{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:19Z","timestamp":1772163919227,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,2,23]],"date-time":"2005-02-23T00:00:00Z","timestamp":1109116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,2,23]]},"DOI":"10.1145\/1047344.1047404","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T04:31:47Z","timestamp":1123043507000},"page":"152-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Viruses 101"],"prefix":"10.1145","author":[{"given":"J.","family":"Aycock","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, Alberta, Canada"}]},{"given":"K.","family":"Barker","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, Alberta, Canada"}]}],"member":"320","published-online":{"date-parts":[[2005,2,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"13th Annual EICAR Conference","author":"Aycock J.","year":"2004","unstructured":"J. Aycock and K. Barker . Creating a secure virus laboratory . In 13th Annual EICAR Conference , 2004 . 13pp. J. Aycock and K. Barker. Creating a secure virus laboratory. In 13th Annual EICAR Conference, 2004. 13pp."},{"key":"e_1_3_2_1_2_1","volume-title":"A Gift of Fire","author":"Baase S.","year":"2003","unstructured":"S. Baase . A Gift of Fire . Prentice Hall , 2 nd edition, 2003 . S. Baase. A Gift of Fire. Prentice Hall, 2nd edition, 2003.","edition":"2"},{"key":"e_1_3_2_1_3_1","volume-title":"Extreme Programming Explained","author":"Beck K.","year":"2000","unstructured":"K. Beck . Extreme Programming Explained . Addison-Wesley , 2000 . K. Beck. Extreme Programming Explained. Addison-Wesley, 2000."},{"key":"e_1_3_2_1_4_1","volume-title":"Should we teach virus writing? In 6th Association of anti Virus Asia Researchers Conference (AVAR","author":"Bontchev V.","year":"2003","unstructured":"V. Bontchev . Should we teach virus writing? In 6th Association of anti Virus Asia Researchers Conference (AVAR 2003 ), 2003. 15pp. V. Bontchev. Should we teach virus writing? In 6th Association of anti Virus Asia Researchers Conference (AVAR 2003), 2003. 15pp."},{"key":"e_1_3_2_1_5_1","volume-title":"News broadcast","author":"Headline News CNN","year":"2004","unstructured":"CNN Headline News : Hot Wired. News broadcast , 28 May 2004 . CNN Headline News: Hot Wired. News broadcast, 28 May 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/unhca.com\/CJ628\/CJ628.html. Course syllabus","author":"Cohen F.","unstructured":"F. Cohen . CJ 528\/628 -- Computer viruses and malicious code. http:\/\/unhca.com\/CJ628\/CJ628.html. Course syllabus , University of New Haven. F. Cohen. CJ 528\/628 -- Computer viruses and malicious code. http:\/\/unhca.com\/CJ628\/CJ628.html. Course syllabus, University of New Haven."},{"key":"e_1_3_2_1_7_1","volume-title":"No Starch Press","author":"Erickson J.","year":"2003","unstructured":"J. Erickson . Hacking : The Art of Exploitation . No Starch Press , 2003 . J. Erickson. Hacking: The Art of Exploitation. No Starch Press, 2003."},{"key":"e_1_3_2_1_8_1","volume-title":"4th International Virus Bulletin Conference","author":"Gordon S.","year":"1994","unstructured":"S. Gordon . The generic virus writer . In 4th International Virus Bulletin Conference , 1994 . S. Gordon. The generic virus writer. In 4th International Virus Bulletin Conference, 1994."},{"key":"e_1_3_2_1_9_1","volume-title":"6th International Virus Bulletin Conference","author":"Gordon S.","year":"1996","unstructured":"S. Gordon . The generic virus writer II . In 6th International Virus Bulletin Conference , 1996 . S. Gordon. The generic virus writer II. In 6th International Virus Bulletin Conference, 1996."},{"key":"e_1_3_2_1_10_1","volume-title":"Osbourne","author":"Harley D.","year":"2001","unstructured":"D. Harley , R. Slade , and U. E. Gattiker . Viruses Revealed . Osbourne , 2001 . D. Harley, R. Slade, and U. E. Gattiker. Viruses Revealed. Osbourne, 2001."},{"key":"e_1_3_2_1_11_1","volume-title":"The Laboratory Biosafety Guidelines","author":"Canada Health","year":"2001","unstructured":"Health Canada . The Laboratory Biosafety Guidelines . M. Best and M. Heisz, eds., 3rd (draft) edition, 2001 . http:\/\/www.hc-sc.gc.ca\/pphb-dgspsp\/ols-bsl\/lbg-ldmbl\/index.html. Health Canada. The Laboratory Biosafety Guidelines. M. Best and M. Heisz, eds., 3rd (draft) edition, 2001. http:\/\/www.hc-sc.gc.ca\/pphb-dgspsp\/ols-bsl\/lbg-ldmbl\/index.html."