COMPUTER VIROLOGY: TOWARD DESIGNING AN IDEAL ANTI.VIRUS SYSTEM

Main Article Content

Hamid M. A. Abdul-Hussain

Abstract

A new systematic approach is introduced and used to define and study the basic concepts of the anti-virus system. These basic concepts include definitions, design and analysis criteria, and lassifications. Also, the characteristics of the ideal anti-virus system are defined. To understand how the proposed design and analysis criteria can be used in practice, the currently available antivirus products are analyzed using the proposed criteria to see whether they meet the requirements of the ideal anti-virus system or not.

Article Details

Section

Articles

How to Cite

“COMPUTER VIROLOGY: TOWARD DESIGNING AN IDEAL ANTI.VIRUS SYSTEM” (2003) Journal of Engineering, 8(03), pp. 317–335. doi:10.31026/j.eng.2002.03.05.

References

Endrijonas,J. (1993), "Rx PC: THE ANTI-VIRUS HANDBOCK", WINDCREST/McGRAWHILL.

Fites, P., Johnston,P. ,Kratz.M. (1989), "The Computer Virus Crises", Van Nourtrand

Reinhold.Garber,L. (1998), "Antivirus Technology Offers New Cures', IEEE Computer Magazine.February.

Gralla,P. (1997), "How the Internet Works", Macmillan Computer Publishing USA.

Abdul-Hussain H. M. A. and Shabib H. M.(2002) , "Computer Virology: Formal Analysis of Computer Viruses". Journal of Engineering, College of Engineering, University of Baghdad, No.l,Vol 8, March, PP. 103-121.

Kaspersky,E. (1992-1997), "AVP Virus Encyclopedia", Version 1.3.

O' mally,C.( I 993), "STALKING STEALTH VIRUSES", Popular Science, January.

Pozzo,M.,M. and Gray,T.,E.(1987), "An Approach to Containing Computer Viruses", Computer &Security, June.

Rao,S.,S. (1996), *THE HOT ZONE", Forbes, Vol. 158 Issue 12,p252,November.

R.,G. (1989), "Virus 101- Chapters 1,2,3,4", [email protected] .

"TBAV 1989-1996 (Thunder Byte Anti-Virus) User Manual".

Tischer,M. (1992), "PCINTERN SYSTEM PROGRAMING", Abacus,.

Uffenbeck,J. (1987), " THE 8088/8086 FAMILY: DESIGN, PROGRAMING, AND INTERFACING", Prentice-Hall, Inc..

Whalley,I. (1996), "VIRUS DEFENCE FOR THE FUTURE", Security Management, Vol.40 issue 11, p60, November

Similar Articles

You may also start an advanced similarity search for this article.