325:
126:’s class. He wrote a short program, as an experiment, that could "infect" computers, make copies of itself, and spread from one machine to another. It was hidden inside a larger, legitimate program, which was loaded into a computer on a
133:
One of the few solid theoretical results in the study of computer viruses is Cohen's 1987 demonstration that there is no algorithm that can perfectly detect all possible viruses.
386:
107:
defense techniques. He gave the definition of "computer virus". Cohen is best known for his pioneering work on computer viruses, the invention of
406:
362:
122:, he wrote a program for a parasitic application that seized control of computer operations, one of the first computer viruses, in
294:
381:
401:
115:
44:
24:
355:
195:
185:
180:
175:
170:
160:
151:
During the past 10 year of his research work, Fred Cohen wrote over 60 professional publications and 11 books.
119:
249:
348:
55:
209:
Cohen, F., 1987. "Computer
Viruses Theory and Experiments," Computers and Security, vol. 6, pp. 22--35
50:
269:
108:
208:
391:
396:
324:
8:
100:
20:
331:
This biographical article relating to a computer specialist in the United States is a
141:
111:
mechanisms now in widespread use, and automation of protection management functions.
336:
298:
123:
165:
332:
104:
84:
66:
375:
127:
190:
145:
186:
1988, On the
Implications of Computer Viruses and Methods of Defense
176:
1992, A Formal
Definition of Computer Worms and Some Related Results
236:
148:
files on a computer, not to destroy, but to make them smaller.
196:
1989, Models of
Practical Defenses Against Computer Viruses
181:
1989, Models of
Practical Defenses Against Computer Viruses
171:
1991, The
Computer Security Encyclopedia - Computer Viruses
373:
270:An Undetectable Computer Virus (academic paper)
191:1984, Computer Viruses - Theory and Experiments
356:
250:"Computer Viruses - Theory and Experiments"
363:
349:
387:USC Viterbi School of Engineering alumni
161:1991, Trends In Computer Virus Research
374:
247:
319:
282:Computer Viruses and Data Protection
166:1991, A Case for Benevolent Viruses
13:
407:American computer specialist stubs
140:and he had created one called the
103:and best known as the inventor of
14:
418:
144:which spreading would infect all
116:University of Southern California
45:University of Southern California
323:
114:In 1983, while a student at the
25:Frederick Cohen (disambiguation)
109:high integrity operating system
287:
274:
263:
241:
230:
218:
136:Cohen also believed there are
1:
201:
382:American computer scientists
335:. You can help Knowledge by
7:
402:Computer security academics
99:(born 1956) is an American
19:For the mathematician, see
16:American computer scientist
10:
423:
318:
56:Carnegie-Mellon University
18:
154:
90:
80:
73:
62:
39:
32:
51:University of Pittsburgh
23:. For other people, see
295:"Interview Fred Cohen"
280:Burger, Ralph, 1991.
120:School of Engineering
248:Cohen, Fred (1984).
101:computer scientist
97:Frederick B. Cohen
34:Frederick B. Cohen
21:Frederick R. Cohen
344:
343:
237:A short biography
142:compression virus
94:
93:
85:Computer virology
75:Scientific career
414:
365:
358:
351:
327:
320:
310:
309:
307:
306:
297:. Archived from
291:
285:
278:
272:
267:
261:
260:
258:
256:
245:
239:
234:
228:
222:
138:positive viruses
58:B.S.E.E., 1977)
47:
30:
29:
422:
421:
417:
416:
415:
413:
412:
411:
372:
371:
370:
369:
316:
314:
313:
304:
302:
293:
292:
288:
279:
275:
268:
264:
254:
252:
246:
242:
235:
231:
223:
219:
214:
204:
157:
124:Leonard Adleman
54:
49:
43:
40:Alma mater
35:
28:
17:
12:
11:
5:
420:
410:
409:
404:
399:
394:
389:
384:
368:
367:
360:
353:
345:
342:
341:
328:
312:
311:
286:
273:
262:
240:
229:
216:
215:
213:
212:
205:
203:
200:
199:
198:
193:
188:
183:
178:
173:
168:
163:
156:
153:
105:computer virus
92:
91:
88:
87:
82:
78:
77:
71:
70:
67:Computer virus
64:
63:Known for
60:
59:
48:(Ph.D., 1986)
41:
37:
36:
33:
15:
9:
6:
4:
3:
2:
419:
408:
405:
403:
400:
398:
395:
393:
392:Living people
390:
388:
385:
383:
380:
379:
377:
366:
361:
359:
354:
352:
347:
346:
340:
338:
334:
329:
326:
322:
321:
317:
301:on 2014-01-13
300:
296:
290:
283:
277:
271:
266:
251:
244:
238:
233:
227:
221:
217:
210:
207:
206:
197:
194:
192:
189:
187:
184:
182:
179:
177:
174:
172:
169:
167:
164:
162:
159:
158:
152:
149:
147:
143:
139:
134:
131:
129:
125:
121:
117:
112:
110:
106:
102:
98:
89:
86:
83:
79:
76:
72:
68:
65:
61:
57:
52:
46:
42:
38:
31:
26:
22:
337:expanding it
330:
315:
303:. Retrieved
299:the original
289:
281:
276:
265:
253:. Retrieved
243:
232:
225:
220:
150:
137:
135:
132:
113:
96:
95:
74:
53:(M.S., 1980)
397:1956 births
284:, pp. 19-20
255:January 13,
128:floppy disk
376:Categories
305:2014-01-13
224:Cf. CV at
202:References
146:executable
69:research
226:all.net
155:Papers
81:Fields
333:stub
257:2014
118:'s
378::
130:.
364:e
357:t
350:v
339:.
308:.
259:.
211:.
27:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.