Computer Viruses and Related Threats to Computer and Network Integrity
暂无分享,去创建一个
[1] Teresa F. Lunt,et al. Knowledge-based intrusion detection , 1989, [1989] Proceedings. The Annual AI Systems in Government Conference.
[2] John S. Quarterman,et al. Notable computer networks , 1986, CACM.
[3] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[4] Steve R. White,et al. Coping with computer viruses and related problems , 1990 .
[5] Maria M. Pozzo,et al. An approach to containing computer viruses , 1987, Comput. Secur..
[6] John F. Shoch,et al. The “worm” programs—early experience with a distributed computation , 1982, CACM.
[7] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[8] Fred Cohen. A cryptographic checksum for integrity protection , 1987, Comput. Secur..
[9] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.