메뉴 건너뛰기




Volumn 4, Issue 4, 2008, Pages 289-306

Formal affordance-based models of computer virus reproduction

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SOFTWARE; COMPUTER VIRUSES; DYNAMIC ANALYSIS; ECOLOGY; MICROORGANISMS; VIRUSES;

EID: 54849422083     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-007-0079-4     Document Type: Article
Times cited : (1)

References (40)
  • 1
    • 84952737129 scopus 로고
    • An abstract theory of computer viruses
    • Advances in Cryptology-CRYPTO '88
    • Adleman, L.M.: An abstract theory of computer viruses. In: Advances in Cryptology-CRYPTO '88. Lecture Notes in Computer Science, vol. 403, pp. 354-374 (1990)
    • (1990) Lecture Notes in Computer Science , vol.403 , pp. 354-374
    • Adleman, L.M.1
  • 3
    • 33746879580 scopus 로고    scopus 로고
    • On abstract computer virology: From a recursion-theoretic perspective
    • 3-4
    • G. Bonfante M. Kaczmarek J.-Y. Marion 2006 On abstract computer virology: from a recursion-theoretic perspective J. Comput. Virol. 1 3-4 45 54
    • (2006) J. Comput. Virol. , vol.1 , pp. 45-54
    • Bonfante, G.1    Kaczmarek, M.2    Marion, J.-Y.3
  • 4
    • 38049038870 scopus 로고    scopus 로고
    • A classification of viruses through recursion theorems
    • Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007 . Springer, Berlin
    • Bonfante, G., Kaczmarek, M., Marion, J.-Y.: A classification of viruses through recursion theorems. In: Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007. Lecture Notes in Computer Science, vol. 4497. Springer, Berlin (2007)
    • (2007) Lecture Notes in Computer Science , vol.4497
    • Bonfante, G.1    Kaczmarek, M.2    Marion, J.-Y.3
  • 5
    • 54849432819 scopus 로고    scopus 로고
    • Digital genome mapping-advanced binary malware analysis
    • Carrera, E., Erdélyi, G.: Digital genome mapping-advanced binary malware analysis. In: Virus Bulletin Conference (2004)
    • (2004) Virus Bulletin Conference
    • Carrera, E.1    Erdélyi, G.2
  • 7
    • 0023294949 scopus 로고
    • Computer viruses-theory and experiments
    • 1
    • F. Cohen 1987 Computer viruses-theory and experiments Comput. Secur. 6 1 22 35
    • (1987) Comput. Secur. , vol.6 , pp. 22-35
    • Cohen, F.1
  • 8
    • 0024682488 scopus 로고
    • Computational aspects of computer viruses
    • F. Cohen 1989 Computational aspects of computer viruses Comput. Secur. 8 325 344
    • (1989) Comput. Secur. , vol.8 , pp. 325-344
    • Cohen, F.1
  • 12
    • 33947585353 scopus 로고    scopus 로고
    • Evaluation methodology and theoretical model for antiviral behavioural detection strategies
    • E. Filiol G. Jacob M.L. Liard 2007 Evaluation methodology and theoretical model for antiviral behavioural detection strategies J. Comput. Virol. 3 23 37
    • (2007) J. Comput. Virol. , vol.3 , pp. 23-37
    • Filiol, E.1    Jacob, G.2    Liard, M.L.3
  • 18
    • 54849422477 scopus 로고    scopus 로고
    • Virus and vulnerability classification schemes: Standards and integration
    • Accessed 28 Oct 2007
    • Gordon, S.: Virus and vulnerability classification schemes: Standards and integration. Symantec Security Response White Paper (2003). http://www.symantec.com/avcenter/reference/virus.and.vulnerability.pdf.. Accessed 28 Oct 2007
    • (2003) Symantec Security Response White Paper
    • Gordon, S.1
  • 19
    • 54849427554 scopus 로고    scopus 로고
    • SANA-security analysis in internet traffic through artificial immune systems
