The helminthiasis of the Internet
Tài liệu tham khảo
Allman, 1983
Computer Professionals for Social Responsibility, 1989, CPSR statement on the computer virus, CPSR, Comm. ACM, 32, 699
DCA DDN Defense Communications System, 1989
Eichin, 1989
Eisenberg, 1989
Harner, 1990, Morris code, The New Republic, 202, 15
Harrenstein, 1977, NAME/FINGER
1989
1989, Comm. ACM, 32, 710
Massachusetts Institute of Technology, 1985
Massachusetts Institute of Technology, 1989, Comm. ACM, 32, 704
National Science Foundation, 1989, NSF poses code of networking ethics, Comm. ACM, 32, 688
Postel, 1982, Simple Mail Transfer Protocol, 10.17487/rfc0821
Reynolds, 1989, The helminthiasisof the Internet
Seeley, 1989, A tour of the worm
Spafford, 1989, The Internet worm program: an analysis, 19
Spafford, 1988, Purdue CS Technical Report CSD-TR-823
Agrawal, 1990, Integrating security with fault-tolerant distributed databases, Comput. J., 33, 71, 10.1093/comjnl/33.1.71
Al-Dossary, 1990, Computer virus protection and containment on mainframes, Comput. & Security, 9, 131, 10.1016/0167-4048(90)90085-8
Axelrod, 1989, Security during system recovery and repair, J. Inform. Systems Manage., 7, 42, 10.1080/07399019008968326
Alexander, 1989, A year later, Internet still under attack, Computerworld, 23, 1
Alexander, 1989, It's ba-a-ack: no nukes worm' haunts Internet, Computerworld, 23
Aucoin, 1989, Computer viruses: checklist for recovery, Comput. Libraries, 9, 4
Aucoin, 1989, Guarding against computer viruses: some general precautions, Comput. Libraries, 9, 24
Aviation Week & Space Technology, 1988, Rapid spread of virus confirms fears about danger to computers, Aviat. Week Space Technol., 129, 44
Bacon, 1989, Assessing public network security, Telecommunications, 23, 19
Badenhorst, 1989, Framework of a methodology for the life cycle of computer security in an organization, Comput. Security, 8, 433, 10.1016/0167-4048(89)90025-4
Barlow, 1990, Is computer hacking a crime?, Harper's, 280, 45
Barnes, 1989, Drawing the lines: changes in computer technology and law guarantee that resdistricting in the 1990s will be different and a more difficult game, Nat. J., 21, 787
Bear, 1980, Knowledge of computer ethics: its relationship to computer attitude and sociomoral reasoning, J. Educ. Comput. Res., 6, 77, 10.2190/3QJ0-P5B8-AELB-UGL7
Bellovin, 1989, Security problems in the TCP/IP protocol suite, Comput. Comm. Rev., 19, 32, 10.1145/378444.378449
Bellovin, 1988, The worm and the debug option, Vol. 7
Bender, 1978
Bidgoli, 1989, Computer security: new managerial concern for the 1990s and beyond, J. Systems Manage., 40, 21
Bloombecker, 1989, Short-circuiting computer crime, Datamation, 35, 71
Bloombecker, 1990
Bloombecker, 1988, Computer ethics for cynics, 18, 30
Bologna, 1988, Computer insecurities: an analysis of recent surveys on computer related crime and computer security, Data Proces. Comm. Security, 12
Bologna, 1989, The one minute fraud auditor, Comput. and Security, 8, 29, 10.1016/0167-4048(89)90035-7
Boston, 1988, Computer whiz puts virus in computers, Boston Herald, 1
Brand, 1990, Coping with the threat of computer security incidents: a primer from prevention through recovery, R. Brand
Brenner, 1989, LAN security, LAN Mag.
