L. M. Adleman, An Abstract Theory of Computer Viruses, Advances in Cryptology ? CRYPTO'88, 1988.
DOI : 10.1007/0-387-34799-2_28

M. Bishop, An overview of computer viruses in a research environment, 1991.

M. Blum, A Machine-Independent Theory of the Complexity of Recursive Functions, Journal of the ACM, vol.14, issue.2, pp.322-336, 1967.
DOI : 10.1145/321386.321395

G. Bonfante, M. Kaczmarek, and J. Marion, Toward an Abstract Computer Virology, In Lecture Notes in Computer Science, vol.3722, pp.579-593, 2005.
DOI : 10.1007/11560647_38

URL : https://hal.archives-ouvertes.fr/inria-00115208

D. M. Chess and S. R. White, An undetectable computer virus, 2000.

F. Cohen, Computer viruses, Computers & Security, vol.6, issue.1, 1986.
DOI : 10.1016/0167-4048(87)90122-2

F. Cohen, Computer viruses, Computers & Security, vol.6, issue.1, pp.22-35, 1987.
DOI : 10.1016/0167-4048(87)90122-2

F. Cohen, On the implications of computer viruses and methods of defense, Computers & Security, vol.7, issue.2, pp.167-184, 1988.
DOI : 10.1016/0167-4048(88)90334-3

F. Cohen, Computational aspects of computer viruses, Computers & Security, vol.8, issue.4, pp.325-344, 1989.
DOI : 10.1016/0167-4048(89)90089-8

S. Goel and S. F. Bush, Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches, Complexity, vol.90, issue.2, pp.54-73, 2003.
DOI : 10.1002/cplx.20004

S. Anderson, H. Thimbleby, and P. Cairns, A framework for medelling trojans and computer virus infection, Computer Journal, vol.41, pp.444-458, 1999.

J. Jain, D. Osherson, J. Royer, and A. Sharma, Systems that learn, 1999.

N. D. Jones, Computer implementation and applications of kleene's S-mn and recursive theorems, Lecture Notes in Mathematics Logic From Computer Science, pp.243-263, 1991.

N. D. Jones, Computability and Complexity from a Programming Perspective, 1997.
DOI : 10.1007/978-94-010-0413-8_4

S. C. Kleene, Introduction to Metamathematics, 1952.

M. A. Ludwig, The Giant Black Book of Computer Viruses, 1998.

J. Myhill, Creative sets. Zeit fur Math, Logik und Grund der Math, 1955.
DOI : 10.1002/malq.19550010205

P. Odiffredi, Classical recursion theory, 1989.

H. Rogers, G??del numberings of partial recursive functions, The Journal of Symbolic Logic, vol.104, issue.03, pp.331-341, 1958.
DOI : 10.1002/malq.19550010205

H. Jr and . Rogers, Theory of Recursive Functions and Effective Computability, 1967.

R. M. Smullyan, Theory of Formal Systems, 1961.

R. M. Smullyan, Recursion Theory for Metamathematics, 1993.

R. M. Smullyan, Diagonalization and Self-Reference, 1994.

R. M. Smullyan, . Ph, and . Ithier, Theorie de la recursivite pour la mtamathematique, 1995.

P. Szor, The Art of Computer Virus Research and Defense, 2005.

K. Thompson, Reflections on trusting trust, Communications of the ACM, vol.27, issue.8, pp.761-763, 1965.
DOI : 10.1145/358198.358210

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.514.7639

V. A. Uspenskii, Enumeration operators and the concept of program, Uspekhi Matematicheskikh Nauk, issue.11, 1956.

J. Neumann, Theory of Self-Reproducing Automata, 1966.

Z. Zuo and M. Zhou, Some further theorical results about computer viruses, The Computer Journal, 2004.
DOI : 10.1093/comjnl/47.6.627

URL : http://comjnl.oxfordjournals.org/cgi/content/short/47/6/627