1. Davida GI, Desmedt YG, Matt BJ (1989) Defending systems against viruses through cryptographic authentication. In: Proceedings 1989 IEEE symposium on security and privacy, May 1989. Oakland, CA, pp 312–318
2. Hoffman LJ (ed) (1990) Rogue programs: viruses, worms and trojan horses. Van Nostrand Reinhold, New York
3. Pozzo MM, Gray TE (1987) An approach to containing viruses. Comput Secur 6(4):321–331
4. White SR (2000) Virus bulletin 2010: a retrospective. In: International virus bulletin conference. Orlando, FL
5. White SR, Swimmer M, Pring EJ, Arnold WC, Chess DM, Morar JF (1999) Anatomy of a commercial-grade immune system. In: International virus bulletin conference. Vancouver, Canada