Brock, 1989, November 1988 Internet computer virus and the vulnerability of national telecommunications networks to computer viruses
Brunner, 1975
Burger, 1988
Burstyn, 1990, RTM and the worm that ate internet, Harvard Mag., 92, 23
Campbell, 1989, The Internet worm: rethinking the security threat, Unisphere, 9, 44
Campbell, 1989, The Internet worm: rethinking the security threat, Unisphere, 9, 46
Campbell, 1989, The Internet worm: rethinking the security threat, 9, 48
Chain Store Age Executive, 1989, Retail technology: computer ‘viruses’, Chain Store Age Executive, 64, 67
Chese, 1989, Computer viruses and related threats to computer and network integrity, Comput. Networks ISDN Systems, 17, 141, 10.1016/0169-7552(89)90006-8
Christiansen, 1988, A matter of ethics, IEEE Spectrum, 25, 15
Cohen, 1989, Computational aspects of computer viruses, Comput. & Security, 8, 325, 10.1016/0167-4048(89)90089-8
Cohen, 1989, Models of practical defenses against computer viruses, Comput. & Security, 8, 149, 10.1016/0167-4048(89)90070-9
Colyer, 1988, Risks of unchecked input in C programs, Vol. 7
Commerce Clearing House, 1989, Guide to computer law, Topical Law Reports
1989, Comm. ACM, 32, 672, 10.1145/63526.315956
1989, Comm. ACM, 32, 1044, 10.1145/66451.315986
Computers & Security, 1989, Random bits & bytes, Comput. & Security, 8, 178, 10.1016/0167-4048(89)90100-4
Computer Law and Tax Report, 1988, Difficult to prosecute virus authors, Comput. Law Tax Rep., 15, 7
Computer Law and Tax Report, 1988, Virus bill introduced, Comput. Law Tax Rep., 15, 13
Computerworld, 1988, Computerworld, 157
Conly, 1989
Cornell Computer Science Department, 1987
Curry, 1990
Data Communications, 1988, Internet virus aftermath: is tighter security coming?, Data Commun., 17, 52
Dean, 1988, Was science-fiction novel germ of a computer virus?, Los Angeles Times, 1
Dean, 1988, Was science-fiction novel germ of a computer virus?, Los Angeles Times, 2
Dean, 1988, Was science-fiction novel germ of a computer virus?, Los Angeles Times, 3
Dean, 1988, Was science-fiction novel germ of a computer virus?, Los Angeles Times, 9
DeBow, 1989, Bankers review security procedures after virus attack, Comput. Banking, 6, 8
1988
Demaio, 1989, Viruses—a management issue, Comput. & Security, 8, 381, 10.1016/0167-4048(89)90018-7
Denning, 1989, The science of computing: the internet worm, Amer. Sci., 77, 126
Devoy, 1988, Media, file management schemes facilitate WORM utilization, Comput. Technol. Rev., 8
Dewdney, 1989, Computer recreations; of worms, viruses and core war, Sci. Amer., 10.1038/scientificamerican0889-102
Discover, 1989, Technology: communicable computer disease, Discover, 10, 64
El-Baghdadi, 1989, The pivotal role in computer security, Security Manage, 33, 63
Electronic Learning, 1989, Computer viruses: an epidemic real or imagined?, Electron. Learning, 8
Eloff, 1988, Computer security policy: important issues, Comput. & Security, 7, 559, 10.1016/0167-4048(88)90007-7
Ellis, 1989, Underwriting update-computer viruses: working out the bugs, Best's Rev., 90, 84
Elmer-DeWitt, 1988, Invasion of the data snatchers! — a ‘virus’ epidemic strikes TERROR in the Computer World, Time Mag. Technol. Sect., 62
Elmer-DeWitt, 1988, The kid put us out of action, Time Mag., 14, 76
Fainberg, 1989, The night the network failed, New Sci., 121, 38
Fenwick, 1985, Chair, Computer litigation, 1985: trial tactics and techniques
Fifield, 1989, Smartcards outsmart computer crime, Comput. Security, 8, 10.1016/0167-4048(89)90107-7
Fisher, 1988, On the front lines in battling electronic invader, New York Times
Fites, 1989
Forcht, 1989, Computer crime: assessing the lawyer's perspective, J. Business Ethics, 8, 10.1007/BF00383337
Friis, 1989, Is your PC infected?, ABA Banking J., 81, 49
U.S. General Accounting Office, 1989
Gardner, 1989, Computer Security, J. Inform. Systems Manage., 6, 42, 10.1080/07399018908960171
Gardner, 1989, The Internet worm: what was said and when, Comput. & Security, 8, 10.1016/0167-4048(89)90092-8
Gemignani, 1989, Viruses and criminal law, Comm. ACM, 32, 669
Gerlth, 1988, Intruders into computer systems still hard to prosecute, New York Times
Gerrold, 1972
Gleissner, 1989, A mathematical theory for the spread of computer viruses, Comput. Security, 8, 35, 10.1016/0167-4048(89)90037-0
1989
Greenberg, 1989, Know thy viral enemy: it's more important than ever to guard your data and your system against infection by computer viruses, Byte, 14, 275
Greenia, 1989, Computer Security Information Sourcebook
Griffith, 1990, The computer fraud and abuse act of 1986: a measured response to a growing problem, Vanderbilt Law Rev., 43, 453
