메뉴 건너뛰기




Volumn 6, Issue 2, 2010, Pages 105-114

A general definition of malware

Author keywords

[No Author keywords available]

Indexed keywords

ANTI-MALWARE; FORMAL DEFINITION; MALICIOUS SOFTWARE; MALWARES; MEDICAL SOFTWARE; MODAL LOGIC;

EID: 77955088380     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-009-0137-1     Document Type: Article
Times cited : (51)

References (33)
  • 6
    • 77955092061 scopus 로고    scopus 로고
    • European Expert Group for IT-Security
    • European Expert Group for IT-Security. http://www. eicar. org/.
  • 8
    • 77955088182 scopus 로고    scopus 로고
    • The Information Warfare Site
    • The Information Warfare Site. http://www. iwar. org. uk/.
  • 16
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • Cohen, F.: Computer viruses: Theory and experiments. J. Comput. Secur. 6 (1987).
    • (1987) J. Comput. Secur. , vol.6
    • Cohen, F.1
  • 17
    • 33746075250 scopus 로고
    • There are no safe virus tests
    • Dowling, W. F.: There are no safe virus tests. Am. Math. Mon. 96(9) (1989).
    • (1989) Am. Math. Mon. , vol.96 , Issue.9
    • Dowling, W.F.1
  • 18
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: From a survey towards an established taxonomy
    • Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4(3) (2008).
    • (2008) J. Comput. Virol. , vol.4 , Issue.3
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 20
    • 70949092698 scopus 로고    scopus 로고
    • On modal μ-calculus and non-well-founded set theory
    • Alberucci, L., Salipante, V.: On modal μ-calculus and non-well-founded set theory. J. Philos. Log. 33(4) (2004).
    • (2004) J. Philos. Log. , vol.33 , Issue.4
    • Alberucci, L.1    Salipante, V.2
  • 21
    • 33746879580 scopus 로고    scopus 로고
    • On abstract computer virology from a recursion theoretic perspective
    • Bonfante, G., Kaczmarek, M., Marion, J.-Y.: On abstract computer virology from a recursion theoretic perspective. J. Comput. Virol. 1(3-4) (2006).
    • (2006) J. Comput. Virol. , vol.1 , Issue.3-4
    • Bonfante, G.1    Kaczmarek, M.2    Marion, J.-Y.3
  • 23
    • 54849422083 scopus 로고    scopus 로고
    • Formal affordance-based models of computer virus reproduction
    • Webster, M., Malcolm, G.: Formal affordance-based models of computer virus reproduction. J. Comput. Virol. 4(4) (2008).
    • (2008) J. Comput. Virol. , vol.4 , Issue.4
    • Webster, M.1    Malcolm, G.2
  • 24
    • 12244311689 scopus 로고    scopus 로고
    • Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In Proceedings of the ACM workshop on Rapid malcode (2003).
  • 26
    • 0346969678 scopus 로고    scopus 로고
    • An efficient algorithm for computing bisimulation equivalence
    • Dovier, A., Piazza, C., Policriti, A.: An efficient algorithm for computing bisimulation equivalence. Theor. Comput. Sci. 311(1-3) (2004).
    • (2004) Theor. Comput. Sci. , vol.311 , Issue.1-3
    • Dovier, A.1    Piazza, C.2    Policriti, A.3
  • 28
    • 69549091997 scopus 로고    scopus 로고
    • On the trail of the Conficker worm
    • Lawson, G.: On the trail of the Conficker worm. Computer (2009).
    • (2009) Computer
    • Lawson, G.1
  • 29
    • 4243189286 scopus 로고    scopus 로고
    • Counterexample-guided abstraction refinement for symbolic model checking
    • Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5) (2003).
    • (2003) J. ACM , vol.50 , Issue.5
    • Clarke, E.1    Grumberg, O.2    Jha, S.3    Lu, Y.4    Veith, H.5
  • 30
    • 70349997951 scopus 로고    scopus 로고
    • Detection of metamorphic and virtualization-based malware using algebraic specification
    • Webster, M., Malcolm, G.: Detection of metamorphic and virtualization-based malware using algebraic specification. J. Comput. Virol. 5(3) (2009).
    • (2009) J. Comput. Virol. , vol.5 , Issue.3
    • Webster, M.1    Malcolm, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.