-
1
-
-
84967419665
-
The ever-growing virus crisis
-
A. Salkever, The ever-growing virus crisis. In Business Week Online, http://www.businessweek.com/technology/content/aug2003/tc20030826 4386 tc047.htm.
-
Business Week Online
-
-
Salkever, A.1
-
2
-
-
84967514266
-
Attacks on the internet in 2003
-
R. Pethia, Attacks on the internet in 2003. In Congressional Testimony, http://usinfo.state.gov/journals/itgic/1103/ijge/gjlla.htm.
-
Congressional Testimony
-
-
Pethia, R.1
-
3
-
-
84967363794
-
Sobig.F breaks speed records
-
G. Law, Sobig.f breaks speed records. In PC World, http://www.pcworld.com/news/article/0, aid,112108,00.asp.Computervirus, http://en.wikipedia.org/wiki/.
-
PC World
-
-
Law, G.1
-
5
-
-
84883386223
-
Abstraction-based intrusion detection in distributed environments
-
(Nov
-
P. Ning, S. Jajodia, and X. Y. Wang, Abstraction-based intrusion detection in distributed environments, ACM Transactions on Information and System Security, 4(4), (Nov. 2001).
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.4
-
-
Ning, P.1
Jajodia, S.2
Wang, X.Y.3
-
7
-
-
0031280588
-
Fighting computer viruses
-
(Nov
-
J. Kephart, G. Sorkin, D. Chess, and S. White, Fighting computer viruses, Scientific American, (Nov. 1997).
-
(1997)
Scientific American
-
-
Kephart, J.1
Sorkin, G.2
Chess, D.3
White, S.4
-
9
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
May
-
P. D’haeseleer, S. Forrest, and P. Helman, An immunological approach to change detection: algorithms, analysis and implications, In IEEE Symposium on Security and Privacy, pp. 110-119, (May, 1996).
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 110-119
-
-
D’haeseleer, P.1
Forrest, S.2
Helman, P.3
-
10
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
May
-
M. Schultz, E. Eskin, F. Zadok, and S. J. Stolfo, Data mining methods for detection of new malicious executables. In IEEE Symposium on Security and Privacy, pp. 38-49, (May, 2001).
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.1
Eskin, E.2
Zadok, F.3
Stolfo, S.J.4
-
13
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, A sense of self for unix processes. In 1996 IEEE Symposium on Computer Security and Privac, pp. 120-128, (1996).
-
(1996)
1996 IEEE Symposium on Computer Security and Privac
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
0031258214
-
Computer immunology
-
S. Forrest, S. Hofmeyr, and A. Somayaji, Computer immunology, Communications of the ACM, 40(10), 88-96, (1997).
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
15
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, A. Somayaji, and S. Forrest, Intrusion detection using sequences of system calls, Journal of Computer Security, 6, 151-180, (1998).
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Somayaji, A.2
Forrest, S.3
-
20
-
-
0018995481
-
Preventing software piracy with crypto-microprocessors
-
R. M. Best, Preventing software piracy with crypto-microprocessors. In IEEE Spring COMPCON 80, pp. 466-469, (Feb. 1980).
-
(1980)
IEEE Spring COMPCON 80, Pp. 466-469
-
-
Best, R.M.1
-
22
-
-
21644434531
-
Dyad: A system for using physically secure coprocessors
-
J. D. Tygar and B. Yee, Dyad: A system for using physically secure coprocessors. In IP Workshop Proceedings, (1994).
-
(1994)
IP Workshop Proceedings
-
-
Tygar, J.D.1
Yee, B.2
-
23
-
-
2642578695
-
An introduction to citadel — a secure crypto coprocessor for workstations
-
Y. R. Palmer, An introduction to citadel — a secure crypto coprocessor for workstations. In the IFIP SEC94 Conference, (1994).
-
(1994)
The IFIP SEC94 Conference
-
-
Palmer, Y.R.1
-
25
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
Nov
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz, Architectural support for copy and tamper resistant software. In the 9th Internationaleonference on Architectural Support for Programming Languages and Operating Systems, pp. 168-177, (Nov. 2000).
-
(2000)
The 9Th Internationaleonference on Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
28
-
-
33645215766
-
Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
-
Apr
-
Z. Shao, C. Xue, Q. Zhuge, M. Qiu, B. Xiao, and E. H.-M. Sha, Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software, IEEE Trans, on Computers, 55(4), 443-453, (Apr., 2006).
-
(2006)
IEEE Trans, on Computers
, vol.55
, Issue.4
, pp. 443-453
-
-
Shao, Z.1
Xue, C.2
Zhuge, Q.3
Qiu, M.4
Xiao, B.5
Sha, E.H.6
-
29
-
-
40449085159
-
Dependability and security will change embedded computing
-
D. Serpanos and J. Henkel, Dependability and security will change embedded computing, IEEE Computer, 41 (1), 103-105, (Jan. 2008).
-
(2008)
IEEE Computer
, vol.41
, Issue.1
, pp. 103-105
-
-
Serpanos, D.1
Henkel, J.2
-
30
-
-
39849091652
-
Where does security stand? New vulnerabilities vs. Trusted computing
-
(Dec
-
S. Gueron, G. Stronqin, J. Seifert, D. Chiou, R. Sendag, and J. Yi, Where does security stand? new vulnerabilities vs. trusted computing, IEEE Micro., 27(6), 25-35, (Dec. 2007).
-
(2007)
IEEE Micro
, vol.27
, Issue.6
, pp. 25-35
-
-
Gueron, S.1
Stronqin, G.2
Seifert, J.3
Chiou, D.4
Sendag, R.5
Yi, J.6
|