Harvard College, 1987, Misuse of Computer Systems, 85
Hawkins, 1989, What Users Should Know About Computer Viruses, Telecommunications, North Amer. Edn., 23
Herrick, 1989, Computer viruses: prevention is better than cure, Accountant's Mag., 93, 24
Hertzoff, 1989, Layer your LAN, Security Manage, 33, 201
Highland, 1989, Reports from the victims, Comput. & Security, 8, 101, 10.1016/0167-4048(89)90062-X
Hispanic Business, 1989, Consumer showcase: bits & bytes: from thunderstorms to disgruntled employees to computer viruses, a data system's vulnerability is often overlooked until disaster strikes, Hispanic Business, 11, 36
Hoffer, 1989, The 9 to 5 underground: are you policing computer crimes?, Sloan Manage. Rev., 30, 35
Hoffman, 1989, Risk analysis and computer security: towards a theory at last, Comput. & Security, 8, 23, 10.1016/0167-4048(89)90033-3
Hospitals, 1989, Information management: electronic computer viruses are not running rampant in hospital information systems, but health care executives are entirely too lax about computer system security, Hospital, 63, 64
1986
Hughes, 1986, The computer fraud and abuse act of 1986, Congressional Record (30 April 1986)
Industry Week, 1989, Computer flu is after you, Industry Week, 238, 39
Information Executive, 1989, Promoting computer ethics: the next generation, Inform. Executive, 2, 42
Information Hotline, 1989, Plan to combat computer viruses, Inform. Hotline, 21, 10
Jamieson, 1989, Security and control issues in local area network design, Comput. Security, 8, 305, 10.1016/0167-4048(89)90087-4
Jander, 1989, The naked network, Comput. Decisions, 21, 39
Joyce, 1988, Time bomb: inside the Texas virus trial, Comput. Decisions, 20, 38
Keenan, 1989, Emerging vulnerabilities in office automation security, Comput. Security, 8, 223, 10.1016/0167-4048(89)90105-3
Kellam-Scott, 1989, Profile: Bellcore Computer and Network Security Symposium, Bellcore Exchange, 5, 24
Kent, 1990, E-mail privacy for the Internet: new software and strict registration procedures will be implemented this year, Business Comm. Rev., 20, 55
King, 1988, Overreaction to external attacks on computer systems could be more harmful than the viruses themselves, Chronicle Higher Educ., A36
King, 1988, Educom Bull., 23, 5
Kluepfel, 1989, Computer use and abuse: computer systems and their data are vulnerable to error, omission, and abuse, Security Manage, 33, 72
Kocher, 1989, A hygiene lesson, Comm. ACM, 32, 3, 10.1145/63238.315910
Kosko, 1989, Computer security experts advise steps to reduce the risk of virus attacks, Virus Discussion List
Kruys, 1989, Security of open systems, Comput. & Security, 8, 139, 10.1016/0167-4048(89)90069-2
Lapsley, 1989, ‘We are under attack…’ (The Internet ‘worm’: a chronology), UNIX Rev., 7, 69
Lapsley, 1989, ‘We are under attack…’ (The Internet ‘worm’: a chronology), UNIX Rev., 7, 72
Lerner, 1989, Computer virus threatens to become epidemic, Aerospace Amer., 27, 14
Lewyn, 1988, ‘Scary’ virus clogs top Computers, USA Today, Sect. A, Col., 2, 1
Lu, 1989, Secure communications in Internet environments: a hierarchical key management scheme for end-to-end encryption, IEEE Trans. Comm., 37, 1014, 10.1109/26.41153
Lunt, 1989, Access control policies: some unanswered questions, Comput. & Security, 8, 43, 10.1016/0167-4048(89)90038-2
Lynn, 1989, Ethical responsibility key to computer security, Educ. Record, 70, 36
Machalow, 1989, Security for Lotus files, Comput. Libraries, 9, 19
Maher, 1989, Computer viruses: controller's nightmare, Manage. Accounting, 71, 44
Markoff, 1988, Author of computer ‘virus’ is son of U.S. electronic security expert, New York Times, A1
Markoff, 1988, Author of computer ‘virus’ is son of U.S. electronic security expert, New York Times, A7
Markoff, 1988, Computer experts say virus carried no hidden dangers, New York Times
Markoff, 1988, Computer snarl: a ‘back door’ ajar, New York Times, B10
Markoff, 1988, Learning to love the computer whiz, New York Times
Markoff, 1988, The computer jam: how it came about, New York Times
Markoff, 1990, Ex-student faces trial over computer chaos, New York Times
Markoff, 1990, Student says his error crippled Computers, New York Times
Markoff, 1988, U.S. is moving to restrict access to facts about computer virus, New York Times, A28
Markoff, 1988, ‘Virus’ in military computers disrupts systems nationwide, New York Times
Marshall, 1988, The worm's aftermath, Science, 242, 1121, 10.1126/science.242.4882.1121
Martin, 1989
Martin, 1989, Revenge of the nerds, Washington Monthly, 20, 21
