-
3
-
-
0004246220
-
-
Ph.D. Thesis, University of South California
-
Cohen, F.: Computer Viruses. Ph.D. Thesis, University of South California (1986)
-
(1986)
Computer Viruses
-
-
Cohen, F.1
-
5
-
-
8644268199
-
Some further theoretical results about computer viruses
-
6
-
Zuo Z. and Zhou M. (2004). Some further theoretical results about computer viruses. Comput. J. 47(6): 627-633
-
(2004)
Comput. J.
, vol.47
, pp. 627-633
-
-
Zuo, Z.1
Zhou, M.2
-
6
-
-
33746879580
-
On abstract computer virology from a recursion-theoretic perspective
-
3-4
-
Bonfante G., Kaczmarek M. and Marion J.-Y. (2006). On abstract computer virology from a recursion-theoretic perspective. J. Comput. Virol. 1(3-4): 45-54
-
(2006)
J. Comput. Virol.
, vol.1
, pp. 45-54
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
7
-
-
0031144006
-
Why interaction is more powerful than algorithms
-
5
-
Wegner P. (1997). Why interaction is more powerful than algorithms. Commun. ACM 40(5): 80-91
-
(1997)
Commun. ACM
, vol.40
, pp. 80-91
-
-
Wegner, P.1
-
8
-
-
34249847782
-
Formalisation and implementation aspects of k-ary (malicious) codes
-
EICAR 2007 Special Issue. Broucek, V., Turner, P. (eds)
-
Filiol, E.: Formalisation and implementation aspects of k-ary (malicious) codes. J. Comput. Virol., vol. 3, no. 3, EICAR 2007 Special Issue. Broucek, V., Turner, P. (eds) (2007)
-
(2007)
J. Comput. Virol.
, vol.3
, Issue.3
-
-
Filiol, E.1
-
9
-
-
42649101163
-
-
Springer, Berlin, IRIS Collection, ISBN:2-287-33887-8
-
Filiol, E.: Techniques Virales avancTes. Springer, Berlin, IRIS Collection, ISBN:2-287-33887-8 (2007)
-
(2007)
Techniques Virales AvancTes
-
-
Filiol, E.1
-
10
-
-
0027353881
-
Elements of interaction: Turing award lecture
-
1
-
Milner R. (1993). Elements of interaction: Turing award lecture. Commun. ACM 36(1): 78-89
-
(1993)
Commun. ACM
, vol.36
, pp. 78-89
-
-
Milner, R.1
-
12
-
-
33746782580
-
Mathematical model of computer viruses
-
Leitold, F.: Mathematical model of computer viruses. In: Best Paper Proceedings of EICAR, pp. 194-217 (2000)
-
(2000)
Best Paper Proceedings of EICAR
, pp. 194-217
-
-
Leitold, F.1
-
13
-
-
33751173974
-
Algebraic specification of computer viruses and their environments
-
Young Researchers Workshop (CALCO-jnr), University of Wales Swansea Computer Science Report Series CSR 18-2005, Mosses, P., Power, J., Seisenberger, M. (eds)
-
Webster, M.: Algebraic specification of computer viruses and their environments. In: Selected Papers from the First Conference on Algebra and Coalgebra in Computer Science, Young Researchers Workshop (CALCO-jnr), University of Wales Swansea Computer Science Report Series CSR 18-2005, Mosses, P., Power, J., Seisenberger, M. (eds) pp. 99-113 (2005)
-
(2005)
Selected Papers from the First Conference on Algebra and Coalgebra in Computer Science
, pp. 99-113
-
-
Webster, M.1
-
14
-
-
0002973118
-
Interactive foundations of computing
-
2
-
Wegner P. (1998). Interactive foundations of computing. Theor. Comput. Sci. 192(2): 315-351
-
(1998)
Theor. Comput. Sci.
, vol.192
, pp. 315-351
-
-
Wegner, P.1
-
15
-
-
84976857677
-
Interaction as a basis for empirical computer science
-
1
-
Wegner P. (1995). Interaction as a basis for empirical computer science. ACM Comput. Surv. 27(1): 45-48
-
(1995)
ACM Comput. Surv.
, vol.27
, pp. 45-48
-
-
Wegner, P.1
-
17
-
-
0001282303
-
Automata on infinite objects
-
Elsevier, Amsterdam
-
Thomas, W.: Automata on infinite objects. In: Handbook of Theoretical Computer. Elsevier, Amsterdam (1990)
-
(1990)
Handbook of Theoretical Computer
-
-
Thomas, W.1
-
19
-
-
0023294949
-
Computer viruses: Theory and experiments
-
1
-
Cohen F.B. (1987). Computer viruses: theory and experiments. Comput. Secur. 6(1): 22-35
-
(1987)
Comput. Secur.
, vol.6
, pp. 22-35
-
-
Cohen, F.B.1
-
20
-
-
0003620778
-
-
2 Addison-Wesley Reading, MA ISBN:0-201-44124-1
-
Hopcroft J., Motwani R. and Ullman J. (1995). Introduction to Automata Theory, Languages and Computation, 2nd edn. Addison-Wesley, Reading, MA, ISBN:0-201-44124-1
-
(1995)
Introduction to Automata Theory, Languages and Computation
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
22
-
-
38049038870
-
A classification of viruses through recursion theorems
-
Computation and Logic in the Real World, CIE'07 . Springer, Berlin
-
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: A classification of viruses through recursion theorems In: Computation and Logic in the Real World, CIE'07, vol. 4497 of Lecture Notes in Computer Science, pp. 73-82. Springer, Berlin (2007)
-
(2007)
Lecture Notes in Computer Science
, vol.4497
, pp. 73-82
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
24
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Brumley, D., Newsome, J., Song, D., Wang, H., Jha, S.: Towards automatic generation of vulnerability-based signatures. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 2-16 (2006)
-
(2006)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
25
-
-
27544433210
-
Semantic-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantic-aware malware detection. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 32-46 (2005)
-
(2005)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
26
-
-
33947585353
-
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
-
WTCV'06 Special Issue, G. Bonfante and J-Y. Marion Eds.
-
Filiol, E., Jacob, G., Liard, M.L.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J. Comput. Virol., vol. 3, no. 1, WTCV'06 Special Issue, G. Bonfante and J-Y. Marion Eds., pp. 23-37 (2007)
-
(2007)
J. Comput. Virol.
, vol.3
, Issue.1
, pp. 23-37
-
-
Filiol, E.1
Jacob, G.2
Liard, M.L.3
-
27
-
-
48349136190
-
-
Fortinet observatory. http://www.fortinet.com/FortiGuardCenter/
-
-
-
-
34
-
-
48349146674
-
Advanced polymorphic engine construction
-
Driller, T.M.: Advanced polymorphic engine construction. 29A E-zine, vol. 5 (2003)
-
(2003)
29A E-zine
, vol.5
-
-
Driller, T.M.1
-
35
-
-
35348995283
-
Metamorphism, formal grammars and undecidable code mutation
-
Proceedings of the International Conference on Computational Intelligence (ICCI), Published in the
-
Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. In: Proceedings of the International Conference on Computational Intelligence (ICCI), Published in the International Journal in Computer Science, vol. 2, issue 1, pp. 70-75 (2007)
-
(2007)
International Journal in Computer Science
, vol.2
, Issue.1
, pp. 70-75
-
-
Filiol, E.1
-
36
-
-
48349118113
-
Polymorphism and grammars
-
Qozah, Polymorphism and grammars, 29A E-zine, vol. 4 (1999)
-
(1999)
29A E-zine
, vol.4
-
-
Qozah1
|