Number | Name | Date | Kind |
---|---|---|---|
4371949 | Chu et al. | Feb 1983 | |
4479214 | Ryan | Oct 1984 | |
4621364 | Tschoepe | Nov 1986 | |
4926425 | Hedtke et al. | May 1990 | |
4964130 | Bowden, III et al. | Oct 1990 | |
4975950 | Lentz | Dec 1990 | |
5031180 | McIver et al. | Jul 1991 | |
5101409 | Hack | Mar 1992 | |
5121345 | Lentz | Jun 1992 | |
5138619 | Fasang et al. | Aug 1992 | |
5144659 | Jones | Sep 1992 | |
5144660 | Rose | Sep 1992 | |
5155844 | Chang et al. | Oct 1992 | |
5263032 | Porter et al. | Nov 1993 | |
5274646 | Brey et al. | Dec 1993 | |
5319776 | Hile et al. | Jun 1994 | |
5398196 | Chambers | Mar 1995 | |
5440723 | Arnold et al. | Aug 1995 | |
5442699 | Arnold et al. | Aug 1995 | |
5446741 | Boldt et al. | Aug 1995 | |
5452442 | Kephart | Sep 1995 | |
5475839 | Watson et al. | Dec 1995 | |
5485575 | Chess et al. | Jan 1996 | |
5493649 | Slivka et al. | Feb 1996 | |
5495491 | Snowden et al. | Feb 1996 | |
5511163 | Lerche et al. | Apr 1996 |
Entry |
---|
Phillippo, “Practical Virus Detection and Prevention”, IEE Colloq. No. 132, pp. 2/1-2/2, 1990.* |
Qasem et al. “Computer Viruses: Detectiona ND Prevention Techniques”, Southeastcon, IEEE Conf. Proceedings, pp. 199-201, 1990.* |
P. Roche, “Logic Signature Application”, IBM Technical Disclosure Bulletin, vol. 27, No.8, Jan. 1985, pp. 4943-4944. |
D. H. Steves et al., “Trojan Horse and Virus Detection Using Real-Time Auditing”, IBM Technical Disclosure Bulletin, vol. 34, No. 7B, Dec. 1991, pp. 78-81. |
T. R. N. Rao et al, “Error-Control Coding for Computer Systems”, 1989, Prentice-Hall, Inc. |
V. I. Levenshtein, “Binary Codes Capable of Correcting Deletions, Insertions, and Reversals”, Soviet Physics-Doklady, vol. 10, No. 8, Feb., 1966. |