Computer viruses: Theory and experiments. Cohen, F. Computers & Security, 6(1):22-35, 1987. Link Paper bibtex @article{journals/compsec/Cohen87,
added-at = {2015-03-25T00:00:00.000+0100},
author = {Cohen, Fred},
biburl = {http://www.bibsonomy.org/bibtex/21baae50221f05f649dd6448ce39048bd/dblp},
ee = {http://dx.doi.org/10.1016/0167-4048(87)90122-2},
interhash = {5cc1c6a8a6255edd3ee1c661cea50194},
intrahash = {1baae50221f05f649dd6448ce39048bd},
journal = {Computers & Security},
keywords = {dblp},
number = 1,
pages = {22-35},
timestamp = {2015-06-18T05:47:51.000+0200},
title = {Computer viruses: Theory and experiments.},
url = {http://dblp.uni-trier.de/db/journals/compsec/compsec6.html#Cohen87},
volume = 6,
year = 1987
}
Downloads: 0
{"_id":"YdR4Gu6X6gaDLbynB","bibbaseid":"cohen-computervirusestheoryandexperiments-1987","downloads":0,"creationDate":"2015-12-18T06:38:10.344Z","title":"Computer viruses: Theory and experiments.","author_short":["Cohen, F."],"year":1987,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/cohen?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2015-03-25T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Cohen"],"firstnames":["Fred"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/21baae50221f05f649dd6448ce39048bd/dblp","ee":"http://dx.doi.org/10.1016/0167-4048(87)90122-2","interhash":"5cc1c6a8a6255edd3ee1c661cea50194","intrahash":"1baae50221f05f649dd6448ce39048bd","journal":"Computers & Security","keywords":"dblp","number":"1","pages":"22-35","timestamp":"2015-06-18T05:47:51.000+0200","title":"Computer viruses: Theory and experiments.","url":"http://dblp.uni-trier.de/db/journals/compsec/compsec6.html#Cohen87","volume":"6","year":"1987","bibtex":"@article{journals/compsec/Cohen87,\n added-at = {2015-03-25T00:00:00.000+0100},\n author = {Cohen, Fred},\n biburl = {http://www.bibsonomy.org/bibtex/21baae50221f05f649dd6448ce39048bd/dblp},\n ee = {http://dx.doi.org/10.1016/0167-4048(87)90122-2},\n interhash = {5cc1c6a8a6255edd3ee1c661cea50194},\n intrahash = {1baae50221f05f649dd6448ce39048bd},\n journal = {Computers & Security},\n keywords = {dblp},\n number = 1,\n pages = {22-35},\n timestamp = {2015-06-18T05:47:51.000+0200},\n title = {Computer viruses: Theory and experiments.},\n url = {http://dblp.uni-trier.de/db/journals/compsec/compsec6.html#Cohen87},\n volume = 6,\n year = 1987\n}\n\n","author_short":["Cohen, F."],"key":"journals/compsec/Cohen87","id":"journals/compsec/Cohen87","bibbaseid":"cohen-computervirusestheoryandexperiments-1987","role":"author","urls":{"Link":"http://dx.doi.org/10.1016/0167-4048(87)90122-2","Paper":"http://dblp.uni-trier.de/db/journals/compsec/compsec6.html#Cohen87"},"keyword":["dblp"],"downloads":0},"search_terms":["computer","viruses","theory","experiments","cohen"],"keywords":["dblp"],"authorIDs":[],"dataSources":["DY7iBA8E4Z4ZyQgtk"]}