{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:18:11Z","timestamp":1756898291817},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_34","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"747-769","source":"Crossref","is-referenced-by-count":5,"title":["Viruses and Malware"],"prefix":"10.1007","author":[{"given":"Eric","family":"Filiol","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"J.\u00a0Kraus: Selbstreproduktion bei Programmen, Diploma Thesis (Universit\u00e4t Dortmund, Dortmund 1980), english translation (published by D.\u00a0Bilar, E.\u00a0Filiol): On Selfreproducing Programs, J. Comput. Virol. 5(1), 9\u201387 (2009)"},{"key":"34_CR2","volume-title":"Computer viruses","author":"F. Cohen","year":"1986","unstructured":"F.\u00a0Cohen: Computer viruses, Ph.D. Thesis (University of Southern California, Los Angeles, USA 1986)"},{"key":"34_CR3","first-page":"354","volume-title":"Advances in Cryptology \u2013 CRYPTO\u201988","author":"L.M. Adleman","year":"1988","unstructured":"L.M.\u00a0Adleman: An abstract theory of computer viruses. In: Advances in Cryptology \u2013 CRYPTO\u201988 (Springer, Berlin 1988) pp. 354\u2013374"},{"key":"34_CR4","first-page":"30","volume":"42","author":"E. Filiol","year":"2002","unstructured":"E. Filiol: L\u2019ing\u00e9nierie sociale, Linux Mag. 42, 30\u201335 (2002)","journal-title":"Linux Mag."},{"key":"34_CR5","volume-title":"Theory of Self-Reproducing Automata","author":"J. Neumann von","year":"1966","unstructured":"J.\u00a0von Neumann: Theory of Self-Reproducing Automata, ed. by A.W.\u00a0Burks (University of Illinois Press, Urbana 1966)"},{"key":"34_CR6","series-title":"IRIS International Series","volume-title":"Computer Viruses: From Theory to Applications","author":"E. Filiol","year":"2009","unstructured":"E.\u00a0Filiol: Computer Viruses: From Theory to Applications, IRIS International Series, 2nd edn. (Springer, Paris, France 2009)","edition":"2"},{"key":"34_CR7","first-page":"18","volume":"34","author":"E. Filiol","year":"2007","unstructured":"E. Filiol: Analyse du macro-ver OpenOffice\/BadBunny, MISC Le journal de la s\u00e9curit\u00e9informatique 34, 18\u201320 (2007)","journal-title":"MISC Le journal de la s\u00e9curit\u00e9informatique"},{"key":"34_CR8","unstructured":"A. Blonce, E. Filiol, L. Frayssignes: portable document format (PDF) security analysis and malware threats, Black Hat Europe 2008 Conference, Amsterdam, \n                  www.blackhat.com\/archives\n                  \n                 (2008)"},{"key":"34_CR9","unstructured":"D. Moore: The spread of the Code-Red worm (CRv2) \n                  http:\/\/www.caida.org\/analysis\/security\/code-red\/coderedv2_analysis.xml\n                  \n                 (2001)"},{"issue":"2","key":"34_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s11416-007-0051-3","volume":"3","author":"A. Ondi","year":"2007","unstructured":"A.\u00a0Ondi, R.\u00a0Ford: How good is good enough? Metrics for worm\/anti-worm evaluation, J. Comput. Virol. 3(2), 93\u2013101 (2007)","journal-title":"J. Comput. Virol."},{"issue":"2","key":"34_CR11","first-page":"124","volume":"2","author":"E. Filiol","year":"2007","unstructured":"E.\u00a0Filiol, E.\u00a0Franc, A.\u00a0Gubbioli, B.\u00a0Moquet, G.\u00a0Roblot: Combinatorial optimisation of worm propagation on an unknown network, Int. J. Comput. Sci. 2(2), 124\u2013130 (2007)","journal-title":"Int. J. Comput. Sci."},{"key":"34_CR12","series-title":"Collection IRIS","volume-title":"Techniques virales avanc\u00e9es","author":"E. Filiol","year":"2007","unstructured":"E.\u00a0Filiol: Techniques virales avanc\u00e9es, Collection IRIS (Springer, Paris, France 2007), English translation due October 2009"},{"key":"34_CR13","volume-title":"Premiers pas en statistiques","author":"Y. Dodge","year":"2005","unstructured":"Y.\u00a0Dodge: Premiers pas en statistiques (Springer, Paris, France 2005)"},{"key":"34_CR14","unstructured":"J. Hruska: (2002) Computer virus prevention: a primer, \n                  http:\/\/www.sophos.com\/virusinfo\/whitepapers\/prevention.html"},{"key":"34_CR15","unstructured":"Recommendation 600\/DISSI\/SCSSI, Protection des informations sensibles ne relevant pas du secret de D\u00e9fense, Recommendation pour les postes de travail informatiques (D\u00e9l\u00e9gation Interminist\u00e9rielle pour la S\u00e9curit\u00e9des Syst\u00e8mes d\u2019Information, March 1993)"},{"key":"34_CR16","first-page":"36","volume":"5","author":"A. Foucal","year":"2003","unstructured":"A. Foucal, T. Martineau: Application concr\u00e8te d\u2019une politique antivirus, MISC Le journal de la s\u00e9curit\u00e9informatique 5, 36\u201340 (2003)","journal-title":"MISC Le journal de la s\u00e9curit\u00e9informatique"},{"key":"34_CR17","first-page":"6","volume":"5","author":"M. Brassier","year":"2003","unstructured":"M. Brassier: Mise en place d\u2019une cellule de veille technologique, MISC Le journal de la s\u00e9curit\u00e9informatique 5, 6\u201311 (2003)","journal-title":"MISC Le journal de la s\u00e9curit\u00e9informatique"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T10:57:27Z","timestamp":1619780247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_34","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}