Proceedings of the 2nd IFIP international conference on Computer security: a global challenge
Computer viruses: theory and experiments
Computers and Security
An approach to containing computer viruses
Computers and Security
Recovering from a computer virus attack
Journal of Systems and Software
The application of epidemiology to computer viruses
Computers and Security
Are we vulnerable to a virus attack? A report from Sweden
Computers and Security
How to combat a computer virus
Computers and Security
Computers and Security
The BRAIN virus: fact and fantasy
Computers and Security
The “worm” programs—early experience with a distributed computation
Communications of the ACM
Security, Accuracy, and Privacy in Computer Systems
Security, Accuracy, and Privacy in Computer Systems
Use of virus functions to provide a virtual APL interpreter under user control
APL '84 Proceedings of the international conference on APL
Data Privacy in Tuple Space Based Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
"Computer viruses" have received a lot of attention lately. In fact, the best-known "viruses" have not been viruses at all, but "worms," programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing their spread. But that is only one tack you can take. Preventing or limiting the effect of the harm that their components can cause is another. Still other measures are specific to known viruses. Ultimately, though, there is no defense better than a comprehensive security strategy that embraces user education, crisis-response teams, and technologically sound security measures including, but not limited to, those that relate specifically to the threats posed by viruses and worms.