Information Technology Reference
In-Depth Information
The authors are also grateful to Prof. Scott Craver of Binghamton University for
his valuable suggestions and insights.
References
1. Skormin V. at al.: “BASIS: A Biological Approach to System Information Security”,
Proceedings of the International Workshop Mathematical Methods, Models and
Architectures for Computer Network Security, Lecture Notes in Computer Science,
Vol. 2052, Springer Verlag (2001) 127-142
2. Tarakanov, A., Skormin, V., Sokolova, S.: Immunocomputing. Theory and Applications.
Springer-NY (2003) pp. 210
3. Skormin, V., Summerville, D., Moronski, J.: “Detecting Malicious Codes by the presence
of their Gene of Self-Replication ”, “Computer Network Security”, Lecture Notes in
Computer Science, Vol. 2776, Springer (2003)
4. Fu, K.S.: Syntactic Methods in Pattern Recognition. Academic Press Inc., NY (1974)
5. Symantec Security Response
http://securityresponse.symantec.com/avcenter/venc/data/w32.chiton.gen.html
6. Ludwig, M.A.: The Giant Black Book of Computer Viruses. 2 nd Ed., American Eagle
Publications (1998)
7. Russinovich M.E., Solomon, D.A.: “Microsoft Windows Internals, Fourth Edition:
Microsoft Windows Server 2003, Windows XP, and Windows 2000”, Microsoft Press
(2005)
8. Nebbett, G.: “Windows NT/2000 Native API Reference”, Macmillan Technical
Publishing, IN (2000)
9. Poor, H.V.: An Introduction to Signal Detection and Estimation. 2 nd Ed., Springer (1994)
10. Skormin, V., Summerville, D., Moronski, J., McGee D.: “Biological Approach to System
Information Security (BASIS): A Multi-Agent Approach to Information Security”, Lecture
Notes in Computer Science, Vol. 2691, Springer-Verlag Heidelberg (2003)
11. Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: “A Taxonomy of Computer
Worms”, Proc. ACM CCS Workshop on Rapid Malcode (October 2003)
12. Kienzle, D., Elder, M.: "Recent Worms: A Survey and Trends", Proc. ACM Workshop on
Rapid Malcode (October 2003)
13. Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools.
Addison-Wesley (1986)
14. Grune, D., Jacobs, J.H.: Parsing Techniques: A Practical Guide. Ellis Horwood (1990)
15. Whalley, I., Arnold, B., Chess, D., Morar, J., Segal, A., Swimmer, M.: An Environment
for Controlled Worm Replication and Analysis. IBM TJ Watson Research Center (Sept
2000)
16. Weaver, N., Paxton, V.: A worst case worm. 3rd Annual Workshop on Economics and
Information Security (WEIS04), May 13-14, 2004 University of Minnesota, Digital
Technology Center
17. Schechter, S.E., Smith, M.D.: “Access for Sale: A New Class of Worm”, The ACM CCS
Workshop on Rapid Malcode (WORM 2003), Washington, DC (October 2003)
18. Ellis, D.: “Worm anatomy and model”, Proc. ACM CCS Workshop on Rapid Malcode,
(October 2003)
19. Arnold, W., Tesauro, G.: Automatically Generated Win32 Heuristic Virus Detection.
Virus Bulletin Conference (2000)
 
Search WWH ::




Custom Search