{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:37:25Z","timestamp":1725550645810},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291077"},{"type":"electronic","value":"9783540320722"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11560647_38","type":"book-chapter","created":{"date-parts":[[2005,10,20]],"date-time":"2005-10-20T10:04:06Z","timestamp":1129802646000},"page":"579-593","source":"Crossref","is-referenced-by-count":7,"title":["Toward an Abstract Computer Virology"],"prefix":"10.1007","author":[{"given":"G.","family":"Bonfante","sequence":"first","affiliation":[]},{"given":"M.","family":"Kaczmarek","sequence":"additional","affiliation":[]},{"given":"J. -Y.","family":"Marion","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/0-387-34799-2_28","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"L. Adleman","year":"1990","unstructured":"Adleman, L.: An abstract theory of computer viruses. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 354\u2013374. Springer, Heidelberg (1990)"},{"key":"38_CR2","unstructured":"Bishop, M.: An overview of computer viruses in a research environment. Technical report, Hanover, NH, USA (1991)"},{"key":"38_CR3","unstructured":"Chess, D., White, S.: An undetectable computer virus"},{"key":"38_CR4","unstructured":"Cohen, F.: Computer Viruses. PhD thesis, University of Southern California (January 1986)"},{"issue":"1","key":"38_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"Cohen, F.: Computer viruses: theory and experiments. Comput. Secur.\u00a06(1), 22\u201335 (1987)","journal-title":"Comput. Secur."},{"key":"38_CR6","unstructured":"Cohen, F.: Models of practical defenses against computer viruses: theory and experiments. Comput. Secur.\u00a06(1) (1987)"},{"key":"38_CR7","volume-title":"Computability and unsolvability","author":"M. Davis","year":"1958","unstructured":"Davis, M.: Computability and unsolvability. McGraw-Hill, New York (1958)"},{"key":"38_CR8","volume-title":"Les virus informatiques: th\u00e9orie, pratique et applications","author":"E. Filiol","year":"2004","unstructured":"Filiol, E.: Les virus informatiques: th\u00e9orie, pratique et applications. Springer, Heidelberg (2004)"},{"issue":"2","key":"38_CR9","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1002\/cplx.20004","volume":"9","author":"S. Goel","year":"2003","unstructured":"Goel, S., Bush, S.: Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: a comparison with traditional approaches. Complex\u00a09(2), 54\u201373 (2003)","journal-title":"Complex"},{"key":"38_CR10","first-page":"444","volume":"41","author":"S. Anderson","year":"1999","unstructured":"Anderson, S., Thimbleby, H., Cairns, P.: A framework for medelling trojans and computer virus infection. Comput. J.\u00a041, 444\u2013458 (1999)","journal-title":"Comput. J."},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Jones, N.: Computer implementation and applications of kleene\u2019s S-m-n and recursive theorems. In: Moschovakis, Y.N. (ed.) Lecture Notes in Mathematics, Logic From Computer Science, pp. 243\u2013263 (1991)","DOI":"10.1007\/978-1-4612-2822-6_9"},{"key":"38_CR12","volume-title":"Introduction to Metamathematics","author":"S.C. Kleene","year":"1964","unstructured":"Kleene, S.C.: Introduction to Metamathematics, nj edn. Van Nostrand, Princeton (1964)"},{"key":"38_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2606-0","volume-title":"An Introduction to Kolmogorov Complexity and its Application","author":"M. Li","year":"1997","unstructured":"Li, M., Vit\u00e1nyi, P.: An Introduction to Kolmogorov Complexity and its Application, 2nd edn. Springer, Heidelberg (1997)","edition":"2"},{"key":"38_CR14","unstructured":"Ludwig, M.: The Giant Black Book of Computer Viruses. American Eagle Publications (1998)"},{"key":"38_CR15","volume-title":"Classical recursion theory","author":"P. Odiffredi","year":"1989","unstructured":"Odiffredi, P.: Classical recursion theory. North-Holland, Amsterdam (1989)"},{"key":"38_CR16","volume-title":"Theory of Recursive Functions and Effective Computability","author":"H. Rogers","year":"1967","unstructured":"Rogers, H.: Theory of Recursive Functions and Effective Computability. McGraw Hill, New York (1967)"},{"key":"38_CR17","volume-title":"The Art of Computer Virus Research and Defense","author":"P. Szor","year":"2005","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)"},{"key":"38_CR18","unstructured":"Turing, A., Girard, J.-Y.: La machine de Turing. Seuil (1995)"},{"issue":"2","key":"38_CR19","first-page":"230","volume":"42","author":"A.M. Turing","year":"1936","unstructured":"Turing, A.M.: On computable numbers with an application to the entscheidungsproblem. Proc. London Mathematical Society\u00a042(2), 230\u2013265 (1936) Traduction [18]","journal-title":"Proc. London Mathematical Society"},{"key":"38_CR20","unstructured":"Uspenskii, V.A.: Enumeration operators ans the concept of program. Uspekhi Matematicheskikh Nauk\u00a011 (1956)"},{"key":"38_CR21","volume-title":"Theory of self-reproducing automata","author":"J. Neumann von","year":"1966","unstructured":"von Neumann, J., Burks, A.W.: Theory of self-reproducing automata. University of Illinois Press, Champaign (1966)"},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"Zuo, Z., Zhou, M.: Some further theorical results about computer viruses. The Computer Journal (2004)","DOI":"10.1093\/comjnl\/47.6.627"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11560647_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T07:08:09Z","timestamp":1586502489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11560647_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291077","9783540320722"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11560647_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}