Trojan Horses, Computer Viruses and Worms.

作者: Yvo Desmedt

DOI:

关键词: Computer scienceWorld Wide WebTrojanComputer virus

摘要:

参考文章(5)
David M. Chess, John F. Morar, William C. Arnold, Steve R. White, Morton Swimmer, Edward J. Pring, Anatomy of a Commercial-Grade Immune System ,(1999)
Lance J. Hoffman, Rogue programs: viruses, worms and Trojan horses Van Nostrand Reinhold Co.. ,(1990)
Maria M. Pozzo, Terence E. Gray, An approach to containing computer viruses Computers & Security. ,vol. 6, pp. 321- 331 ,(1987) , 10.1016/0167-4048(87)90067-8
John F. Shoch, Jon A. Hupp, The “worm” programs—early experience with a distributed computation Communications of The ACM. ,vol. 25, pp. 172- 180 ,(1982) , 10.1145/358453.358455
G.I. Davida, Y.G. Desmedt, B.J. Matt, Defending systems against viruses through cryptographic authentication ieee symposium on security and privacy. pp. 312- 318 ,(1989) , 10.1109/SECPRI.1989.36305