520
-
An environment for controlled worm replication and analysis
-
Whalley, I., Arnold, B., Chess, D., Morar, J., Segal, A., Swimmer, M.: An environment for controlled worm replication and analysis. In: Proceedings of the virus bulletin conference (2000)
-
(2000)
Proceedings of the Virus Bulletin Conference
-
-
Whalley, I.1
Arnold, B.2
Chess, D.3
Morar, J.4
Segal, A.5
Swimmer, M.6
-
22
-
-
0034486891
-
The mathematics of infectious diseases
-
Hethcote, H.W.: The mathematics of infectious diseases. SIAM Rev 42(4), 599-653 (2000)
-
(2000)
SIAM Rev
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
23
-
-
0037071123
-
A unified prediction of computer virus spread in connected networks
-
Billings, L., Spears, W.M., Schwartz, I.B.: A unified prediction of computer virus spread in connected networks. Phys Lett A 297, 261-266 (2002)
-
(2002)
Phys Lett A
, vol.297
, pp. 261-266
-
-
Billings, L.1
Spears, W.M.2
Schwartz, I.B.3
-
24
-
-
14944350556
-
Email virus propagation modeling and analysis
-
University of Massachussets, Amherst
-
Zou, C.C., Towsley, D., Gong, W.: Email virus propagation modeling and analysis. Technical report TR-CSE-03-04, University of Massachussets, Amherst
-
Technical Report
, vol.TR-CSE-03-04
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
25
-
-
0024681099
-
Crisis and aftermath
-
Spafford, E.H.: Crisis and aftermath. Commun ACM 32(6), 678-687 (1989)
-
(1989)
Commun ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
Spafford, E.H.1
-
28
-
-
0141440838
-
Shining light on dark address space
-
Arbor networks
-
Labovitz, A.A.C., Bailey, M.: Shining light on dark address space. Technical report, Arbor networks (2001)
-
(2001)
Technical Report
-
-
Labovitz, A.A.C.1
Bailey, M.2
-
31
-
-
33644660669
-
Computer virus propagation models
-
Calzarossa, M.C., Gelenbe, E. (eds.) Berlin Heidelberg New York: Springer
-
Serazzi, G., Zanero, S.: Computer virus propagation models. In: Calzarossa, M.C., Gelenbe, E. (eds.) Tutorials of the 11th IEEE/ACM Int'l symp. on modeling, analysis and simulation of computer and telecom - systems - MASCOTS 2003. Berlin Heidelberg New York: Springer 2003
-
(2003)
Tutorials of the 11th IEEE/ACM Int'l Symp. on Modeling, Analysis and Simulation of Computer and Telecom - Systems - MASCOTS 2003
-
-
Serazzi, G.1
Zanero, S.2
-
32
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
New York: ACM Press
-
Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM conference on computer and communications security, pp 138-147. New York: ACM Press 2002
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
33
-
-
84949487368
-
On computer viral infection and the effect of immunization
-
Washington, DC, USA. Dublin: IEEE Computer Society
-
Wang, C., Knight, J.C., Elder, M.C.: On computer viral infection and the effect of immunization. In: ACSAC '00: proceedings of the 16th annual computer security applications conference, Washington, DC, USA, p 246. Dublin: IEEE Computer Society (2000)
-
(2000)
ACSAC '00: Proceedings of the 16th Annual Computer Security Applications Conference
, pp. 246
-
-
Wang, C.1
Knight, J.C.2
Elder, M.C.3
-
35
-
-
33746865304
-
Suppressing the spread of email malcode using short-term message recall
-
El-FarArun, I.K., Ford, R., Ondi, A., Pancholi, M.: Suppressing the spread of email malcode using short-term message recall. J Comput Virol 1(1-2), 4-12 (2005)
-
(2005)
J Comput Virol
, vol.1
, Issue.1-2
, pp. 4-12
-
-
El-FarArun, I.K.1
Ford, R.2
Ondi, A.3
Pancholi, M.4
-
36
-
-
16344396406
-
Monitoring and early warning for internet worms
-
New York: ACM Press
-
Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of the 10th ACM conference on computer and communication security, pp 190-199. New York: ACM Press 2003
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 190-199
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
37
-
-
27244456440
-
Blended attacks: Exploits, vulnerabilities and buffer-overflow techniques in computer viruses
-
Oxfordshire: Virus Bulletin Ltd
-
Chien, E., Peter, S.: Blended attacks: Exploits, vulnerabilities and buffer-overflow techniques in computer viruses. In: Proceedings of virus bulletin conference 2002, pp 1-35 Oxfordshire: Virus Bulletin Ltd (2002)
-
(2002)
Proceedings of Virus Bulletin Conference 2002
, pp. 1-35
-
-
Chien, E.1
Peter, S.2
-
38
-
-
33746864381
-
Realisation ideas for secure system design
-
Gattiker, U.E. (ed.) Copenhagen
-
Helenius, M.: Realisation ideas for secure system design. In: Gattiker, U.E. (ed.) EICAR Conference Best Paper Proceedings, Copenhagen (2003)
-
(2003)
EICAR Conference Best Paper Proceedings
-
-
Helenius, M.1
-
43
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: requirements for containing self-propagating code. In: Proceedings of IEEE INFOCOM (2003)
-
(2003)
Proceedings of IEEE INFOCOM
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
44
-
-
14944367812
-
Worm vs. worm: Preliminary study of an active counter-attack mechanism
-
New York: ACM Press
-
Castaneda, F., Sezer, E.C., Xu, J.: Worm vs. worm: preliminary study of an active counter-attack mechanism. In: WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcode, pp 83-93. New York: ACM Press, 2004
-
(2004)
WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 83-93
-
-
Castaneda, F.1
Sezer, E.C.2
Xu, J.3
-
45
-
-
33746911072
-
From antivirus to antimalware software and beyond: Another approach to the protection of customers from dysfunctional system behaviour
-
Brunnstein, K.: From antivirus to antimalware software and beyond: another approach to the protection of customers from dysfunctional system behaviour. In: Proceedings of 22nd national information systems security conference, 1999
-
(1999)
Proceedings of 22nd National Information Systems Security Conference
-
-
Brunnstein, K.1
-
46
-
-
0344113893
-
Constructing computer virus phylogenies
-
Goldberg, L.A., Goldberg, P.W., Phillips, C.A., Sorkin, G.B.: Constructing computer virus phylogenies. J Algorithms 26, 188-208 (1998)
-
(1998)
J Algorithms
, vol.26
, pp. 188-208
-
-
Goldberg, L.A.1
Goldberg, P.W.2
Phillips, C.A.3
Sorkin, G.B.4
-
47
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Karim, M.E., Walenstein, A., Lakhotia, A.: Malware phylogeny generation using permutations of code. J Comput Virol 1(1-2) 13-23 (2005)
-
(2005)
J Comput Virol
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Karim, M.E.1
Walenstein, A.2
Lakhotia, A.3
-
48
-
-
33746918633
-
What makes symbian malware tick
-
England: Virus B ulletin Ltd
-
Jarmo, N.:What makes symbian malware tick. In: Proceedings of virus bulletin conference, pp 115-120. England: Virus B ulletin Ltd 2005
-
(2005)
Proceedings of Virus Bulletin Conference
, pp. 115-120
-
-
Jarmo, N.1
-
49
-
-
33746924888
-
New threats of Java viruses
-
Reynaud-Plantey, D.: New threats of Java viruses. J Comput Virol 1(3-4), 32-43 (2005)
-
(2005)
J Comput Virol
, vol.1
, Issue.3-4
, pp. 32-43
-
-
Reynaud-Plantey, D.1
|