1. D. Chess and W. Arnold, Method for Detecting Undesired Alteration of Software, IBM Techn. Disclosure Bull., in press.
2. Computer Viruses: Theory and Experiments;Cohen;Comput. & Security,1987
3. A Cryptographic Checksum for Integrity Protection;Cohen;Comput. & Security,1987
4. M.W. Eichlin and J.A. Rochlis, With Microscope and Tweezers: An Analysis of the Internet Virus of Novemver 1988, MIT Technical Report; to appear at the 1989 IEEE Symposium on Research in Security and Privacy.