L. Adleman, An Abstract Theory of Computer Viruses, Advances in Cryptology ? CRYPTO'88, 1988.
DOI : 10.1007/0-387-34799-2_28

M. Blum, A Machine-Independent Theory of the Complexity of Recursive Functions, Journal of the ACM, vol.14, issue.2, pp.322-336, 1967.
DOI : 10.1145/321386.321395

G. Bonfante, M. Kaczmarek, and J. Marion, Toward an Abstract Computer Virology, ICTAC, pp.579-593, 2005.
DOI : 10.1007/11560647_38

URL : https://hal.archives-ouvertes.fr/inria-00115208

G. Bonfante, M. Kaczmarek, and J. Marion, On Abstract Computer Virology from a Recursion Theoretic Perspective, Journal in Computer Virology, vol.23, issue.3, pp.3-4, 2006.
DOI : 10.1007/s11416-005-0007-4

URL : https://hal.archives-ouvertes.fr/inria-00115199

J. Case, Periodicity in generations of automata, Theory of Computing Systems, pp.15-32, 1974.
DOI : 10.1007/BF01761704

D. Chess and S. White, An undetectable computer virus, Proceedings of the, 2000.

F. Cohen, Computer viruses, Computers & Security, vol.6, issue.1, 1986.
DOI : 10.1016/0167-4048(87)90122-2

F. Cohen, On the implications of computer viruses and methods of defense, Computers & Security, vol.7, issue.2, pp.167-184, 1988.
DOI : 10.1016/0167-4048(88)90334-3

O. Drori, N. Pappo, and D. Yachan, New malware distribution methods threaten signature-based av, Virus Bulletin, pp.9-11, 2005.

T. Hansen, T. Nikolajsen, J. Träff, and N. Jones, Experiments with implementations of two theoretical constructions, In Lecture Notes in Computer Science, vol.363, pp.119-133, 1989.
DOI : 10.1007/3-540-51237-3_11

N. Jones, Computer implementation and applications of kleene's S-m-n and recursive theorems, Lecture Notes in Mathematics Logic From Computer Science, pp.243-263, 1991.

N. Jones, Computability and Complexity from a Programming Perspective, 1997.
DOI : 10.1007/978-94-010-0413-8_4

N. Jones, matter, Proceedings of the twenty-fifth annual ACM symposium on Theory of computing , STOC '93, 1997.
DOI : 10.1145/167088.167244

URL : https://hal.archives-ouvertes.fr/in2p3-00703940

S. Kleene, Introduction to Metamathematics, 1952.

M. Ludwig, The Giant Black Book of Computer Viruses, 1998.

L. Moss, Recursion theorems and self-replication via text register machine programs, EATCS bulletin, 2006.

P. Odiffredi, Classical Recursion Theory, 1989.

H. Rogers, Theory of Recursive Functions and Effective Computability, 1967.

M. Sipser, Introduction to the Theory of Computation, ACM SIGACT News, vol.27, issue.1, 1996.
DOI : 10.1145/230514.571645

R. Smullyan, Recursion Theory for Metamathematics, 1993.

R. Smullyan, Diagonalization and Self-Reference, 1994.

P. Ször, The Art of Computer Virus Research and Defense, 2005.

K. Thompson, Reflections on trusting trust, Communications of the ACM, vol.27, issue.8, pp.761-763, 1984.
DOI : 10.1145/358198.358210

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Neumann, Theory of Self-Reproducing Automata, 1966.

Z. Zuo and M. Zhou, Some Further Theoretical Results about Computer Viruses, The Computer Journal, vol.47, issue.6, pp.627-633, 2004.
DOI : 10.1093/comjnl/47.6.627

URL : http://comjnl.oxfordjournals.org/cgi/content/short/47/6/627

Z. Zuo, Q. Zhu, and M. Zhou, On the Time Complexity of Computer Viruses, IEEE Transactions on Information Theory, vol.51, issue.8, pp.2962-2966, 2005.
DOI : 10.1109/TIT.2005.851780