{"id":"https://openalex.org/W1999063374","doi":"https://doi.org/10.1016/0167-4048(92)90192-t","title":"Defense-in-depth against computer viruses","display_name":"Defense-in-depth against computer viruses","publication_year":1992,"publication_date":"1992-10-01","ids":{"openalex":"https://openalex.org/W1999063374","doi":"https://doi.org/10.1016/0167-4048(92)90192-t","mag":"1999063374"},"language":"en","primary_location":{"id":"doi:10.1016/0167-4048(92)90192-t","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(92)90192-t","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111373780","display_name":"Frederick B. Cohen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210086304","display_name":"Association of Specialty Physicians","ror":"https://ror.org/001vn6g34","country_code":"US","type":"other","lineage":["https://openalex.org/I4210086304"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Frederick B. Cohen","raw_affiliation_strings":["ASP, PO Box 81270, Pittsburgh, PA 15217, USA","ASP, PO Box 81270, Pittsburgh, PA 15217, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"ASP, PO Box 81270, Pittsburgh, PA 15217, USA","institution_ids":["https://openalex.org/I4210086304"]},{"raw_affiliation_string":"ASP, PO Box 81270, Pittsburgh, PA 15217, USA#TAB#","institution_ids":["https://openalex.org/I4210086304"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5111373780"],"corresponding_institution_ids":["https://openalex.org/I4210086304"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":null,"fwci":1.1124,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.75147679,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"11","issue":"6","first_page":"563","last_page":"579"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8049287796020508},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.6915123462677002},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.6544572710990906},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6522731781005859},{"id":"https://openalex.org/keywords/checksum","display_name":"Checksum","score":0.5806230902671814},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5712934732437134},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.5305776000022888},{"id":"https://openalex.org/keywords/software-fault-tolerance","display_name":"Software fault tolerance","score":0.5281255841255188},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5137044191360474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4899884760379791},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44463637471199036},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.41716599464416504},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3688023090362549},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3547506332397461},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18332645297050476},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08353286981582642}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8049287796020508},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.6915123462677002},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.6544572710990906},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6522731781005859},{"id":"https://openalex.org/C162372511","wikidata":"https://www.wikidata.org/wiki/Q218341","display_name":"Checksum","level":2,"score":0.5806230902671814},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5712934732437134},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.5305776000022888},{"id":"https://openalex.org/C50712370","wikidata":"https://www.wikidata.org/wiki/Q4269346","display_name":"Software fault tolerance","level":3,"score":0.5281255841255188},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5137044191360474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4899884760379791},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44463637471199036},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.41716599464416504},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3688023090362549},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3547506332397461},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18332645297050476},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08353286981582642},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/0167-4048(92)90192-t","is_oa":false,"landing_page_url":"https://doi.org/10.1016/0167-4048(92)90192-t","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1534863513","https://openalex.org/W1537067540","https://openalex.org/W1582350176","https://openalex.org/W1604743332","https://openalex.org/W1677852443","https://openalex.org/W1976114791","https://openalex.org/W1994562215","https://openalex.org/W1995875735","https://openalex.org/W2013181807","https://openalex.org/W2016002600","https://openalex.org/W2032674030","https://openalex.org/W2042364283","https://openalex.org/W2044723311","https://openalex.org/W2053741629","https://openalex.org/W2060108852","https://openalex.org/W2099137371","https://openalex.org/W2105225356","https://openalex.org/W2109394932","https://openalex.org/W2126160338","https://openalex.org/W2150529143","https://openalex.org/W2154559298","https://openalex.org/W2162022335","https://openalex.org/W2243344164","https://openalex.org/W2409664136","https://openalex.org/W2768936553","https://openalex.org/W2914679068","https://openalex.org/W2996027056","https://openalex.org/W4243121299","https://openalex.org/W6632034255","https://openalex.org/W6634829301","https://openalex.org/W6678934100"],"related_works":["https://openalex.org/W2971479921","https://openalex.org/W3170525725","https://openalex.org/W4360996742","https://openalex.org/W2412349256","https://openalex.org/W3145923041","https://openalex.org/W2946906624","https://openalex.org/W841176518","https://openalex.org/W2150675148","https://openalex.org/W2123437881","https://openalex.org/W2098626762"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
