| www.sdl.sri.com/projects/saw/overview.html.* |
| Michem et al., Linux kernal loadable wrappers, DARPA Informationi Surivivability Conference and Exposition, 2000, DISCEX '00, Proceedings, vol. 2, Jan. 25-27, 2000, pp. 296-307, vol. 2.* |
| Badger, Information security: from reference monitors to wrapopers, Aerospace and Electronic Systems Magazine, IEEE, vol. 13, Issue 3, Mar. 1998, pp. 32-33.* |
| Sewell et al., Secure composition of untrusted code: wrappers and causality types, Computer Security Foundations Workshop, 2000, CSFW-13, Proceedings, 13th IEEE, Jul. 3-5, 2000, pp. 269-284.* |
| “Detecting Intrusions Using System Calls: Alternative Data Models” Christina Warrender et al., 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society pp. 133-145. |
| “Intrusion Detection Using Sequences of System Calls”, Steven A. Hofmeyr et al., Department of Computer Science, University of New Mexico, pp. 1-34, and Revisions Made to the Paper (7) pages, Dec. 17, 1997. |
| “Intrusion Detection Using Sequences of System Calls”, Steven A. Hofmeyr et al., Department of Computer Science, University of New Mexico, pp. 1-25, Aug. 18, 1998. |
| “Hardening COTS Software with Generic Software Wrappers” Timothy Fraser et al., 1999 IEEE Symposium on Security and Privacy, (15) pages. |
| “Distance Between Strings”, www.cut-the-knot.com/do_you_know/Strings.html, pp. 1-2, printed Feb. 29, 2000. |
| “Alignments, the Basis for Sequence Comparison”http://rrna/uia.ac.be/˜peter/doctoraat/ali/html, pp. 1-7, printed Mar. 22, 2000. |
| D. Kilpatrick and L. Badger, “Sequence-Based Intrusion Detection Using Generic Software Wrappers,” 1999 IEEE Symposium on Security and Privacy, May 9-12, 1999 (with abstract and program schedule). |