💾 Archived View for spam.works › mirrors › textfiles › virus › virusbib.txt captured on 2023-06-16 at 21:05:55.
-=-=-=-=-=-=-
Ted Landberg 02/24/88 Bibliography for Computer Viruses Boebert, W. E., Kain, R.Y.; A Practical Alternative to Hierarchical Integrity Policies; Proceeding of the 8th National Computer Security Conference, Gaithersburg MD, Oct 1985 Boebert, W. E., Ferguson, C.T.; A Partial Solution to the Discretionary Trojan Horse Problem; Proceeding of the 8th National Computer Security Conference, Gaithersburg MD, Oct 1985 Cohen, Fred; Computer Viruses, Theory and Experiments; 7th Security Conference, DOD/NBS Sept 1984. Denning D. E.; Cyptography and Data Security; Addison Wesley, 1982 Denning, D. E.; An Intrusion-Detection Model; IEEE Symposium on Security and Privacy, April 1986. Dewdney, A. K.; Computer Recreations - In the game called Core War hostile programs engage in a battle of bits; Scientific American; Mar 1984. Dewdney, A. K.; Computer Recreations - A Core War bestiary of viruses, worms and other threats to computer memories; Scientific American; Mar 1985. Dvorak, John; Virus Wars: A Serious Warning; PC Magazine; Feb 29, 1988. Gilgor, V.D.; On the Design and the Implementation of Secure Xenix Workstation; IEEE Symposium on Security and Privacy, April 1987. Grampp, F.T. and Morris, R. H.; UNIX Operating System Security; AT&T Bell Laboroatories Technical Journal, Oct 1984. Harrison, M.A. and Ruzzo, W.L.; Protection in Operating Systems; Comm of the ACM, Aug 1976. Highland, Harold J.; From the Editor -- Computer Viruses; Computers & Security; Aug 1987. Israel, Howard; Computer Viruses: Myth or Reality ?; Proceeding of the 10th National Computer Security Conference, Gaithersburg MD, Sept 1987. Computer Virus Bibliography Joseph, Mark K.; Toward the Elimination of the Effects of Malicious Logic: Fault Tolerance Approaches; Proceeding of the 10th National Computer Security Conference, Gaithersburg MD, Sept 1987 Karser, Paul A.; Limiting the Damage Potential of Discretionary Trojan Horses; Proceedings of the Symposium on Security and Privacy 1987; Oakland CA, Published by the IEEE. Lapid, Ahituv, and Newmann; Approaches to Handing 'Trojan Horse' Threats; Computer & Security; Sept 1986. McLellan, Vin; Computer Systems Under Siege; The New York Times, January 31, 1988. Novitski, P.; Trojan horses (telecommunicating data files inside documents); Access 86; Oct 86. [not available] Parker, T.; Public domain software review: Trojans revisited, CROBOTS, and ATC; Computer Language; April 1987. Pozzo, M.M., Gray, T.E.; An approach to containing computer viruses; Computer & Security, Aug 1987. Pozza, M.M., Gray, T.E.; Managing Exposure to Potentially Malicious Rograms; Proceeding of the 9th National Computer Security Conference, Gaithersburg MD, Sept 1986. Reeds, J. A. and Weinberger, P. J.; File Security and the UNIX Systems Crypt Command; AT&T Bell Laboratories Journal, Oct 1984 Reid, T. R.; Fending Off a 'Computer Virus' Means Taking Only a Few Precautions; Washington Post, Feb 15, 1988. Rivers, Angel; Collection of published and unpublished newspaper articles and reference materials about Computer Viruses; IRS, 1987. Rutz, Frank; DOD Fights Off Computer Virus; Government Computer News; Feb 5, 1988. Shoch, J.F and Hupp, J.A.; The 'Worm' Programs: Early Experience with a Distributed Computation. Comm of ACM, Mar 1982. Stoll, Cliff; What do you Reed a Trojan Horse; Proceeding of the 10th National Computer Security Conference, Gaithersburg MD, Sept 1985 Computer Virus Bibliography Thompson, K.; Reflections on Trusting Trust (Deliberate Software Bugs); Communications of the ACM, Aug 1984. Witten, I. H.; Computer (In)security: infiltrating open systems; Abacus (USA) Summer 1987. Young, Catherine L.; Taxonomy of Computer Virus Defense Mechanisms; Proceeding of the 10th National Computer Security Conference, Gaithersburg MD, Sept 1987. 2600 Magazine; Series of Articles on Computer Penetration techniques. . ... ...-.... 1200 N81N ........................ . ... ...-....