{"title":"计算机病毒学与辅助","authors":"D. Shaw","doi":"10.1109/CCST.1989.751946","DOIUrl":null,"url":null,"abstract":"Interference with computer systems by illegal ex ternal means has been known for over thirty years and is col loquially referred to as 'hacking'. A more serious interference predicted in 1984 and first identified in 1987 is the computer virus which is defined as 'malicious software' capable of self replication'. This paper summarizes the main features of know computer viruses, their characteristics, detection and elimination, together with suggestions for system protection.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"182 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Computer virology and aids\",\"authors\":\"D. Shaw\",\"doi\":\"10.1109/CCST.1989.751946\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Interference with computer systems by illegal ex ternal means has been known for over thirty years and is col loquially referred to as 'hacking'. A more serious interference predicted in 1984 and first identified in 1987 is the computer virus which is defined as 'malicious software' capable of self replication'. This paper summarizes the main features of know computer viruses, their characteristics, detection and elimination, together with suggestions for system protection.\",\"PeriodicalId\":288105,\"journal\":{\"name\":\"Proceedings. International Carnahan Conference on Security Technology\",\"volume\":\"182 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-10-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1989.751946\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1989.751946","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Interference with computer systems by illegal ex ternal means has been known for over thirty years and is col loquially referred to as 'hacking'. A more serious interference predicted in 1984 and first identified in 1987 is the computer virus which is defined as 'malicious software' capable of self replication'. This paper summarizes the main features of know computer viruses, their characteristics, detection and elimination, together with suggestions for system protection.