McAfee, 1989, The virus cure, Datamation, 35, 29
McEwen, 1989
Menkus, 1989, It's time to rethink data processing fire protection, Comput. & Security, 8, 389, 10.1016/0167-4048(89)90019-9
Menkus, 1989, The computer virus situation is not encouraging, Comput. & Security, 8, 115, 10.1016/0167-4048(89)90066-7
Menkus, 1989, The employee's role in protecting information assets, Comput. & Security, 8, 487, 10.1016/0167-4048(89)90077-1
Menkus, 1989, Understanding password compromise, Comput. & Security, 7, 549, 10.1016/0167-4048(88)90004-1
Menkus, 1988, U. S. Government agencies belatedly address information system security issues, Comput. & Security, 7, 361, 10.1016/0167-4048(88)90575-5
Meredith, 1989, Cornell panel concludes morris responsible for computer worm, Cornell Chronicle
Miller, 1989, Computer viruses, Business Economic Review, 35, 36
National Institute of Standards and Technology, 1989, Computer viruses and related threats: a management guide, NIST Special Publication 500-166
Mizock, 1986, Ethics—the guiding light of professionalism, Data management, 24
Modern Railroads, 1989, How to outwit computer ‘hackers’, Modern Railroads, 44, 40
Moir, 1989, Maintaining system security, Dr. Dobb's J. Software Tools for the Pro, 14, 75
Munro, 1988, Big guns take aim at virus, Government Comput. News, 7, 1
Munro, 1988, Big guns take aim at virus, Government Comput. News, 7, 100
National Computer Security Center, 1988
National, 1989, Computer Viruses and related threats: a management guide, NIST Special Publication 500-166
1988, Vol. 7
Newhouse News Service, 1988, Congressmen plan hearings on virus, Seattle Times, B2
NSF Network Service Center (NNSC), 1988
Ostapik, 1989, The effect of the internet worm on network and computer security, Connextions, 3, 16
Ostrow, 1988, Legal doubts rise in computer virus case, Los Angeles Times, 4
Page, 1988
Palmore, 1989, Computer bytes: viruses and vaccines, TechTrends, 34, 26, 10.1007/BF02782079
Parker, 1983
PC, 1988, ‘Worm’ Attacks National Network, PC Week, 8
Perry, 1988, Why software defects so often go undiscovered, Government Comput. News, 7, 85
Peterson, 1988, Worming into a computer's vulnerable core, Science News, 134, 10.2307/3972712
Phelps, 1989, Bug bytes, Security Manage., 33, 85
Presstime, 1989, Contagious communication, Presstime, 11
Resource Management, 1989, Computer viruses: background and recommendations for keeping software healthy are detailed, Resource Manage., 8
Richards, 1989, Top management's view of computer related fraud, Sig Security, Audit & Control Rev., 6, 34
Rivera, 1989, Computer viruses: a different perspective, Data Processing & Commun. Security, 13
Rowe, 1989, Avoiding computer viruses, Business Educ. Forum, 44, 17
Royko, 1988, Here's how to stop computer vandals, Chicago Tribune
Rubin, 1989, Perimeter security for telecommunication with external entities, Internal Auditor, 46, 40
Rubin, 1988
Sampson, 1989, Computer viruses: not fads, not funny, Office, 110, 56
Samuelson, 1989, Can hackers be sued for damages caused by computer viruses?, Comm. ACM, 32, 666
Schneider, 1989, Computer viruses: what they are, how they work, how they might get you, and how to control them in academic institutions, Behav. Res. Methods, Instruments, & Comput., 21, 334, 10.3758/BF03205604
Schultz, 1989, Low cost security solutions for personal computers, Signal, 44, 71
Schweitzer, 1988
Seeley, 1989, Password cracking: a game of wits, Comm. ACM, 32, 700, 10.1145/63526.63529
Shadabuddin, 1989, Computer security problems and control techniques, Amer. Business Rev., 7, 14
Shaw, 1986, Computer Fraud and Abuse Act of 1986, Congressional Record (3 June 1986)
Siegel, 1985
Sims, 1988, Researchers fear computer ‘virus’ will slow use of national network, New York Times
Sitomer, 1986, Crooks find computers useful: terrorists see vulnerable targets, Christian Sci. Monitor, 79, 6
Slayden, 1989, Computer flu blues: computer managers must be ready to provide vaccines against infectious computer viruses, Security Manage., 33, 108
Spafford, 1989, Some musing on ethics and computer break-ins
Spafford, 1989, Computer viruses: dealing with electronic vandalism and programmed threats, ADAPSO
Spafford, 1989, The Internet worm: crisis and aftermath, Commun. ACM, 32, 689, 10.1145/63526.63527
Spafford, 1989, An analysis of the internet worm
Spafford, 1988, A Cure!!!!!, Vol. 7
Spafford, 1988, A worm ‘condom’, Vol. 7
Steinberg, 1989, Developing a computer security charter, Sig Security, Audit & Control Rev., 6, 12
Stipp, 1988, New computer break-ins suggest ‘virus’ may have spurred hackers, Wall Street J.
