Computer viruses: theory and experiments
Computers and Security
An abstract theory of computer viruses
Rogue programs: viruses, worms and Trojan horses
How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Prophylaxis for “virus” propagation and general computer security policy
ACM SIGSAC Review
A short course on computer viruses (2nd ed.)
A short course on computer viruses (2nd ed.)
A survey of intrusion detection techniques
Computers and Security
Computer Virus Handbook
A Neural Network Component for an Intrusion Detection System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Hi-index | 0.24 |
Computer viruses, worms and Trojan horses pose the most severe intrusion threat against an automated environment, especially if this environment is distributed and the ability to enforce physical access control is very limited. These structures are also collectively referred to as malicious software. In this paper, a model for viral attacks against computer networks is being developed. The soundness of the model is being tested via simulation experiments. Interesting results that can be practically useful to network administrators are being derived.