Table of Contents
Previous Section Next Section

References

1. Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, and Steve R. White , "Blueprint for a Computer Immune System," Virus Bulletin Conference, 1997, pp. 159-173.

2. Ian Whalley , private communication, 2000.

3. Rajeev Nagar , Windows NT File System Internals, O'Reilly & Associates, Sebastopol, CA, 1996, ISBN: 1-56592-249-2.

4. Ralf Brown and Jim Kyle , PC Interrupts, Addison-Wesley, Reading, Massachusetts, 1991, ISBN: 0-201-57797-6.

5. File Formats Information, www.wotsit.org.

6. Ian Whalley , "An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box)," Virus Bulletin Conference, 2000, pp. 77-100.

7. Nmap ( "Network Mapper"), http://www.insecure.org/nmap/.

8. Costin Raiu , private communication, 2004.

9. Eugene Suslikov , HIEW, http://www.serje.net/sen/.

10. Matt Pietrek's home page, http://www.wheaty.net.

11. Neil J. Rubenking , "Stay In Control," PC Magazine, http://www.pcmag.com/article2/0,1759,25475,00.asp.

12. Joe Wells , Documentation of the Smart-Goat Files, 1993.

13. Pavel Baudis , private communication, 1997.

14. Ed Skoudis with Lenny Zeltser , Malware: Fighting Malicious Code, Prentice Hall, Upper Saddle River, New Jersey, 2004, ISBN: 0-13-101405-6.

15. Dr. Klaus Brunnstein, Simone Fischer-Hubner, and Morton Swimmer , "Concepts of an Expert System for Computer Virus Detection," IFIP TC-11, 1991.

16. Chris Eagle , IDA-X86emu, http://sourceforge.net/projects/ida-x86emu.

17. Vesselin Bontchev , "Analysis and Maintenance of a Clean Virus Library," Virus Bulletin Conference, 1993, pp. 77-89.

18. Jeffrey O. Kephart, Gregory B. Sorkin, William C. Arnold, David M. Chess, Gerald J. Tesauro, and Steve R. White , "Biologically Inspired Defenses Against Computer Viruses," IJCAI, August 1995, pp. 985-996.

19. Jean-Michel Boulay , private communication, 2004.

20. Ferenc Leitold , "Automatic Virus Analyser System," Virus Bulletin Conference, 1995, pp. 99-108.

21. Marko Helenius , "Automatic and Controlled Virus Code Execution System," EICAR, 1995, pp. T3, 13-21.

22. Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, and John F. Morar , "Anatomy of a Commercial-Grade Immune System," Virus Bulletin Conference, 1999, pp. 203228.

23. Jeffrey O. Kephart and William C. Arnold , "Automatic Extraction of Computer Virus Signatures," Virus Bulletin Conference, 1994, pp. 178-184.

    Table of Contents
    Previous Section Next Section