Author:
Katsikas S. K.,Gritzalis D.,Spirakis P.
Reference13 articles.
1. Adleman, L. (1990) An abstract theory of computer viruses, in Hoffman L. (Ed.), Rogue
2. Programmes: Viruses, Worms and Trojan Horses Van Nostrand, pp. 307–323.
3. Cohen, F. (1987) Computer viruses: Theory and experiments, Computers & Security, Vol. 6, no. 1, pp. 22–35.
4. Cohen, F. (1989) Computational aspects of computer viruses, Computers & Security, Vol. 8, no 4, pp. 325–344.
5. Denning, D. (1987) An intrusion-detection model, in IEEE Transactions on Software Engineering, Vol. SE-13, pp. 222–232.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cyber threat modeling and validation;Proceedings of the 7th Symposium on Hot Topics in the Science of Security;2020-08-25
2. Smart card technology for deploying a secure information management framework;Information Management & Computer Security;2000-10-01