USENIX Association Winter Conf., 1989
[Duff89b] Duff T. Experience with viruses on UNIX systems //
Computing Systems, 1989, v.2, No 2, pp.155-171
[Dvorak88] Dvorak J.C. Virus wars: a serious warning // PC Magazine,
1988, v.7, No 4, p.71
[EDPAJ90] EDPAA testimony before US congress regarding computer
viruses // EDPAJ, 1990, v.2, pp.68-72
[Eisenberg89] Eisenberg T., Gries D. et al. The Cornell comission: on
Morris and the worm // CACM, 1989, v.32, No 6, pp.706-709
[Fak88] Fak V. Are we vulnerable to a virus attack ? A report from
Sweden // C&S, 1988, v.7, No 2, pp.151-155
[Fastiggi] Fastiggi M.V. Detection of surreptitious insertion of
trojan horse or viral code in computer application programs //
Information Age, 1989, v.11, No 1, pp.3-18
[Fites89] Fites P., Johnston P., Kratz M. The computer virus crisis.-
N.Y.: Van Nostrand Reinhold, 1989, 171 p.
[Gardner89] Gardner P.E. The Internet worm: what was said and when //
C&S, 1989, v.8, No 4, pp.291-296
[Gemignani85] Gemignani M. The software protection worm: can it turn
against its Master ? // Abacus, 1985, v.2, No 4, pp.39-40,51
[Gemignani89] Gemignani M. Viruses and criminal law // CACM, 1989,
v.32, No 6, pp.669-671
[Gibson84] Gibson W. Neuromancer.- N.Y.: Ace Science Fiction, 1984
[Gibson88] Gibson W. Mona Lisa Overdrive.- N.Y.: Bantam Books, 1988
[Glath88] Glath R. The case of the "Gerbil virus" that wasn't // C&S,
1988, v.7, No 5, pp.451-453
[Glath90] Glath R.M. Stealth viruses ... weapon systems of tomorrow ?
// DC, 1990, v.3, No 5, pp.34-36
[Gleissner89] Gleissner W. A mathematical theory for the spread of
computer viruses // C&S, 1989, v.8, No 1, pp.35-41
[Glendown89] Glendown G. Bootblaker: bootblock-virusprotector fur den
Amiga // Toolbox, 1989, v.4, No 1, pp.51-53
[Gliss88] Gliss H. EARN network hit by student prank // CF&SB, 1988,
v.10, No 5, pp.1-4
[Goodwins88] Goodwins R. Understanding the minds behind the viruses
// CF&SB, 1988, v.10, No 7, pp.3-4
[Graf90] Graf J. Interview mit Deutschlands erstem virenprogrammierer
// Chip, 1990, No 3, pp.405-406
[Greenberg89] Greenberg R.M. Know thy viral enemy // Byte, 1989,
No 6, pp.275-280
[Gruman89] Gruman G. Viruses and worms: what to do ? // IEEE
Software, 1989, v.6, No 2, pp.93-96
[Gunn74] Gunn J.B. Use of virus functions to provide a virtual APL
interpreter under user control // APL Quote Quad, 1974, v.5, No 4,
pp.163-168
[Hackenberg89] Hackenberg G. Programmschadlinge - eine virologie //
DuD, 1989, No 8, pp.392-397
[Hafner88] Hafner K.M. Is your computer secure ? // Business Week,
1988, No 3063 (August 1), pp.64-72
[Herschberg90] Herschberg I.S., Paans R. Friday the 13th, facts and
fancies // C&S, 1990, v.9, No 2, pp.125-130
[Highland87a] Highland H.J. Computer viruses and sudden death ! //
C&S, 1987, v.6, No 1, pp.8-10
[Highland87b] Highland H.J. Data physician - a virus protection
program // C&S, 1987, v.6, No 1, pp.73-79
[Highland88a] Highland H.J. Case history of a virus attack // C&S,
1988, v.7, No 1, pp.3-4
[Highland88b] Highland H.J. Computer viruses - a post mortem // C&S,
1988, v.7, No 2, pp.117-125
[Highland88c] Highland H.J. Anatomy of a virus attack // C&S, 1988,
v.7, No 2, pp.145-150
[Highland88d] Highland H.J. An overview of 18 virus protection
products // C&S, 1988, v.7, No 2, pp.157-161
[Highland88e] Highland H.J. How to combat a computer virus // C&S,
1988, v.7, No 2, pp.157-163
[Highland88f] Highland H.J. How to test a virus filter without a
virus // C&S, 1988, v.7, No 3, pp.235-242
[Highland88g] Highland H.J. How to obtain a computer virus // C&S,
1988, v.7, No 4, pp.337-346
[Highland88h] Highland H.J. The BRAIN virus: fact and fantasy // C&S,
1988, v.7, No 4, pp.367-370
[Highland88i] Highland H.J. Computer viruses: media hyperbole, errors
and ignorance // C&S, 1988, v.7, No 5, pp.439-449
