Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biologically Inspired Defenses Against Computer Viruses., , , , , and . IJCAI (1), page 985-996. Morgan Kaufmann, (1995)Measuring and modeling computer virus prevalence., and . S&P, page 2-15. IEEE Computer Society, (1993)ABYSS: A Trusted Architecture for Software Protection., and . S&P, page 38-51. IEEE Computer Society, (1987)Directed-Graph Epidemiological Models of Computer Viruses., and . S&P, page 343-361. IEEE Computer Society, (1991)A Multi-Agent Systems Approach to Autonomic Computing., , , , , , , and . AAMAS, page 464-471. IEEE Computer Society, (2004)ABYSS: An Architecture for Software Protection., and . IEEE Trans. Software Eng., 16 (6): 619-629 (1990)Autonomic computing: Architectural approach and prototype., , , , , and . Integr. Comput. Aided Eng., 13 (2): 173-188 (2006)Covert Distributed Processing with Computer Viruses.. CRYPTO, volume 435 of Lecture Notes in Computer Science, page 616-619. Springer, (1989)Unity: Experiences with a Prototype Autonomic Computing System., , , and . ICAC, page 140-147. IEEE Computer Society, (2004)An Architectural Approach to Autonomic Computing., , , , and . ICAC, page 2-9. IEEE Computer Society, (2004)