[ Pobierz całość w formacie PDF ]

On-line]. Available: http://bilbo.isu.edu/security/isl/threat.html.
Bontchev, V. (1996). Possible macro virus attacks and how to prevent them,
Proceedings of the Sixth International Virus Bulletin Conference, 97-127.
Branigan, S. (1998). Risks with web programming technologies. Proceedings of the
EICAR  98 Conference on Web-Safety.
Cohen, F. (1994). A short course on computer viruses (2nd edition). Wiley & Sons.
Chess, D. (1997). Mushy mutating macros, antivirus online, Volume 2, Issue 3 [On-line].
Available: http://www.av.ibm.com/2-3/Feature2.
DeGroot, P. (1998). New BIOS virus puts PC hardware at risk. Computing Canada, Aug
17, 1998, Willowdale.
Denning, P. (1990). Computers under attack: Intruders, worms, and viruses. Addison-
Wesley.
Gordon, S. (1994). IRC and security -- can the two co-exist? Network Security
Magazine, October, 1994, Elsevier Advanced Technology, Oxford, UK.
Gordon, S. (1995). Technologically enabled crime: shifting paradigms for the year 2000,
Computers and Security Journal, October 1995.
Gordon S. (1998). The worm has turned. Virus Bulletin, August 1998, 10-12.
Gordon S., & Chess D. (1998). Where there s smoke, there s mirrors: the truth about
Trojans on the internet. Proceedings of the Eighth International Virus Bulletin
Conference, 183-204.
Gordon S., Ford R., & Wells J. (1997). Hoaxes and hype. Proceedings of the Seventh
International Virus Bulletin Conference, 49-66.
Gryaznov D. (1998). Viruses in the Usenet. Proceedings of IVPC  98: Protecting the
Workplace of the Future.
Muttick, I. (1998). Trojans  The new threat? Proceedings of IVPC  98: Protecting the
Workplace of the Future.
Microsoft (1997). Office 97 delivers business value and reduced cost of ownership. [On-
line]. Available:
http://www.windows.com/office/office97/documents/tco/default.htm.
27
EICAR Proceedings 1999
Morar J., & Chess D. (1998). Web browsers  threat or menace? Proceedings of the
Eighth International Virus Bulletin Conference, 99-122.
Nachenberg, C. (1997). Anti-virus technology in the 21st century. Proceedings of the
Seventh International Virus Bulletin Conference, 253-272.
Newhouse, E. (1988). The dirty dozen - an uploaded program alert list, Issue #8
[On-line]. Available: http://www.spiritweb.org/KeelyNet/PD/virus.asc.html.
Rosenberger, R. (1998). Misconceptions: Viruses on America Online. [On-line].
Available: http://kumite.com/myths/myths/aol.htm.
Spafford, E.H. (1989). The internet worm program: an analysis. ACM Computer
Communication Review, 19(1), 17-57.
Szor, P. (1998). Attacks on Win32. Proceedings of the Eighth International Virus
Bulletin Conference, 57-84.
Trilling, S., & Nachenberg, C. (1998). Incremental virus signature updates. Proceedings
of the Eighth International Virus Bulletin Conference, 301-309.
White, S. (1997). Private communication.
White, S., Kephart J., & Chess, D. (1996). The changing ecology of computer viruses.
Proceedings of the Sixth International Virus Bulletin Conference, 189-202.
Wired (1998). [On-line]. Available:
http://www.wired.com/news/news/technology/story/15432.html.
28 [ Pobierz całość w formacie PDF ]