Trojan Horses, Computer Viruses, and Worms
暂无分享,去创建一个
[1] L. J. Hoffman. Rogue programs: viruses, worms and Trojan horses , 1990 .
[2] Steve R. White,et al. Anatomy of a Commercial-Grade Immune System , 1999 .
[3] John F. Shoch,et al. The “worm” programs—early experience with a distributed computation , 1982, CACM.
[4] Maria M. Pozzo,et al. An approach to containing computer viruses , 1987, Comput. Secur..
[5] Yvo Desmedt,et al. Defending systems against viruses through cryptographic authentication , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.