메뉴 건너뛰기




Volumn 1, Issue 3-4, 2006, Pages 55-66

Open problems in computer virology

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33746896615     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-005-0008-3     Document Type: Article
Times cited : (37)

References (49)
  • 1
    • 0004246220 scopus 로고
    • PhD Thesis, University of Southern California
    • Cohen, F.: Computer Viruses. PhD Thesis, University of Southern California (1985)
    • (1985) Computer Viruses
    • Cohen, F.1
  • 2
    • 84952737129 scopus 로고
    • An abstract theory of computer viruses
    • Goldwasser, S. (ed.) Berlin Heidelberg New York: Springer
    • Adleman, L.M.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) Advances in cryptology - CRYPTO'88 - Lecture notes in computer science, vol. 403, pp. 354-374, Berlin Heidelberg New York: Springer 1988
    • (1988) Advances in Cryptology - CRYPTO'88 - Lecture Notes in Computer Science , vol.403 , pp. 354-374
    • Adleman, L.M.1
  • 3
    • 8644268199 scopus 로고    scopus 로고
    • Some further theoretical results about computer viruses
    • Zuo, Z., Zhou, M.: Some further theoretical results about computer viruses. Comput J 47(6), 627-633 (2004)
    • (2004) Comput J , vol.47 , Issue.6 , pp. 627-633
    • Zuo, Z.1    Zhou, M.2
  • 4
    • 33746879580 scopus 로고    scopus 로고
    • On abstract computer virology from a recursion-theoretic perspective
    • Bonfante, G., Kaczmarek, M., Marion, J.-Y.: On abstract computer virology from a recursion-theoretic perspective. J Comput Virol 1(3-4), 45-54 (2006)
    • (2006) J Comput Virol , vol.1 , Issue.3-4 , pp. 45-54
    • Bonfante, G.1    Kaczmarek, M.2    Marion, J.-Y.3
  • 5
    • 33646424622 scopus 로고    scopus 로고
    • Toward an abstract computer virology
    • Proceedings of the ICTAC'05, Berlin Heidelberg New York: Springer 2002, 41p
    • Bonfante, G., Kaczmarek, M., Marion, J.-Y: Toward an abstract computer virology. In: Proceedings of the ICTAC'05, lecture notes in computer science, vol. 3722, pp. 579-593. Berlin Heidelberg New York: Springer 2002, 41p (2005)
    • (2005) Lecture Notes in Computer Science , vol.3722 , pp. 579-593
    • Bonfante, G.1    Kaczmarek, M.2    Marion, J.-Y.3
  • 7
    • 0037269111 scopus 로고    scopus 로고
    • Reliable identification of bounded-length viruses is np-complete
    • Spinellis. D.: Reliable identification of bounded-length viruses is np-complete. IEEE Trans Inf Theory 49(1), 280-284 (2003)
    • (2003) IEEE Trans Inf Theory , vol.49 , Issue.1 , pp. 280-284
    • Spinellis, D.1
  • 10
    • 23844438042 scopus 로고    scopus 로고
    • On the time complexity of computer viruses
    • Zuo, Z., Zhou, M.: On the time complexity of computer viruses. IEEE Trans Inf Theo 51(8), 2962-2966 (2003)
    • (2003) IEEE Trans Inf Theo , vol.51 , Issue.8 , pp. 2962-2966
    • Zuo, Z.1    Zhou, M.2
  • 16
    • 6544287071 scopus 로고
    • A bibliography of quantum cryptography
    • Brassard, G.: A bibliography of quantum cryptography. SIGACT News 24(3), 16-20 (1993)
    • (1993) SIGACT News , vol.24 , Issue.3 , pp. 16-20
    • Brassard, G.1
  • 22
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • Hethcote, H.W.: The mathematics of infectious diseases. SIAM Rev 42(4), 599-653 (2000)
    • (2000) SIAM Rev , vol.42 , Issue.4 , pp. 599-653
    • Hethcote, H.W.1
  • 23
    • 0037071123 scopus 로고    scopus 로고
    • A unified prediction of computer virus spread in connected networks
    • Billings, L., Spears, W.M., Schwartz, I.B.: A unified prediction of computer virus spread in connected networks. Phys Lett A 297, 261-266 (2002)
    • (2002) Phys Lett A , vol.297 , pp. 261-266
    • Billings, L.1    Spears, W.M.2    Schwartz, I.B.3
  • 24
