Open Problems in Computer Virology
暂无分享,去创建一个
[1] Donald F. Towsley,et al. Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.
[2] Leonard M. Adleman,et al. An Abstract Theory of Computer Viruses , 1988, CRYPTO.
[3] Steve R. White,et al. An Undetectable Computer Virus , 2000 .
[4] Herbert W. Hethcote,et al. The Mathematics of Infectious Diseases , 2000, SIAM Rev..
[5] Mika Hirvensalo,et al. Introduction to Evolutionary Computing , 2002, Natural Computing Series.
[6] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] William M. Spears,et al. A unified prediction of computer virus spread in connected networks , 2002 .
[8] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Michael T. Goodrich,et al. Parallel algorithms column 1: models of computation , 1993, SIGA.
[10] Michael Bailey,et al. Shining Light on Dark Address Space , 2001 .
[11] Richard Ford,et al. Suppressing the Spread of Email Malcode using Short-term Message Recall , 2005, Journal in Computer Virology.
[12] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[13] Weibo Gong,et al. Email Virus Propagation Modeling and Analysis , 2003 .
[14] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[15] Mingtian Zhou,et al. Some Further Theoretical Results about Computer Viruses , 2004, Comput. J..
[16] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[17] Y. Radai. Checksumming Techniques for Anti-Viral Purposes , 1992, IFIP Congress.
[18] Mika Hirvensalo. Quantum computing, Second Edition , 2004, Natural computing series.
[19] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[21] Eric Chien,et al. BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .
[22] Matthew C. Elder,et al. On computer viral infection and the effect of immunization , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[23] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[24] Ingo Wegener,et al. Complexity Theory , 2005 .
[25] Giuseppe Serazzi,et al. Computer Virus Propagation Models , 2003, MASCOTS Tutorials.
[26] Andrew Walenstein,et al. Malware phylogeny generation using permutations of code , 2005, Journal in Computer Virology.
[27] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[28] Neil D. Jones,et al. Computability and complexity - from a programming perspective , 1997, Foundations of computing series.
[29] Jr. Hartley Rogers. Theory of Recursive Functions and Effective Computability , 1969 .
[30] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[31] John F. Morar,et al. An environment for controlled worm replication and analysis , 2000 .
[32] Eric Allender,et al. Complexity Theory , 1997, Encyclopedia of Cryptography and Security.
[33] Steve R. White,et al. Open Problems in Computer Virus Research , 1998 .
[34] Éric Filiol. Computer Viruses: from Theory to Applications , 2005 .
[35] Daniel Reynaud-Plantey. New threats of Java viruses , 2005, Journal in Computer Virology.
[36] Guillaume Bonfante,et al. Toward an Abstract Computer Virology , 2005, ICTAC.
[37] Cynthia A. Phillips,et al. Constructing Computer Virus Phylogenies , 1996, CPM.
[38] Zhi-hong Zuo,et al. On the time complexity of computer viruses , 2005, IEEE Transactions on Information Theory.
[39] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[40] Klaus Brunnstein. From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour , 1999 .
[41] Diomidis Spinellis,et al. Reliable identification of bounded-length viruses is NP-complete , 2003, IEEE Trans. Inf. Theory.
[42] Jun Xu,et al. WORM vs. WORM: preliminary study of an active counter-attack mechanism , 2004, WORM '04.
[43] Guillaume Bonfante,et al. On Abstract Computer Virology from a Recursion Theoretic Perspective , 2006, Journal in Computer Virology.
[44] Eugene H. Spafford,et al. Crisis and aftermath , 1989, Commun. ACM.