![]() | ![]() |
2005 | ||
---|---|---|
7 | EE | Steven A. Hofmeyr: Host intrusion prevention: Part of the operating system or on top of the operating system? Computers & Security 24(6): 440-442 (2005) |
2004 | ||
6 | EE | Steven A. Hofmeyr: The implications of immunology for secure systems design. Computers & Security 23(6): 453-455 (2004) |
2000 | ||
5 | Steven A. Hofmeyr, Stephanie Forrest: Architecture for an Artificial Immune System. Evolutionary Computation 8(4): 443-473 (2000) | |
1998 | ||
4 | Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji: Intrusion Detection Using Sequences of System Calls. Journal of Computer Security 6(3): 151-180 (1998) | |
1997 | ||
3 | Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji: Computer Immunology. Commun. ACM 40(10): 88-96 (1997) | |
2 | Andrew P. Kosoresow, Steven A. Hofmeyr: Intrusion Detection via System Call Traces. IEEE Software 14(5): 35-42 (1997) | |
1996 | ||
1 | EE | Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff: A Sense of Self for Unix Processes. IEEE Symposium on Security and Privacy 1996: 120-128 |
1 | Stephanie Forrest | [1] [3] [4] [5] |
2 | Andrew P. Kosoresow | [2] |
3 | Thomas A. Longstaff | [1] |
4 | Anil Somayaji | [1] [3] [4] |