home *** CD-ROM | disk | FTP | other *** search
- Ted Landberg
- 02/24/88
-
- Bibliography
- for
- Computer Viruses
-
-
- Boebert, W. E., Kain, R.Y.; A Practical Alternative to
- Hierarchical Integrity Policies; Proceeding of the 8th National
- Computer Security Conference, Gaithersburg MD, Oct 1985
-
- Boebert, W. E., Ferguson, C.T.; A Partial Solution to the
- Discretionary Trojan Horse Problem; Proceeding of the 8th
- National Computer Security Conference, Gaithersburg MD, Oct 1985
-
- Cohen, Fred; Computer Viruses, Theory and Experiments; 7th
- Security Conference, DOD/NBS Sept 1984.
-
- Denning D. E.; Cyptography and Data Security; Addison Wesley,
- 1982
-
- Denning, D. E.; An Intrusion-Detection Model; IEEE Symposium on
- Security and Privacy, April 1986.
-
- Dewdney, A. K.; Computer Recreations - In the game called Core
- War hostile programs engage in a battle of bits; Scientific
- American; Mar 1984.
-
- Dewdney, A. K.; Computer Recreations - A Core War bestiary of
- viruses, worms and other threats to computer memories; Scientific
- American; Mar 1985.
-
- Dvorak, John; Virus Wars: A Serious Warning; PC Magazine; Feb 29,
- 1988.
-
- Gilgor, V.D.; On the Design and the Implementation of Secure
- Xenix Workstation; IEEE Symposium on Security and Privacy, April
- 1987.
-
- Grampp, F.T. and Morris, R. H.; UNIX Operating System Security;
- AT&T Bell Laboroatories Technical Journal, Oct 1984.
-
- Harrison, M.A. and Ruzzo, W.L.; Protection in Operating Systems;
- Comm of the ACM, Aug 1976.
-
- Highland, Harold J.; From the Editor -- Computer Viruses;
- Computers & Security; Aug 1987.
-
- Israel, Howard; Computer Viruses: Myth or Reality ?; Proceeding
- of the 10th National Computer Security Conference, Gaithersburg
- MD, Sept 1987.
- Computer Virus
- Bibliography
-
- Joseph, Mark K.; Toward the Elimination of the Effects of
- Malicious Logic: Fault Tolerance Approaches; Proceeding of the
- 10th National Computer Security Conference, Gaithersburg MD, Sept
- 1987
-
- Karser, Paul A.; Limiting the Damage Potential of Discretionary
- Trojan Horses; Proceedings of the Symposium on Security and
- Privacy 1987; Oakland CA, Published by the IEEE.
-
- Lapid, Ahituv, and Newmann; Approaches to Handing 'Trojan Horse'
- Threats; Computer & Security; Sept 1986.
-
- McLellan, Vin; Computer Systems Under Siege; The New York Times,
- January 31, 1988.
-
- Novitski, P.; Trojan horses (telecommunicating data files inside
- documents); Access 86; Oct 86. [not available]
-
- Parker, T.; Public domain software review: Trojans revisited,
- CROBOTS, and ATC; Computer Language; April 1987.
-
- Pozzo, M.M., Gray, T.E.; An approach to containing computer
- viruses; Computer & Security, Aug 1987.
-
- Pozza, M.M., Gray, T.E.; Managing Exposure to Potentially
- Malicious Rograms; Proceeding of the 9th National Computer
- Security Conference, Gaithersburg MD, Sept 1986.
-
- Reeds, J. A. and Weinberger, P. J.; File Security and the UNIX
- Systems Crypt Command; AT&T Bell Laboratories Journal, Oct 1984
-
- Reid, T. R.; Fending Off a 'Computer Virus' Means Taking Only a
- Few Precautions; Washington Post, Feb 15, 1988.
-
- Rivers, Angel; Collection of published and unpublished newspaper
- articles and reference materials about Computer Viruses; IRS,
- 1987.
-
- Rutz, Frank; DOD Fights Off Computer Virus; Government Computer
- News; Feb 5, 1988.
-
- Shoch, J.F and Hupp, J.A.; The 'Worm' Programs: Early Experience
- with a Distributed Computation. Comm of ACM, Mar 1982.
-
- Stoll, Cliff; What do you Reed a Trojan Horse; Proceeding of the
- 10th National Computer Security Conference, Gaithersburg MD, Sept
- 1985
- Computer Virus
- Bibliography
-
- Thompson, K.; Reflections on Trusting Trust (Deliberate Software
- Bugs); Communications of the ACM, Aug 1984.
-
- Witten, I. H.; Computer (In)security: infiltrating open systems;
- Abacus (USA) Summer 1987.
-
- Young, Catherine L.; Taxonomy of Computer Virus Defense
- Mechanisms; Proceeding of the 10th National Computer Security
- Conference, Gaithersburg MD, Sept 1987.
-
- 2600 Magazine; Series of Articles on Computer Penetration
- techniques.
-
- . ... ...-.... 1200 N81N