{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:29:05Z","timestamp":1725467345072},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540617235"},{"type":"electronic","value":"9783540706687"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61723-x_964","type":"book-chapter","created":{"date-parts":[[2006,7,12]],"date-time":"2006-07-12T10:34:58Z","timestamp":1152700498000},"page":"1-11","source":"Crossref","is-referenced-by-count":3,"title":["Computational brittleness and the evolution of computer viruses"],"prefix":"10.1007","author":[{"given":"Paul-Michael","family":"Agapow","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,7,11]]},"reference":[{"key":"1_CR1","first-page":"354","volume-title":"An abstract theory of computer viruses","author":"L. M. Adleman","year":"1990","unstructured":"L. M. Adleman. An abstract theory of computer viruses. In S. Goldwasser, editor, Lecture Notes in Computer Science 403: Advances in Cryptography \u2014 CRYPTO '88 Proceedings, pages 354\u2013374, New York, 1990. Springer-Verlag."},{"key":"1_CR2","first-page":"46","volume-title":"Complex Systems: From Biology to Computation","author":"P.-M. Agapow","year":"1993","unstructured":"P.-M. Agapow. Computer viruses: the inevitability of evolution? In D. Green and T. Bossomaier, editors, Complex Systems: From Biology to Computation, pages 46\u201354, Amsterdam, 1993. Ios Press."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"P.-M. Agapow. Computational brittleness and evolution in machine language, 1996. To be presented at Complexity 96, Albury, July 1996.","DOI":"10.1007\/3-540-61723-X_964"},{"key":"1_CR4","volume-title":"Biology","author":"K. Arms","year":"1979","unstructured":"K. Arms and P. S. Camp. Biology. Holt, Reinhard and Winston, New York, 1979."},{"issue":"2","key":"1_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/64.73812","volume":"6","author":"R. K. Belew","year":"1991","unstructured":"R. K. Belew. Alife-2: The second Artificial Life conference. IEEE Expert, 6(2):53\u201359, Apr. 1991.","journal-title":"IEEE Expert"},{"key":"1_CR6","unstructured":"M. Bishop. An overview of computer viruses in a research environment. Technical report, Department of Mathematics and Computer Science, Dartmouth College, 1990."},{"key":"1_CR7","volume-title":"Evolution as Entropy","author":"D. Brooks","year":"1988","unstructured":"D. Brooks and E. Wiley. Evolution as Entropy. University of Chicago Press, Chicago, 1988."},{"key":"1_CR8","volume-title":"Computer Viruses \u2014 a High Tech Disease","author":"R. Burger","year":"1988","unstructured":"R. Burger. Computer Viruses \u2014 a High Tech Disease. Abacus Software, San Francisco, 1988."},{"issue":"1","key":"1_CR9","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"F. Cohen. Computer viruses: Theory and experiment. Computers & Security, 6(1):22\u201335, 1987.","journal-title":"Computers & Security"},{"issue":"2","key":"1_CR10","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0167-4048(88)90334-3","volume":"7","author":"F. Cohen","year":"1988","unstructured":"F. Cohen. On the implications of computer viruses and methods of defense. Computers & Security, 7(2):167\u2013184, 1988.","journal-title":"Computers & Security"},{"issue":"4","key":"1_CR11","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/0167-4048(89)90089-8","volume":"8","author":"F. Cohen","year":"1989","unstructured":"F. Cohen. Computational aspects of computer viruses. Computers & Security, 8(4):325\u2013344, 1989.","journal-title":"Computers & Security"},{"key":"1_CR12","volume-title":"A Short Course on Computer Viruses","author":"F. Cohen","year":"1990","unstructured":"F. Cohen. A Short Course on Computer Viruses. ASP Press, Pittsburgh, 1990."},{"key":"1_CR13","volume-title":"It's Alive! The New Breed of Living Computer Programs","author":"F. Cohen","year":"1995","unstructured":"F. Cohen. It's Alive! The New Breed of Living Computer Programs. John Wiley & Sons, New York, 1995."},{"issue":"5","key":"1_CR14","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/0167-4048(95)97087-Q","volume":"14","author":"R. Courtney","year":"1995","unstructured":"R. Courtney. Comment on biometrics program. Computers & Security, 14(5):373\u2013375, 1995.","journal-title":"Computers & Security"},{"issue":"41","key":"1_CR15","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1136\/bmj.297.6654.981-d","volume":"297","author":"J. Croall","year":"1988","unstructured":"J. Croall and I. C. MacKay. Computer viruses. British Medical Journal, 297(41):981\u2013982, Oct. 15, 1988.","journal-title":"British Medical Journal"},{"key":"1_CR16","unstructured":"R. Davidge. Processors as organisms. Cognitive Science CSRP 250, University of Sussex, 1992."},{"key":"1_CR17","unstructured":"T. Durham. The perils of polluted software. Datamation, pages 26\u201327, Feb. 11, 1988."},{"key":"1_CR18","first-page":"815","volume-title":"Artificial Life II","author":"J. D. Farmer","year":"1992","unstructured":"J. D. Farmer and A. Belin. Artificial Life: the coming evolution. In Langton et al. [28], pages 815\u2013840."