The Use Of Heuristics In Identifying Self-Propagating Malicious Mobile Code