    • 14944350556 scopus 로고    scopus 로고
    • Email virus propagation modeling and analysis
    • University of Massachussets, Amherst
    • Zou, C.C., Towsley, D., Gong, W.: Email virus propagation modeling and analysis. Technical report TR-CSE-03-04, University of Massachussets, Amherst
    • Technical Report , vol.TR-CSE-03-04
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 25
    • 0024681099 scopus 로고
    • Crisis and aftermath
    • Spafford, E.H.: Crisis and aftermath. Commun ACM 32(6), 678-687 (1989)
    • (1989) Commun ACM , vol.32 , Issue.6 , pp. 678-687
    • Spafford, E.H.1
  • 28
    • 0141440838 scopus 로고    scopus 로고
    • Shining light on dark address space
    • Arbor networks
    • Labovitz, A.A.C., Bailey, M.: Shining light on dark address space. Technical report, Arbor networks (2001)
    • (2001) Technical Report
    • Labovitz, A.A.C.1    Bailey, M.2
  • 35
    • 33746865304 scopus 로고    scopus 로고
    • Suppressing the spread of email malcode using short-term message recall
    • El-FarArun, I.K., Ford, R., Ondi, A., Pancholi, M.: Suppressing the spread of email malcode using short-term message recall. J Comput Virol 1(1-2), 4-12 (2005)
    • (2005) J Comput Virol , vol.1 , Issue.1-2 , pp. 4-12
    • El-FarArun, I.K.1    Ford, R.2    Ondi, A.3    Pancholi, M.4
  • 37
    • 27244456440 scopus 로고    scopus 로고
    • Blended attacks: Exploits, vulnerabilities and buffer-overflow techniques in computer viruses
    • Oxfordshire: Virus Bulletin Ltd
    • Chien, E., Peter, S.: Blended attacks: Exploits, vulnerabilities and buffer-overflow techniques in computer viruses. In: Proceedings of virus bulletin conference 2002, pp 1-35 Oxfordshire: Virus Bulletin Ltd (2002)
    • (2002) Proceedings of Virus Bulletin Conference 2002 , pp. 1-35
    • Chien, E.1    Peter, S.2
  • 38
    • 33746864381 scopus 로고    scopus 로고
    • Realisation ideas for secure system design
    • Gattiker, U.E. (ed.) Copenhagen
    • Helenius, M.: Realisation ideas for secure system design. In: Gattiker, U.E. (ed.) EICAR Conference Best Paper Proceedings, Copenhagen (2003)
    • (2003) EICAR Conference Best Paper Proceedings
    • Helenius, M.1
  • 45
    • 33746911072 scopus 로고    scopus 로고
    • From antivirus to antimalware software and beyond: Another approach to the protection of customers from dysfunctional system behaviour
    • Brunnstein, K.: From antivirus to antimalware software and beyond: another approach to the protection of customers from dysfunctional system behaviour. In: Proceedings of 22nd national information systems security conference, 1999
    • (1999) Proceedings of 22nd National Information Systems Security Conference
    • Brunnstein, K.1
  • 47
    • 33746882464 scopus 로고    scopus 로고
    • Malware phylogeny generation using permutations of code
    • Karim, M.E., Walenstein, A., Lakhotia, A.: Malware phylogeny generation using permutations of code. J Comput Virol 1(1-2) 13-23 (2005)
    • (2005) J Comput Virol , vol.1 , Issue.1-2 , pp. 13-23
    • Karim, M.E.1    Walenstein, A.2    Lakhotia, A.3
  • 48
    • 33746918633 scopus 로고    scopus 로고
    • What makes symbian malware tick
    • England: Virus B ulletin Ltd
    • Jarmo, N.:What makes symbian malware tick. In: Proceedings of virus bulletin conference, pp 115-120. England: Virus B ulletin Ltd 2005
    • (2005) Proceedings of Virus Bulletin Conference , pp. 115-120
    • Jarmo, N.1
  • 49
    • 33746924888 scopus 로고    scopus 로고
    • New threats of Java viruses
    • Reynaud-Plantey, D.: New threats of Java viruses. J Comput Virol 1(3-4), 32-43 (2005)
    • (2005) J Comput Virol , vol.1 , Issue.3-4 , pp. 32-43
    • Reynaud-Plantey, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.