[Highland88j] Highland H.J. Virus filter evaluation report // C&S,
1988, v.7, No 6, pp.533-541
[Highland88k] Highland H.J. Case history of a virus attack // CF&SB,
1988, v.10, No 4, pp.4-7
[Highland88l] Highland H.J. The BRAIN virus - fact and fantasy //
CF&SB, 1988, v.10, No 11, pp.4-9
[Highland89a] The computer virus handbook / H.J.Highland (ed.).-
Oxford: Elsevier Advanced Technology, 1989
[Highland89b] Highland H.J. The Milnet/Arpanet attack // C&S, 1989,
v.8, No 1, pp.3-13
[Highland89c] Highland H.J. The Italian or Ping-pong virus // C&S,
1989, v.8, No 2, pp. 91-98
[Highland89d] Highland H.J. A macro virus // C&S, 1989, v.8, No 3,
pp.178-188
[Highland89e] Highland H.J. Harmless viruses do not exist // C&S,
1989, v.8, No 4, pp.276-278
[Highland89f] Highland H.J. The Marijuana virus revisited // C&S,
1989, v.8, No 5, pp.369-380
[Highland89g] Highland H.J. The Internet worm ... continued // C&S,
1989, v.8, No 6, pp.460-478
[Highland89h] Highland H.J. How to detect a computer virus in your
system // C&S, 1989, v.8, No 7, pp.553-561
[Highland89i] Highland H.J. Protecting hardware and software // C&S,
1989, v.8, No 8, pp.647-657
[Highland89j] Highland H.J. Datacrime virus and new anti-virus
products // C&S, 1989, v.8, No 8, pp.659-661
[Highland89k] Highland H.J. VCHECKER - a virus search program // C&S,
1989, v.8, No 8, pp.669-674
[Highland89l] Highland H.J. Two new viruses pose threat // CF&SB,
1989, v.11, No 4, pp.20-21
[Highland89m] Highland H.J. The ARPANET virus attack // CF&SB, 1989,
v.11, No 5, pp.7-10
[Highland89n] Highland H.J. The Italian virus // CF&SB, 1989, v.11,
No 7, pp.7-8
[Highland90a] Highland H.J. New directions for anti-virus measures //
C&S, 1990, v.9, No 1, pp.7-8
[Highland90b] Highland H.J. Emerging viruses, emerging threat // C&S,
1990, v.9, No 2, pp.104-108
[Highland90c] Highland H.J. A spate of new virus // C&S, 1990, v.9,
No 3, pp.205-206
[Hoffman89] Hoffman G. "Wurm" im Internet // DuD, 1989, No 2,
pp.63-70
[Hoffmeister87a] Hoffmeister F. An approach to defend computers
against computer viruses // Proc. IASTED Int. Symp.: Applied
Informatics, 1987, pp.176-179
[Hoffmeister87b] Hoffmeister F. Risiken durch computerviren - erste
losungsansatze // PIK, 1987, v.10, No 3, pp.196-202
[Honan89] Honan P. Avoiding virus hysteria // Personal Computing,
1989, v.13, No 5, pp.85-92
[Hoppenrath89] Hoppenrath D. Computerviren: problem oder psychose? //
Computer Personlich, 1989, No 3, pp.45-47
[Horwitt88] Horwitt E. Virus scare shakes IBM MIS managers // CW,
1988, v.XXII, No 46 (Nov. 14), p.8
[Hruska88a] Hruska J. Data viruses, trojan horses and logic bombs -
how to combat them ? // CF&SB, 1988, v.10, No 6, pp.5-7
[Hruska88b] Hruska J. "BRAIN" - the truth is revealed // CF&SB, 1988,
v.10, No 7, pp.2-3
[Hruska90] Hruska J. Computer viruses // Information Age, 1990, v.12,
No 2, pp.100-108
[Hunter89] Hunter P. Virus attack // Communications Management, 1989,
April, pp.36-38
[Isselhorst89] Isselhorst H. Massnahmen zum manipulationsschutz von
software - notwendigkeit, arten, bewertung // DuD, 1989, No 8,
pp.398-402
[Jackson88] Jackson K. Virus alters networking // CommunicationsWeek,
1988, No 222 (Nov. 14)
[Jackson89a] Jackson K. "1813" strikes city university // CF&SB,
1989, v.11, No 4, p.19
[Jackson89b] Jackson K. Vaccine // CF&SB, 1989, v.11, No 7, pp.13-16
[Joepgen89] Joepgen H.-G. "Viren", "minen" und "trojaner" // MC,
1989, No 7, pp.44-48; No 8, pp.80-89; No 9, pp.68-78; No 10, pp.118-124
[JonesH88] Jones H. Gremlins that grind your system down // PC
Business World, 1988, v.4, No 7, p.8
[JonesL88] Jones L.G. Computer viruses: threat or media hype ? //
EDPAJ, 1988, v.3, pp.25-32
[Jorga88] Jorga F. "ANTIBIO"tica gegen virus - programme //
Wirtschaftsschutz + Sicherheitstechnik, 1988, No 7, pp.373-374
[Joseph88] Joseph M., Avizienis A. A fault tolerance approach to
