A Framework for Modelling Trojans and Computer Virus Infection
暂无分享,去创建一个
[1] Peter Henderson. Functional Programming , 1980 .
[2] Richard Rhodes,et al. Chain mail , 1994, Nature.
[3] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[4] A. Fleischmann. Distributed Systems , 1994, Springer Berlin Heidelberg.
[5] Eugene H. Spafford,et al. Computer Viruses as Artificial Life , 1994, Artificial Life.
[6] Richard Dawkins,et al. The 'St Jude' mind virus , 1994, Nature.
[7] Peter Schrag,et al. Mind Control , 1978 .
[8] Chris Langton,et al. Artificial Life , 2017, Encyclopedia of Machine Learning and Data Mining.
[9] Richard J. Lipton,et al. New Directions In Testing , 1989, Distributed Computing And Cryptography.
[10] Vesselin Bontchev. Macro virus identification problems , 1998, Comput. Secur..
[11] Harold W. Thimbleby,et al. Liveware: A New Approach to Sharing Data in Social Networks , 1991, Int. J. Man Mach. Stud..
[12] Steve R. White,et al. Fighting Computer Viruses , 1997 .
[13] Harold W. Thimbleby,et al. Optimising Self-Replicating Programs , 1987, Comput. J..
[14] Carolyn P. Meinel. How Hackers Break In. . . and how they are Caught , 1998 .
[15] R. Lewontin. ‘The Selfish Gene’ , 1977, Nature.
[16] H. Jane Brockmann,et al. The selfish gene (2nd edn) , 1990 .
[17] David Ferbrache,et al. A pathology of computer viruses , 1991 .
[18] Leonard M. Adleman,et al. An Abstract Theory of Computer Viruses , 1988, CRYPTO.
[19] Helen Meye,et al. How hackers break in… and how they are caught , 1998 .
[20] L. J. Hoffman. Rogue programs: viruses, worms and Trojan horses , 1990 .
[21] Marvin Minsky,et al. Computation : finite and infinite machines , 2016 .
[22] Kenneth Stevens. Mind control , 1994, Nature.
[23] Warren Bower. New directions , 1937 .
[24] Jeffrey M. Voas,et al. A model for detecting the existence of software corruption in real time , 1993, Comput. Secur..
[25] Maria M. Pozzo,et al. An approach to containing computer viruses , 1987, Comput. Secur..
[26] Philip Zimmermann,et al. PGP source code and internals , 1995 .
[27] Kimmo Kauranen,et al. A note on Cohen's formal model for computer viruses , 1990, SGSC.
[28] N. Beckage,et al. The parasitic wasp's secret weapon , 1997 .
[29] Frederick B. Cohen,et al. A short course on computer viruses (2nd ed.) , 1994 .
[30] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[31] Harold W. Thimbleby. Controversy corner : An organizational solution to piracy and viruses , 1994, J. Syst. Softw..
[32] Peter Wegner,et al. Why interaction is more powerful than algorithms , 1997, CACM.
[33] W A GRAHAM,et al. Pest Control , 1959, Nature.
[34] Ralf Burger,et al. Computer Viruses: A High-Tech Disease , 1988 .
[35] Yasusi Kanada. Web pages that reproduce themselves by JavaScript , 1997, SIGP.
[36] J M Coffin,et al. Virology. How does variation count? , 1992, Nature.
[37] Harold W. Thimbleby,et al. Comments on a paper by Voas, Payne and Cohen: 'A model for detecting the existence of software corruption in real time' , 1994, Comput. Secur..
[38] Harold W. Thimbleby,et al. Concepts of cooperation in artificial life , 1995, IEEE Trans. Syst. Man Cybern..
[39] Maarten M. Fokkinga,et al. Expressions That Talk About Themselves , 1996, Computer/law journal.
[40] C. P. Meinel,et al. HOW HACKERS BREAK IN... , 1998 .
[41] C. Q. Lee,et al. The Computer Journal , 1958, Nature.
[42] Fred Cohen,et al. Computational aspects of computer viruses , 1989, Comput. Secur..
[43] John Race. Using computer graphics to find interesting properties in data , 1990 .
[44] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[45] K. Thompson. Reflections on trusting trust , 1984, CACM.
[46] Clinton E. White,et al. The IPM model of computer virus management , 1990, Comput. Secur..
[47] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[48] Alan M. Turing,et al. Systems of Logic Based on Ordinals , 2012, Alan Turing's Systems of Logic.
[49] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[50] David Ferbrache BSc. A Pathology of Computer Viruses , 1992, Springer London.
[51] Harold W. Thimbleby. Can viruses ever be useful? , 1991, Comput. Secur..
[52] Carey Nachenberg,et al. Computer virus-antivirus coevolution , 1997, Commun. ACM.
[53] I. Alger. New Directions in , 1988 .