Yau S S et al, “An Interactive Software Maintenance Environment,” AFIPS Conference Proceedings, pp. 553, 555-561, Jun. 1987. |
Saito T et al, “Protection Against Trojan Horses by Source Code Analysis,” Electronics & Communications in Japan, Part III—Fundamental Electronic Science, pp. 11-18, Jan. 1994. |
Lo R et al, “Towards a Testbed for Malicious Code Detection,” Computer Society Annual Conference, p. 160-166, 1991. |
Deri L., Mankis D., “VRML: Adding 3D to Network Management”, 4th International Conference on Intelligence in Services and Networks, pp. 469-477, May 27-29, 1997. |
Law A M et al, “Simulation Software for Communications Networks: The State of the Art,” IEEE Communications Magazine, vol. 32, No. 3, pp. 44-50, Mar. 1, 1994. |
Chang C K; Al-Saloan Y Y; Defanti T, Scientific Visualization: A Performance Study of CSMA/CD with Connected Data Links—(Hybrid-Ethernet), Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems, pp. 389-394, Apr. 14-16, 1992. |
PCT International Search Report dated Dec. 2, 2000 for PCT/US99/12394 dated Jul. 20, 1999, Dec. 2, 1999. |
PCT International Search Report dated Nov. 17, 1999 for PCT/US99/12393 dated Jul. 20, 1999. |
PCT International Search Report dated Dec. 1, 1999 for PCT/US/99/16467 dated Jul. 20, 1999. |