computer viruses // Proc. IEEE Symp. on Security and Privacy, 1988,
pp.52-58
[Joseph89] Joseph M.K. A response to criticisms of a virus detection
scheme // SIGSAC Rewiew, 1989, v.7, No 3, pp.3-5
[Joyce88] Joyce E.J. Software viruses: PC-health enemy number one //
Datamation, 1988, v.34, No 20, pp.27-30
[Kadlof89] Kadlof A. Wirusy atakuja // Komputer, 1989, No 7/8,
pp.28-29; No 9, pp.26-28; No 10, pp.35-37; 1990, No 1/3, pp.34-35
[Kadlof90a] Kadlof A. Wirusy komputerowe w Polsce // PCkurier, 1990,
No 8, pp.10-11; No 15, pp.10-11; No 21, pp.14-15
[Kadlof90b] Kadlof A. Uwaga: nove wirusy // PCkurier, 1990, No 9,
pp.6-7
[Kadlof90c] Kadlof A. Przeciw wirusom // PCkurier, 1990,
No 11, p.7; No 12, pp.15-17; No 13, pp.14-16; No 14, pp.16-17; No 16,
pp.14-15; No 18, pp.14-15; No 19, pp.14-15
[Kadlof90d] Kadlof A. Identyfikacja wirusow komputerowych //
PCkurier, 1990, No 22, pp.20-21
[Kаnel88] Kаnel A. Informatigue: le Sida se repand // La Revue
Polytechnique, 1988, No 1502, pp.985-987
[Kane89] Kane P. V.I.R.U.S. protection: vital information resources
under siege.- N.Y.: Bantam Books.- 477 p.- (с дискетой утилит Dr. Panda)
[Kask88] Kask A. Computer viruses are as easy to prevent as the
common cold // InfoWorld, 1988, v.10, No 50 (Dec. 12), p.49
[Kastenmuller88] Kastenmuller S. Erkennen von "computer-viren" //
KES, 1988, v.4, No 4, pp.255-263
[Kelly89] Kelly M. Treating viruses sensibly // Practical Computing,
1989, v.12, No 5, pp.72-73
[King89] King M. Viruses and related mechanisms in MVS // Software
World, 1989, v.20, No 1, pp.2-4
[King90] King M. Solving the virus problem: how to protect your
system // Technical Support, 1990, v.4, No 1, pp.25-28
[Klopp90] Klopp Ch. Software vendors capitalize on security needs //
C&S, 1990, v.9, No 1, pp.33-35
[Kocher89] Kocher B. A hygiene lesson // CACM, 1989, v.32, No 1,
pp.3,6
[Koziel88] Koziel T., Leister G. Die viren sind da: bootsector -
viren erobern den Atari ST // C't, 1988, No 7, pp.72-80
[Krabel87] Krabel E. Die viren kommen // C't, 1987, No 4, pp.108-117
[Kurzban89] Kurzban S.A. Viruses and worms - what can you do ? //
SIGSAC Rewiew, 1989, v.7, No 1, pp.16-32
[Lai88] Lai N., Gray T.E. Strengthening discretionary access controls
to inhibit trojan horses and computer viruses // Proc. USENIX
Association Summer Conf., 1988, pp.275-286
[Lammer88] Lammer P. Protection from infection // Systems
International, 1988, v.16, No 6, pp.75-76
[Majewski88] Majewski W. Wirusowa goraczka // Komputer, 1988, No 11,
pp.35-39
[Margolis88] Margolis N., Ryan A.J. What did the worm teach us ? //
CW, 1988, v.XXII, No 46 (Nov. 14), p.14
[Marotta89] Marotta M.E. Computer viruses: the security challenge //
Systems 3X & AS World, 1989, v.17, No 3, pp.82-90
[Marshall88a] Marshall E. The scourge of computer viruses // Science,
1988, v.240, No 4849 (Apr. 8), pp.133-134
[Marshall88b] Marshall E. Worm invades computer networks // Science,
1988, v.242, No 4880 (Nov. 11), pp.855-856
[Marshall88c] Marshall E. The worm's aftermath // Science, 1988,
v.242, No 4882 (Nov. 25), pp.1121-1122
[McAfee89a] McAfee J. Managing the virus threat // CW, 1989, v.XXIII,
No 6 (Feb. 13), pp.89-96
[McAfee89b] McAfee J. The virus cure // Datamation, 1989, v.35, No 4,
pp.29-40
[McBroom89] McBroom V. Computer viruses: what they are, how to
protect against them // Software Protection, 1989, v.VIII, No 3, pp.1-16
[McIlroy89] McIlroy M.D. Virology 101 // Computing Systems, 1989,
v.2, No 2, pp.173-181
[McLellan88] McLellan V. Computer systems under seige (viruses) //
EDPAJ, 1988, v.3, pp.33-38
[Menkus89] Menkus B. The computer virus situation is not encouraging
// C&S, 1989, v.8, No 2, pp.115-119
[Menkus90] Menkus B. In the matter of Robert Tappan Morris, jr //
EDPAJ, 1990, v.2, pp.10-11
[Miedel89a] Miedel L. Schadlinge im boot-block // Chip, 1989, No 7,