-
6
-
-
0025957717
-
Intelligence without representation
-
R. A. Brooks. Intelligence without representation. Artificial Intelligence, 47(1-3), 1991.
-
(1991)
Artificial Intelligence
, vol.47
, Issue.1-3
-
-
Brooks, R.A.1
-
7
-
-
60649084906
-
-
D. Brumley. invisible intruders: rootkits in practice. ;login: The Magazine of USENIX and SAGE, Sept. 1999.
-
D. Brumley. invisible intruders: rootkits in practice. ;login: The Magazine of USENIX and SAGE, Sept. 1999.
-
-
-
-
9
-
-
0042124619
-
In the game called Core War hostile programs engage in a battle of bits, Computer Recreations
-
May
-
A. K. Dewdney. In the game called Core War hostile programs engage in a battle of bits, Computer Recreations. Scientific American, May 1984.
-
(1984)
Scientific American
-
-
Dewdney, A.K.1
-
10
-
-
21644433634
-
Xen and the Art of Virtualization
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer. Xen and the Art of Virtualization. In Proc. of the ACM Symposium on Operating Systems Principles, 2003.
-
(2003)
Proc. of the ACM Symposium on Operating Systems Principles
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
13
-
-
50249180626
-
-
PhD thesis, Atlanta, GA, USA, Adviser-Henry L. Owen, III
-
J. B. Grizzard. Towards self-healing systems: re-establishing trust in compromised systems. PhD thesis, Atlanta, GA, USA, 2006. Adviser-Henry L. Owen, III.
-
(2006)
Towards self-healing systems: Re-establishing trust in compromised systems
-
-
Grizzard, J.B.1
-
23
-
-
60649103230
-
-
S. regenerative Systems (SRS) Program Phase II. Cognitive immunity and self-healing. In BAA 06-35 Proposer Information Pamphlet. Defense Advanced Research Projects Agency, 2006.
-
S. regenerative Systems (SRS) Program Phase II. Cognitive immunity and self-healing. In BAA 06-35 Proposer Information Pamphlet. Defense Advanced Research Projects Agency, 2006.
-
-
-
-
24
-
-
0003602325
-
The MD5 Message-Digest Algorithm
-
1321, Network Working Group, April
-
R. Rivest. The MD5 Message-Digest Algorithm. Technical Report Request For Comments 1321, Network Working Group, April 1992.
-
(1992)
Technical Report Request For Comments
-
-
Rivest, R.1
-
27
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In 20th ACM symposium on Operating systems principles, 2005.
-
(2005)
20th ACM symposium on Operating systems principles
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doorn, L.5
Khosla, P.6
-
28
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. SIGCOMM Comput. Commun. Rev., 31(4), 2001.
-
(2001)
SIGCOMM Comput. Commun. Rev
, vol.31
, Issue.4
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
29
-
-
27544461178
-
Detecting stealth software with Strider Ghost-Buster
-
Y.-M. Wang, D. Beck, B. Vo, R. Roussev, and C. Verbowski. Detecting stealth software with Strider Ghost-Buster. In Proc. of the International Conference on Dependable Systems and Networks, 2005.
-
(2005)
Proc. of the International Conference on Dependable Systems and Networks
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
31
-
-
77954517653
-
Secure Coprocessor-based Intrusion Detection
-
X. Zhang, L. van Doorn, T. Jaeger, R. Perez, and R. Sailer. Secure Coprocessor-based Intrusion Detection. In 10th ACM SIGOPS European Workshop, 2002.
-
(2002)
10th ACM SIGOPS European Workshop
-
-
Zhang, X.1
van Doorn, L.2
Jaeger, T.3
Perez, R.4
Sailer, R.5
|