Abstract
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Follow us on Twitter at http://twitter.com/blogCACM
http://cacm.acm.org/blogs/blog-cacm
Robin K. Hill considers why the comparison of organic viruses and computer viruses is so compelling.
- Apvrille, A. and Lovet, G., 2012. An Attacker's Day into Human Virology. Appendix comprises a table of vocabulary analogs.Google Scholar
- Chen, T. and Robert, J.M., 2004. The evolution of viruses and worms. In Chen, W. (Ed.). (2004). Statistical Methods in Computer Security, Boca Raton: CRC Press.Google Scholar
- Du, W., Undated. Computer & Internet Security: Videos, Slides, Problems and Labs. Website for the book Computer & Internet Security: A Hands-on Approach, Second Edition. 2019.Google Scholar
- Hill, R.K., 2016. Fiction as Model Theory, BLOG@CACM. December 30, 2016.Google Scholar
- Hill, R.K., 2017. Operating Systems as Possible Worlds. BLOG@CACM. April 29, 2017.Google Scholar
- Hill, R.K., 2017. Human Acts and Computer Apps. BLOG@CACM. November 28, 2017.Google Scholar
- Hill, R.K., 2018. Articulation of Decision Responsibility. BLOG@CACM. May 21, 2018.Google Scholar
- Ritchie, D.M. 1980. The evolution of the Unix time-sharing system. In Proceedings of the Symposium on Language Design and Programming Methodology. Springer, 1980. https://bit.ly/3i5Zo8wGoogle ScholarCross Ref
- Schlosser, M. Agency. The Stanford Encyclopedia of Philosophy, Winter 2019 Edition. E.N. Zalta, Ed.Google Scholar
- Various experts. When and how did the metaphor of the computer 'virus' arise? Scientific American, https://bit.ly/31nebos. Article lists answers to the given question, usually identifying Fred Cohen, student of Adleman at University of Southern California. September 2, 1997.Google Scholar
- Weis, O. What if it was a software bug/virus? Cyber vs. COVID-19: A thought experiment. Rookout, https://bit.ly/2ERhiO0Google Scholar
- Wikipedia contributors. Creeper (program). In Wikipedia, The Free Encyclopedia. May 29, 2020.Google Scholar
Index Terms
- Protecting computers and people from viruses
Recommendations
Measuring the Effectiveness of Twitter’s URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks
ACSW '20: Proceedings of the Australasian Computer Science Week MulticonferenceIn this paper we investigate how effective Twitter’s URL shortening service (t.co) is at protecting users from phishing and malware attacks. We show that over 10,000 unique blacklisted phishing and malware URLs were posted to Twitter during a 2-month ...
Protecting against data breaches; living with mistakes
The Communications Web site, http://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
twitter
Follow us on Twitter at http://twitter.com/blogCACM
http://...
How people describe themselves on Twitter
DBSocial '13: Proceedings of the ACM SIGMOD Workshop on Databases and Social NetworksTwitter, being both a micro-blogging service and a social network, has become one of the primary means of communicating and disseminating information online. As such, significant amount of research has been devoted to analyzing the Twitter graph, the ...
Comments