},{"key":"1_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-1774-2","volume-title":"A Pathology of Computer Viruses","author":"D. Ferbrache","year":"1992","unstructured":"D. Ferbrache. A Pathology of Computer Viruses. Springer-Verlag, Berlin, 1992."},{"key":"1_CR20","unstructured":"S. Gordon. The generic virus writer. In Virus Bulletin '94 Proceedings, pages 24\u201331, Abingdon (Oxfordshire), 1994. Virus Bulletin."},{"issue":"5","key":"1_CR21","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/0167-4048(95)97086-P","volume":"14","author":"H. J. Highland","year":"1995","unstructured":"H. J. Highland. Random bits and bytes. Computers & Security, 14(5):365\u2013371, 1995.","journal-title":"Computers & Security"},{"key":"1_CR22","unstructured":"P. Hoffman. VSUM \u2014 virus information list, 1996."},{"key":"1_CR23","unstructured":"M. Hypponen. F-PROT professional update bulletin 2.13, 1994. Internet resource found at \u2329http:\/\/www.datafellows.fi\/bulletin\/bull-213.htm\u232a."},{"key":"1_CR24","unstructured":"M. Hypponen. F-PROT professional update bulletin 2.19, 1995. Internet resource found at \u2329http:\/\/www.datafellows.fi\/bulletin\/bull-219.htm\u232a."},{"key":"1_CR25","unstructured":"J. O. Kephart. A biologically inspired immune system for computers. In R. Brooks and P. Maes, editors, Artificial Life IV, pages 131\u2013139. MIT Press, 1994."},{"key":"1_CR26","volume-title":"Genetic Programming","author":"J. Koza","year":"1992","unstructured":"J. Koza. Genetic Programming. MIT Press, Cambridge (Massachusetts), 1992."},{"issue":"10","key":"1_CR27","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. Lampson","year":"1973","unstructured":"B. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613\u2013615, 1973.","journal-title":"Communications of the ACM"},{"volume-title":"Artificial Life II","year":"1992","key":"1_CR28","unstructured":"C. G. Langton, C. Taylor, J. D. Farmer, and S. Rasmussen, editors. Artificial Life II, Menlo Park (California), 1992. Addison-Wesley."},{"key":"1_CR29","volume-title":"Computer Viruses, Artificial Life and Evolution","author":"M. A. Ludwig","year":"1994","unstructured":"M. A. Ludwig. Computer Viruses, Artificial Life and Evolution. American Eagle Publications, Tucson (Arizona), 1994."},{"key":"1_CR30","volume-title":"Disinfectant On-Line Documentation","author":"J. Norstad","year":"1996","unstructured":"J. Norstad. Disinfectant On-Line Documentation. Northwestern University, Framingham (Massachusetts), 1996."},{"key":"1_CR31","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/0167-2789(95)00268-5","volume":"91","author":"A. Pargellis","year":"1996","unstructured":"A. Pargellis. The spontaneous generation of digital \u201clife\u201d. Physica D, 91:86\u201396, 1996.","journal-title":"Physica D"},{"key":"1_CR32","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/0167-2789(90)90070-6","volume":"42","author":"S. Rasmussen","year":"1990","unstructured":"S. Rasmussen, C. Knudsen, R. Feldberg, and M. Hindsholm. The Coreworld: emergence and evolution of cooperative structures in a computational chemistry. Physica D, 42:111\u2013134, 1990.","journal-title":"Physica D"},{"key":"1_CR33","first-page":"371","volume-title":"Artificial Life II","author":"T. S. Ray","year":"1992","unstructured":"T. S. Ray. An approach to the synthesis of life. In Langton et al. [28], pages 371\u2013408."},{"issue":"1","key":"1_CR34","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1162\/artl.1993.1.1_2.179","volume":"1","author":"T. S. Ray","year":"1993","unstructured":"T. S. Ray. An evolutionary approach to synthetic biology: Zen and the art of creating life. Artificial Life, 1(1):179\u2013210, 1993.","journal-title":"Artificial Life"},{"key":"1_CR35","unstructured":"E. S. Raymond. The New Hackers Dictionary. MIT Press, 1991."},{"key":"1_CR36","first-page":"355","volume-title":"Towards a Practice of Autonomous Systems","author":"J. Skipper","year":"1992","unstructured":"J. Skipper. The computer zoo \u2014 evolution in a box. In F. J. Varela and P. Bourgine, editors, Towards a Practice of Autonomous Systems, pages 355\u2013364, Cambridge (Massachusetts), 1992. MIT Press."},{"key":"1_CR37","unstructured":"A. Solomon. False alarms. Virus News International, pages 50\u201352, Feb. 1993."},{"key":"1_CR38","volume-title":"Artificial Life II","author":"E. H. Spafford","year":"1992","unstructured":"E. H. Spafford. Computer viruses \u2014 a form of artificial life? In Langton et al. [28]."},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"S. Wu and U. Manber. Fast text searching with errors. Technical Report 91-11, Department of Computer Science, University of Arizona, June 1991.","DOI":"10.1145\/135239.135244"}],"container-title":["Lecture Notes in Computer Science","Parallel Problem Solving from Nature \u2014 PPSN IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61723-X_964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T20:21:21Z","timestamp":1555705281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61723-X_964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540617235","9783540706687"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/3-540-61723-x_964","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}