},{"key":"e_1_3_2_1_12_1","volume-title":"The Shellcoder's Handbook","author":"Koziol J.","year":"2004","unstructured":"J. Koziol , D. Litchfield , D. Aitel , C. Anley , S. Eren , N. Mehta , and R. Hassell . The Shellcoder's Handbook . Wiley , 2004 . J. Koziol, D. Litchfield, D. Aitel, C. Anley, S. Eren, N. Mehta, and R. Hassell. The Shellcoder's Handbook. Wiley, 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"Alberta strikes again. Virus Bulletin, page","author":"Kuo J.","year":"2003","unstructured":"J. Kuo . Alberta strikes again. Virus Bulletin, page 2, July 2003 . J. Kuo. Alberta strikes again. Virus Bulletin, page 2, July 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"Defense and Detection Strategies against Internet Worms","author":"Nazario J.","year":"2004","unstructured":"J. Nazario . Defense and Detection Strategies against Internet Worms . Artech House , 2004 . J. Nazario. Defense and Detection Strategies against Internet Worms. Artech House, 2004."},{"issue":"19","key":"e_1_3_2_1_15_1","first-page":"A33","article-title":"How to write a computer virus, for college credit (cover story)","volume":"50","author":"Read B.","year":"2004","unstructured":"B. Read . How to write a computer virus, for college credit (cover story) . Chronicle of Higher Education , 50 ( 19 ): A33 , 2pp., Jan. 2004 . B. Read. How to write a computer virus, for college credit (cover story). Chronicle of Higher Education, 50(19):A33, 2pp., Jan. 2004.","journal-title":"Chronicle of Higher Education"},{"key":"e_1_3_2_1_16_1","volume-title":"Looking into the mind of a virus writer. CNN.com","year":"2003","unstructured":"Reuters. Looking into the mind of a virus writer. CNN.com , 19 March 2003 . Reuters. Looking into the mind of a virus writer. CNN.com, 19 March 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Malware: Fighting Malicious Code","author":"Skoudis E.","year":"2004","unstructured":"E. Skoudis . Malware: Fighting Malicious Code . Prentice Hall , 2004 . E. Skoudis. Malware: Fighting Malicious Code. Prentice Hall, 2004."},{"key":"e_1_3_2_1_18_1","unstructured":"Sophos. Sophos CEO says: \"I won't hire virus writing students\". http:\/\/www.sophos.com\/virusinfo\/articles\/calgary2.html 28 May 2003.  Sophos. Sophos CEO says: \"I won't hire virus writing students\". http:\/\/www.sophos.com\/virusinfo\/articles\/calgary2.html 28 May 2003."},{"key":"e_1_3_2_1_19_1","volume-title":"Antivirus industry steamed over virus article, college class","author":"Svensson P.","year":"2003","unstructured":"P. Svensson . Antivirus industry steamed over virus article, college class . Associated Press (New York) , 11 June 2003 . P. Svensson. Antivirus industry steamed over virus article, college class. Associated Press (New York), 11 June 2003."},{"key":"e_1_3_2_1_20_1","volume-title":"Australia)","author":"Wilson E.","year":"2003","unstructured":"E. Wilson . Anger at 'virus' lessons. Sydney Morning Herald (Sydney , Australia) , 6 October 2003 . E. Wilson. Anger at 'virus' lessons. Sydney Morning Herald (Sydney, Australia), 6 October 2003."}],"event":{"name":"SIGCSE05: Technical Symposium on Computer Science Education","location":"St. Louis Missouri USA","acronym":"SIGCSE05","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 36th SIGCSE technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1047344.1047404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1047344.1047404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:07:47Z","timestamp":1750248467000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1047344.1047404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,2,23]]},"references-count":20,"alternative-id":["10.1145\/1047344.1047404","10.1145\/1047344"],"URL":"https:\/\/doi.org\/10.1145\/1047344.1047404","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1047124.1047404","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2005,2,23]]},"assertion":[{"value":"2005-02-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}