Klaus-Peter Kossakowski: Computer-Würmer

 

Zur Person


Größere Projekte


IT Incident Response


Publikationen


PGP-Schlüssel


Impressum



Literaturverzeichnis [Campbell 1988] bis [Duff 1989]

  • [Campbell 1988] ETHICS and COMPUTER SECURITY : Cause and Effect / Campbell, M. - In: 16. Annual Computer Science Conference, CSC'88. - New York, NY: ACM Press, 1988. - S. 384-390.
  • [Carl-Mitchell, Quarterman 1992] Building Internet Firewalls / Carl-Mitchell, S.; Quarterman, J. S. - In: UNIX/WORLD. - Vol. 9, Nr. 2, Februar 1992, S. 93-102.
  • [Cerf 1989] Ethics and the Internet / Cerf, V. - In: Communications of the ACM. - Vol. 32, Nr. 6, Juni 1989, S. 710.
  • [CERT 04/1989] WANK Worm On SPAN Network / Computer Emergency Response Team. - In: CERT Advisory. - Nr. 89:04, 17. Oktober 1989.
  • [CERT 1990] Computer Emergency Response Team System (CERT System) : Operational Framework (Provisional) . - 16. November 1990.
  • [Chapman 1989] CPSR Statement on the Computer Virus / Chapman, G. - In: Communications of the ACM. - Vol. 32, Nr. 6, Juni 1989, S. 699.
  • [Cheswick 1992] An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied / Cheswick, B. - In: 5. International Computer Virus & Security Conference / Hrsg. v. Lefkon, R. G. - New York, NY, 1992. - S. 513-523.
  • [CIAC A-2 1989] The W.COM Worm affecting VAX VMS Systems / Computer Incident Advisory Capability. - In: Advisory Notice. - Nr. A-2, 16. Oktober 1989.
  • [CIAC A-3 1989] Tools available to check the spread of the WANK Worm / Computer Incident Advisory Capability. - In: Advisory Notice. - Nr. A-3, 20. Oktober 1989.
  • [CIAC A-4 1989] Information about a new version of the WANK worm / Computer Incident Advisory Capability. - In: Advisory Notice. - Nr. A-4, 30. Oktober 1989.
  • [CIAC B-7 1990] BITNET Worm / Computer Incident Advisory Capability. - In: Information Bulletin. - Nr. B-7, 5. November 1990.
  • [CIAC B-12 1991] GAME2 MODULE Worm on BITNET / Computer Incident Advisory Capability. - In: Information Bulletin. - Nr. B-12, 18. Januar 1991.
  • [Clark, Wilson 1987] A Comparison of Commercial and Military Computer Security Policies / Clark, D. D.; Wilson, D. R. - In: 1987 Symposium on Security and Privacy. - New York, NY: IEEE Computer Society, 1987. - S. 184-194.
  • [CNRI 1989] Knowbots in the Real World : Workshop on the Protection of Intellectual Property Rights in a Digital Library System. - Reston, Virginia: Corporation for National Research Initiative, 1989.
  • [Cohen 1984] Computer Viruses : Theory and Experiments / Cohen, F. - In: Rogue Programs : Viruses, Worms, and Trojan Horses / Hrsg. v. Hoffman, L. J. - New York, NY: Van Nostrand Reinhold, 1990. - S. 356-376. - [First presented at the 1984 meeting of IFIP Technical Committee II on computer security].
  • [Cohen 1986] Computer Viruses / Cohen, F. B. - Univ. of South California Dissertation . - Dezember 1986.
  • [Cohen 1992] A Case for Benevolent Viruses / Cohen, F. B. - In: 5. International Computer Virus & Security Conference / Hrsg. v. Lefkon, R. G. - New York, NY, 1992. - S. 715-726.
  • [Crawford et al. 1992] Testbed for Malicious Code Detection : A Synthesis of Static and Dynamic Analysis Techniques / Crawford, R.; Lo, R.; Crossley, J.; Fink, G.; Kerchen, P.; Ho, W.; Levitt, K.; Olsson, R.; Archer, M. - In: 5. International Computer Virus & Security Conference / Hrsg. v. Lefkon, R. G. - New York, NY, 1992. - S. 225-236.
