2005 |
7 | EE | Steven A. Hofmeyr:
Host intrusion prevention: Part of the operating system or on top of the operating system?
Computers & Security 24(6): 440-442 (2005) |
2004 |
6 | EE | Steven A. Hofmeyr:
The implications of immunology for secure systems design.
Computers & Security 23(6): 453-455 (2004) |
2000 |
5 | | Steven A. Hofmeyr,
Stephanie Forrest:
Architecture for an Artificial Immune System.
Evolutionary Computation 8(4): 443-473 (2000) |
1998 |
4 | | Steven A. Hofmeyr,
Stephanie Forrest,
Anil Somayaji:
Intrusion Detection Using Sequences of System Calls.
Journal of Computer Security 6(3): 151-180 (1998) |
1997 |
3 | | Stephanie Forrest,
Steven A. Hofmeyr,
Anil Somayaji:
Computer Immunology.
Commun. ACM 40(10): 88-96 (1997) |
2 | | Andrew P. Kosoresow,
Steven A. Hofmeyr:
Intrusion Detection via System Call Traces.
IEEE Software 14(5): 35-42 (1997) |
1996 |
1 | EE | Stephanie Forrest,
Steven A. Hofmeyr,
Anil Somayaji,
Thomas A. Longstaff:
A Sense of Self for Unix Processes.
IEEE Symposium on Security and Privacy 1996: 120-128 |