Jim Carlstedt et al., "Pattern-Directed Protection Evaluation", Information Sciences Institute Research Paper No. ISI/RR-75-31, Jun. 1975. |
Shieh et al., "Auditing the Use of Covert Storage Channels in Secure Systems", Proc. of the 1990 IEEE Symposium on Research in Security and Privacy, Oakland, Calif., May 6-9, 1990, pp. 285-295. |
A. H. Karp, "Protecting Against Infection by Computer Viruses", IBM Technical Disclosure Bulletin, vol. 33, No. 2, Jul. 1990, pp. 318-320. |
Shieh et al., "A Pattern-Oriented Intrusion-Detection Model and Its Applications", Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, Oakland, Calif., May 20-22, 1991. |