Formalisation and implementation aspects of K-ary (malicious) codes
暂无分享,去创建一个
[1] Éric Filiol. Computer Viruses: from Theory to Applications , 2005 .
[2] Christos H. Papadimitriou,et al. Computational complexity , 1993 .
[3] J. A. Bondy,et al. Basic graph theory: paths and circuits , 1996 .
[4] Diomidis Spinellis,et al. Reliable identification of bounded-length viruses is NP-complete , 2003, IEEE Trans. Inf. Theory.
[5] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[6] Éric Filiol. Techniques de reconstruction en cryptologie et theorie des codes , 2001 .
[7] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[8] Eric Filiol,et al. Metamorphism, Formal Grammars and Undecidable Code Mutation , 2007 .
[9] Carsten Thomassen,et al. Even Cycles in Directed Graphs , 1985, Eur. J. Comb..
[10] R. Graham,et al. Handbook of Combinatorics , 1995 .
[11] David de Drézigué,et al. In-depth analysis of the viral threats with OpenOffice.org documents , 2006, Journal in Computer Virology.
[12] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[13] Mingtian Zhou,et al. Some Further Theoretical Results about Computer Viruses , 2004, Comput. J..
[14] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.