    • Autexier, S., Merz, S., van der Torre, L., Wilhelm, R., Wolper, P. (eds.) . IBFI, Schloss Dagstuhl, Germany
    • Hilker, M., Schommer, C.: SANA-security analysis in internet traffic through artificial immune systems. In: Autexier, S., Merz, S., van der Torre, L., Wilhelm, R., Wolper, P. (eds.) Workshop "Trustworthy Software" 2006. IBFI, Schloss Dagstuhl, Germany (2006)
    • (2006) Workshop "trustworthy Software" 2006
    • Hilker, M.1    Schommer, C.2
  • 24
    • 54849427351 scopus 로고    scopus 로고
    • The common malware enumeration initiative
    • September
    • Kuo, J., Beck, D.: The common malware enumeration initiative. Virus Bull. September, 14-15 (2005)
    • (2005) Virus Bull. , pp. 14-15
    • Kuo, J.1    Beck, D.2
  • 25
    • 33947139569 scopus 로고    scopus 로고
    • The rewriting logic semantics project
    • 3
    • J. Meseguer G. Roşu 2007 The rewriting logic semantics project Theor. Comput. Sci. 373 3 213 237
    • (2007) Theor. Comput. Sci. , vol.373 , pp. 213-237
    • Meseguer, J.1    Roşu, G.2
  • 30
    • 0012068216 scopus 로고
    • Computer viruses as artificial life
    • 3
    • E.H. Spafford 1994 Computer viruses as artificial life J. Artif. Life 1 3 249 265
    • (1994) J. Artif. Life , vol.1 , pp. 249-265
    • Spafford, E.H.1
  • 32
    • 4444372374 scopus 로고    scopus 로고
    • PhD thesis, University of Edinburgh Accessed 28 Oct 2007
    • Taylor, T.J.: From Artificial Evolution to Artificial Life. PhD thesis, University of Edinburgh (1999). http://www.tim-taylor.com/papers/thesis/. Accessed 28 Oct 2007
    • (1999) From Artificial Evolution to Artificial Life
    • Taylor, T.J.1
  • 33
    • 33750436929 scopus 로고    scopus 로고
    • About malicious software in smartphones
    • 2
    • S. Töyssy M. Helenius 2006 About malicious software in smartphones J. Comput. Virol. 2 2 109 119
    • (2006) J. Comput. Virol. , vol.2 , pp. 109-119
    • Töyssy, S.1    Helenius, M.2
  • 35
    • 54849434905 scopus 로고    scopus 로고
    • Reproducer classification using the theory of affordances: Models and examples
    • Webster, M., Malcolm, G.: Reproducer classification using the theory of affordances: Models and examples. Int. J. Inf. Technol. Intell. Comput. 2(2) (2007)
    • (2007) Int. J. Inf. Technol. Intell. Comput. , vol.2 , Issue.2
    • Webster, M.1    Malcolm, G.2
  • 36
    • 33751196771 scopus 로고    scopus 로고
    • Detection of metamorphic computer viruses using algebraic specification
    • doi: 10.1007/s11416-006-0023-z
    • Webster, M., Malcolm, G.: Detection of metamorphic computer viruses using algebraic specification. J. Comput. Virol. 2(3), 149-161 (2006). doi: 10.1007/s11416-006-0023-z
    • (2006) J. Comput. Virol. , vol.2 , Issue.3 , pp. 149-161
    • Webster, M.1    Malcolm, G.2
  • 39
    • 34249899090 scopus 로고    scopus 로고
    • Analyzing worms and network traffic using compression
    • arXiv:cs/ 0504045v1 [cs.CR]
    • Wehner, S.: Analyzing worms and network traffic using compression. J. Comput. Secur. 15(3), 303-320 (2007). arXiv:cs/ 0504045v1 [cs.CR]
    • (2007) J. Comput. Secur. , vol.15 , Issue.3 , pp. 303-320
    • Wehner, S.1
  • 40
    • 33750358907 scopus 로고    scopus 로고
    • Malicious actions against the GPRS technology
    • Xenakis, C.: Malicious actions against the GPRS technology. J. Comput. Virol. 2(2) (2006)
    • (2006) J. Comput. Virol. , vol.2 , Issue.2
    • Xenakis, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.