“Artificial Immunity for Personal computers” IBM Technical Disclosure Bulletin, Jul. 1991 vol. 34 No.2, pp. 150-154. |
Patent Search Results, “Detecting and Eliminating Stealth Computer Viruses”. |
“Software Anti-Virus Facility”, PCT Gazette, No. 47/1996. |
“Czech Anti-Virus Software Aimed At US Market”, Newsbytes News Network (1995), Sep. 15, 1995. |
“New ‘Dr. Solomon's Anti-Virus’ To Ship”, Newsbytes News Network (1995), Aug. 28, 1995. |
“Reflex Plans Windows 95 Virus Scanner”, Newsbytes News Network (1995), Jul. 5, 1995. |
“UK -Sophos Intros Virus Scanner For Windows NT”, Newsbytes News Network (1993), Aug. 22, 1994. |
“Antivirus Software -Tale of Two AV Scanners”, Barry Simon, PC Magazine, Dec. 17, 1996, pp. 52, 54. |
“Limiting the Damage Potential of Discretionary Trojan Horses”, Paul A. Karger, 1987 IEEE Symposium on Security and Privacy, IEEE (1987), pp. 32-37. |
“A Multilevel File System for High Assurance”, Cynthia E. Irvine, 1995 IEEE Symposium on Security and Privacy, pp. 78-87. |
“A Proposal for a Verification-Based Virus Filter”, Steve Crocker et al., 1989 IEEE Symposium on Security and Privacy, IEEE (1989), pp. 319-24. |
“The Security Policy of the Secure Distributed Operating System Prototype”, Norman Proctor et al., 1989 5th IEEE Computer Security Applications Conference, IEEE (1990), pp. 95-102. |
“Trustable Computing in Next-Generation Avionic Architectures”, James O. Bondi, 1992 8th IEEE Computer Security Applications Conference, IEEE (1992), pp. 10-19. |
“USTAT: A Real-time Intrusion Detection System for UNIX”, Koral Ilgun, 1993 IEEE Symposium on Security and Privacy, IEEE (1993), pp. 16-28. |
“A Generic Virus Scanner in C++”, Sandeep Kumar et al., 1992 8th IEEE Computer Security Applications Conference, IEEE (1992), pp. 210-19. |
“A Fault Tolerant Approach To Computer Viruses”, Mark K. Joseph et al., 1988 IEEE Symposium on Security and Privacy, IEEE (1988), pp. 52-57. |
“A Comparison of Secure UNIX Operating Systems”, Raymond M. Wong, 1990 6th IEEE Computer Security Applications Conference, IEEE (1990), pp. 322-33. |
“A DOS-Based POset Implementation”, Frederick B. Cohen, Computers & Security, vol. 10, No. 6 (1991), Elsevier Science Publishers Ltd. (1991), pp. 541-51. |
“Defense-in-Depth Against Computer Viruses”, Frederick B. Cohen, Computers & Security, vol. 11, No. 6 (1992), Elsevier Science Publishers Ltd. (1992), pp. 563-79. |