J. Aycock, Computer Viruses and Malware, 2006.

P. Beaucamps, On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, 2007.
DOI : 10.1007/s11416-006-0029-6

URL : https://hal.archives-ouvertes.fr/inria-00338074

F. Cohen, Computer viruses -theory and experiments Eric Filiol Strong cryptography armoured computer viruses forbidding code analysis: the BRADLEY virus Computer viruses: from theory to applications, Proceedings of the 14th EICAR conference. [Fil05] ´ Eric Filiol, 1984.

M. Ludwig, Computer Viruses, Artificial Life and Evolution, 1993.

M. Ludwig, The Giant Black Book of Computer Viruses, 1995.

G. Marsaglia and . Xorshift-rngs, [MDa] The Mental Driller. METAPHOR source code. Version 1D available at, Journal of Statistical Software, vol.8, issue.14, 2003.

. Midnyte, An introduction to encryption Available at: http://vx.netlux.org, p.506, 1999.

J. Riordan and B. Schneier, Environmental Key Generation Towards Clueless Agents, Lecture Notes In Computer Science, pp.15-24, 1998.
DOI : 10.1007/3-540-68671-1_2

A. Shevchenko, The evolution of self-defense technologies in malware Available at: http://www.net-security.org/article.php?id=1028, 2007.

D. Spinellis, Reliable identification of bounded-length viruses is NP-complete, IEEE Transactions on Information Theory, vol.49, issue.1, pp.280-284, 2003.
DOI : 10.1109/TIT.2002.806137

P. Szor, The Art of Computer Virus Research and Defense, 2005.

P. Beaucamps, C. Phd, and F. Loria-in-nancy, He works on the modelization of viral infections, and on formal and practical malware detection and protection. Contact address: Loria, ´ Equipe Carte, p.54603