-
1
-
-
84952737129
-
An abstract theory of computer viruses
-
Advances in Cryptology-CRYPTO '88
-
Adleman, L.M.: An abstract theory of computer viruses. In: Advances in Cryptology-CRYPTO '88. Lecture Notes in Computer Science, vol. 403, pp. 354-374 (1990)
-
(1990)
Lecture Notes in Computer Science
, vol.403
, pp. 354-374
-
-
Adleman, L.M.1
-
2
-
-
58149084148
-
-
Technical Report CSE-TR-530-07, Department of Electrical Engineering and Computer Science, University of Michigan
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. Technical Report CSE-TR-530-07, Department of Electrical Engineering and Computer Science, University of Michigan (2007)
-
(2007)
Automated Classification and Analysis of Internet Malware
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
3
-
-
33746879580
-
On abstract computer virology: From a recursion-theoretic perspective
-
3-4
-
G. Bonfante M. Kaczmarek J.-Y. Marion 2006 On abstract computer virology: from a recursion-theoretic perspective J. Comput. Virol. 1 3-4 45 54
-
(2006)
J. Comput. Virol.
, vol.1
, pp. 45-54
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
4
-
-
38049038870
-
A classification of viruses through recursion theorems
-
Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007 . Springer, Berlin
-
Bonfante, G., Kaczmarek, M., Marion, J.-Y.: A classification of viruses through recursion theorems. In: Cooper, S.B., Löwe, B., Sorbi, A. (eds.) CiE 2007. Lecture Notes in Computer Science, vol. 4497. Springer, Berlin (2007)
-
(2007)
Lecture Notes in Computer Science
, vol.4497
-
-
Bonfante, G.1
Kaczmarek, M.2
Marion, J.-Y.3
-
5
-
-
54849432819
-
Digital genome mapping-advanced binary malware analysis
-
Carrera, E., Erdélyi, G.: Digital genome mapping-advanced binary malware analysis. In: Virus Bulletin Conference (2004)
-
(2004)
Virus Bulletin Conference
-
-
Carrera, E.1
Erdélyi, G.2
-
7
-
-
0023294949
-
Computer viruses-theory and experiments
-
1
-
F. Cohen 1987 Computer viruses-theory and experiments Comput. Secur. 6 1 22 35
-
(1987)
Comput. Secur.
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
8
-
-
0024682488
-
Computational aspects of computer viruses
-
F. Cohen 1989 Computational aspects of computer viruses Comput. Secur. 8 325 344
-
(1989)
Comput. Secur.
, vol.8
, pp. 325-344
-
-
Cohen, F.1
-
12
-
-
33947585353
-
Evaluation methodology and theoretical model for antiviral behavioural detection strategies
-
E. Filiol G. Jacob M.L. Liard 2007 Evaluation methodology and theoretical model for antiviral behavioural detection strategies J. Comput. Virol. 3 23 37
-
(2007)
J. Comput. Virol.
, vol.3
, pp. 23-37
-
-
Filiol, E.1
Jacob, G.2
Liard, M.L.3
-
16
-
-
0003347217
-
Introducing OBJ
-
Goguen, J.A., Malcolm, G. (eds.) . Kluwer, Dordrecht. ISBN 0792377575
-
Goguen, J.A., Walker, T., Meseguer, J., Futatsugi, K., Jouannaud, J.-P.L: Introducing OBJ. In: Goguen, J.A., Malcolm, G. (eds.) Software Engineering with OBJ: Algebraic Specification in Action. Kluwer, Dordrecht (2000). ISBN 0792377575
-
(2000)
Software Engineering with OBJ: Algebraic Specification in Action
-
-
Goguen, J.A.1
Walker, T.2
Meseguer, J.3
Futatsugi, K.4
Jouannaud, J.-P.L.5
-
18
-
-
54849422477
-
Virus and vulnerability classification schemes: Standards and integration
-
Accessed 28 Oct 2007
-
Gordon, S.: Virus and vulnerability classification schemes: Standards and integration. Symantec Security Response White Paper (2003). http://www.symantec.com/avcenter/reference/virus.and.vulnerability.pdf.. Accessed 28 Oct 2007
-
(2003)
Symantec Security Response White Paper
-
-
Gordon, S.1
-
19
-
-
54849427554
-
SANA-security analysis in internet traffic through artificial immune systems
-
Autexier, S., Merz, S., van der Torre, L., Wilhelm, R., Wolper, P. (eds.) . IBFI, Schloss Dagstuhl, Germany
-
Hilker, M., Schommer, C.: SANA-security analysis in internet traffic through artificial immune systems. In: Autexier, S., Merz, S., van der Torre, L., Wilhelm, R., Wolper, P. (eds.) Workshop "Trustworthy Software" 2006. IBFI, Schloss Dagstuhl, Germany (2006)
-
(2006)
Workshop "trustworthy Software" 2006
-
-
Hilker, M.1
Schommer, C.2
-
20
-
-
72149114206
-
Malware phylogeny using maximal pi-patterns
-
Enamul Karim, Md., Walenstein, A., Lakhotia, A.: Malware phylogeny using maximal pi-patterns. In: EICAR 2005 Conference: Best Paper Proceedings, pp. 156-174 (2005)
-
(2005)
EICAR 2005 Conference: Best Paper Proceedings
, pp. 156-174
-
-
Enamul Karim, Md.1
Walenstein, A.2
Lakhotia, A.3
-
22
-
-
0002606747
-
A biologically inspired immune system for computers
-
Brooks, R.A., Maes, P. (eds.) Artificial Life IV . MIT Press, Cambridge
-
Kephart, J.O.: A biologically inspired immune system for computers. In: Brooks, R.A., Maes, P. (eds.) Artificial Life IV, Proceedings of the Fourth International Workshop on Synthesis and Simulation of Living Systems, pp. 130-139. MIT Press, Cambridge (1994)
-
(1994)
Proceedings of the Fourth International Workshop on Synthesis and Simulation of Living Systems
, pp. 130-139
-
-
Kephart, J.O.1
-
24
-
-
54849427351
-
The common malware enumeration initiative
-
September
-
Kuo, J., Beck, D.: The common malware enumeration initiative. Virus Bull. September, 14-15 (2005)
-
(2005)
Virus Bull.
