Fred Cohen
Computers & Security, Volume 8, Issue 4 (June 1989), pp.325-344
ISSN 0167-4048
June 1989
This paper formally defines a class of sets of transitive integrity-corrupting mechanisms called "viral sets" and explores some of their computational properties.