  • [Crocker, Pozzo 1989] A Proposal for a Verification-Based Virus Filter / Crocker, S.; Pozzo, M. - In: 1989 Symposium on Security and Privacy. - New York, NY: IEEE Computer Society, 1989. - S. 319-324.
  • [Davies, Price 1989] Security for Computer Networks : An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer / Davies, D. W.; Price, W. L. - 2. Aufl. - Chichester, England: John Wiley & Sons, 1989.
  • [DDN MGT 50/1988] Worm (Benign) / DDN Network Info Center. - In: DDN Management Bulletin. - Nr. 50, 23. Dezember 1988.
  • [DDN SEC 03/1989] W.COM ( WANK ) Worm On SPAN Network / DDN Security Coordination Center. - In: DDN Security Bulletin. - Nr. 3, 18. Oktober 1989.
  • [Denning 1982] Cryptography and Data Security / Denning, D. E. - Reading, Mass.: Addison-Wesley, 1982.
  • [Denning 1987] An Intrusion-detection Model / Denning, D. E. - Nachdruck aus: IEEE Transactions on Software Engineering, 1987. - In: Advances in Computer System Security, Volume III / Hrsg. v. Turn, R. - Dedham, Mass.: Artech House, 1988. - S. 76-86.
  • [Denning et al. 1987] Social Aspects of Computer Security / Denning, D. E.; Neumann, P. G.; Parker, D. B. - Nachdruck aus: 10. National Computer Security Conference, 1987. - In: Advances in Computer System Security, Volume III / Hrsg. v. Turn, R. - Dedham, Mass.: Artech House, 1988. - S. 87-92.
  • [Denning 1990] Computers Under Attack / Hrsg. v. Denning, P. J. - Reading, Mass.: Addison-Wesley, 1990.
  • [Denning 1990a] The Internet Worm / Denning, P. J. - In: Computers Under Attack / Hrsg. v. Denning, P. J. - Reading, Mass.: Addison-Wesley, 1990. - S. 193-200.
[Zurück zum Anfang]
  • [Denning 1990b] Computer Viruses / Denning, P. J. - In: Computers Under Attack / Hrsg. v. Denning, P. J. - Reading, Mass.: Addison-Wesley, 1990. - S. 285-292.
  • [Denning 1990c] Sending a Signal / Denning, P. J. - In: Communications of the ACM. - Vol. 33, Nr. 8, August 1990, S. 11+13.
  • [Desmedt 1987] Is there an ultimate use of cryptography? / Desmedt, Y. G. - In: Advances in Cryptology, Crypto'86, 1986 / Hrsg. v. Odlyzko, A. - Berlin: Springer, 1987. - S. 459-463.
  • [Desmedt 1991] The Next Generation of Computer Threats / Desmedt, Y. G. - In: 4. Annual Computer Virus & Security Conference / Hrsg. v. Lefkon, R. G. - New York, NY, 1991. - S. 596-607.
  • [DFN 1992] CERT im DFN / DFN-Verein. - Beschränkte Ausschreibung mit Anforderungsbeschreibung eines DFN-Projektes CERT im DFN vom 17. Juli 1992.
  • [Dierstein 1985] Computer-Viren : Wie sieht ein Programm-Virus aus und was bewirkt es? / Dierstein, R. - In: KES. - Vol. 1, Nr. 3, 1985, S. 77-86.
  • [Dierstein 1985a] Computer-Viren : Gegenmaßnahmen / Dierstein, R. - In: KES. - Vol. 1, Nr. 4, 1985, S. 125-136.
  • [Dierstein 1990] Das Panama- oder AIDS-Programm / Dierstein, R. - In: KES. - Vol. 6, Nr. 1, 1990, S. 4-14.
  • [Dierstein 1990a] Viren als Aprilscherz / Dierstein, R. - In: KES. - Vol. 6, Nr. 2, 1990, S. 98-100.
  • [Droms 1988] The Knowbot Information Service / Droms, R. - Internet Draft, Dezember 1988.
  • [Duff 1989] Experience with Viruses on UNIX Systems / Duff, T. - In: Computing Systems. - Vol. 2, Nr. 2, Frühling 1989, S. 155-171.

[Zurück] [Inhaltsverzeichnis] [Weiter]


© 1998-2001 by Klaus-Peter Kossakowski, Germany.