, pp. 14-15
-
-
Kuo, J.1
Beck, D.2
-
25
-
-
33947139569
-
The rewriting logic semantics project
-
3
-
J. Meseguer G. Roşu 2007 The rewriting logic semantics project Theor. Comput. Sci. 373 3 213 237
-
(2007)
Theor. Comput. Sci.
, vol.373
, pp. 213-237
-
-
Meseguer, J.1
Roşu, G.2
-
26
-
-
33750334282
-
Testing and evaluating virus detectors for handheld devices
-
Morales, J.A., Clarke, P.J., Deng, Y., Golam Kibria, B.M.: Testing and evaluating virus detectors for handheld devices. J. Comput. Virol. 2(2) (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.2
-
-
Morales, J.A.1
Clarke, P.J.2
Deng, Y.3
Golam Kibria, B.M.4
-
29
-
-
84957039800
-
Principles of a computer immune system
-
ACM Press, New York
-
Somayaji, A., Hofmeyr, S., Forrest, S.: Principles of a computer immune system. In: 1997 New Security Paradigms Workshop. ACM Press, New York (1997)
-
(1997)
1997 New Security Paradigms Workshop
-
-
Somayaji, A.1
Hofmeyr, S.2
Forrest, S.3
-
30
-
-
0012068216
-
Computer viruses as artificial life
-
3
-
E.H. Spafford 1994 Computer viruses as artificial life J. Artif. Life 1 3 249 265
-
(1994)
J. Artif. Life
, vol.1
, pp. 249-265
-
-
Spafford, E.H.1
-
32
-
-
4444372374
-
-
PhD thesis, University of Edinburgh Accessed 28 Oct 2007
-
Taylor, T.J.: From Artificial Evolution to Artificial Life. PhD thesis, University of Edinburgh (1999). http://www.tim-taylor.com/papers/thesis/. Accessed 28 Oct 2007
-
(1999)
From Artificial Evolution to Artificial Life
-
-
Taylor, T.J.1
-
33
-
-
33750436929
-
About malicious software in smartphones
-
2
-
S. Töyssy M. Helenius 2006 About malicious software in smartphones J. Comput. Virol. 2 2 109 119
-
(2006)
J. Comput. Virol.
, vol.2
, pp. 109-119
-
-
Töyssy, S.1
Helenius, M.2
-
34
-
-
12244311689
-
A taxonomy of computer worms
-
ACM Press, New York
-
Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp. 11-18. ACM Press, New York (2003)
-
(2003)
WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
35
-
-
54849434905
-
Reproducer classification using the theory of affordances: Models and examples
-
Webster, M., Malcolm, G.: Reproducer classification using the theory of affordances: Models and examples. Int. J. Inf. Technol. Intell. Comput. 2(2) (2007)
-
(2007)
Int. J. Inf. Technol. Intell. Comput.
, vol.2
, Issue.2
-
-
Webster, M.1
Malcolm, G.2
-
36
-
-
33751196771
-
Detection of metamorphic computer viruses using algebraic specification
-
doi: 10.1007/s11416-006-0023-z
-
Webster, M., Malcolm, G.: Detection of metamorphic computer viruses using algebraic specification. J. Comput. Virol. 2(3), 149-161 (2006). doi: 10.1007/s11416-006-0023-z
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.3
, pp. 149-161
-
-
Webster, M.1
Malcolm, G.2
-
39
-
-
34249899090
-
Analyzing worms and network traffic using compression
-
arXiv:cs/ 0504045v1 [cs.CR]
-
Wehner, S.: Analyzing worms and network traffic using compression. J. Comput. Secur. 15(3), 303-320 (2007). arXiv:cs/ 0504045v1 [cs.CR]
-
(2007)
J. Comput. Secur.
, vol.15
, Issue.3
, pp. 303-320
-
-
Wehner, S.1
-
40
-
-
33750358907
-
Malicious actions against the GPRS technology
-
Xenakis, C.: Malicious actions against the GPRS technology. J. Comput. Virol. 2(2) (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.2
-
-
Xenakis, C.1
|