Stoll, 1988, How secure are computers in the U.S.A.?, Comput. & Security, 7, 543, 10.1016/0167-4048(88)90003-X
Stoll, 1988, Stalking the wily hacker, Commun. ACM, 31, 484, 10.1145/42411.42412
Stoll, 1989
Stuller, 1989, Computer cops and robbers, Across the Board, 26
Tester, 1989, The key to data security, Security Manage., 33, 206
The Accountant, 1989, Computer viruses, The Accountant, 5829, 25
The Computer Lawyer, 1990, Criminal: computer fraud and abuse act developments, The Computer Lawyer, 7, 41
The Economist, 1989, Halting computer hackers, The Economist, 313, 18
The Engineer, 1989, Computer security, moves to outlaw computer hackers are being complicated by computer viruses, The Engineer, 268
The Engineer, 1988, Disk diseases, The Engineer, 267, 28
The New York Times, 1990, Computer ‘virus’ termed a mistake, New York Times
The New York Times, 1988, Forgetfulness and the ‘virus’, New York Times
The New York Times, 1988, Letter bomb of the computer age, New York Times
The New York Times, 1990, Rogue program aided security, witness says, New York Times
The Wall Street Journal, 1988, Spreading a virus, A Wall Street J. News Roundup
Time Magazine, 1988, Letters Section, Poison program, Time Mag., 6
Tinto, 1989, Computer viruses: prevention, detection, and treatment, National Computer Security Center C1 Technical Report C1-001-89
Trible, 1986
United States, 1986
United, 1988
United States Congress House Committee on Science, Space, and Technology, Subcommittee on Transportation, Aviation, and Materials, 1989
United States Congress Senate Committee on the Judiciary, 1986
United States Congress Senate Committee on the Judiciary, 1986
United States Congress Senate Committee on the Judiciary, 1986
United States General Accounting Office, 1989, Computer security, GAO/IMTEC-89-57
United States of America, 1988
UNIX Today!, 1989, Uncle Sam's anti-virus Corps, UNIX Today!, 10
U.S. News & World Report, 1990, Computer hacking goes on trial. The Morris case is as much about culture clash as it is about computer security, U.S. News & World Rep., 108, 25
Vasilyev, 1989, Technology: computer viruses, Sov. Life, 394, 37
Wasik, 1989, Law reform proposals on computer misuse, Criminal Law Rev., 257
White, 1989, Viruses and worms: a campus under attack, Comput. & Security, 8, 283, 10.1016/0167-4048(89)90091-6
White, 1989, Coping with computer viruses and related problems, IBM Res. Rep. RC 14405
Wines, 1988, A family's passion for computers, gone sour, New York Times, 1
Wines, 1988, ‘Virus’ eliminated, defense aides say, New York Times
Winter, 1988, Virus infects huge computer network, Chicago Tribune, 1
Wiseman, 1989, Preventing viruses in computer systems, Comput. Security, 8, 427, 10.1016/0167-4048(89)90024-2
Wood, 1989, Planning: a means to achieve data communications security, Comput. Security, 8, 189, 10.1016/0167-4048(89)90101-6
Yovel, 1989, Conquering computer viruses, Security Manage., 33, 189
Zajac, 1989, Disaster recovery—are you really ready?, Comput. & Security, 8, 297, 10.1016/0167-4048(89)90093-X
Zajac, 1989, Legal options to computer viruses, Comput. Security, 8, 25, 10.1016/0167-4048(89)90034-5
Zajac, 1989, Viruses: should we quit talking about them, Comput. Security, 7, 471, 10.1016/0167-4048(88)90198-8