Automated sample creation of polymorphic and non-polymorphic marcro viruses JMY Boulay, AT Petrillo, MG Swimmer US Patent 6,108,799, 2000 | 358 | 2000 |
Method and apparatus for replicating and analyzing worm programs WC Arnold, DM Chess, JF Morar, A Segal, MG Swimmer, IN Whalley, ... US Patent 6,981,279, 2005 | 346 | 2005 |
Blueprint for a computer immune system J Kephart, G Sorkin, M Swimmer, S White Artificial immune systems and their applications, 242-261, 1999 | 176 | 1999 |
Method and apparatus for repairing damage to a computer system using a system rollback mechanism MG Swimmer, IN Whalley US Patent 7,188,368, 2007 | 148 | 2007 |
Preventing attacks in a data processing system MD Swimmer, A Wespi, DM Zamboni US Patent 7,555,777, 2009 | 113 | 2009 |
Anatomy of a commercial-grade immune system SR White, M Swimmer, EJ Pring, WC Arnold, DM Chess, JF Morar IBM Research White Paper, 1999 | 107 | 1999 |
Using the danger model of immune systems for distributed defense in modern data networks M Swimmer Computer Networks 51 (5), 1315-1333, 2007 | 65 | 2007 |
An immune system for cyberspace JO Kephart, GB Sorkin, M Swimmer 1997 IEEE International Conference on Systems, Man, and Cybernetics …, 1997 | 65 | 1997 |
Dynamic detection and classification of computer viruses using general behaviour patterns B Le Charlier, A Mounji, M Swimmer, VT Center International Virus Bulletin Conference, 1-22, 1995 | 64 | 1995 |
System and method for detecting and repairing document-infecting viruses using dynamic heuristics DM Chess, R Ford, JO Kephart, MG Swimmer US Patent 6,711,583, 2004 | 57 | 2004 |
Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment JF Morar, DM Chess, JO Kephart, MG Swimmer, SR White US Patent 6,678,822, 2004 | 53 | 2004 |
An environment for controlled worm replication and analysis I Whalley, B Arnold, D Chess, J Morar, A Segal, M Swimmer IBM TJ Watson Research Center 37, 2000 | 44 | 2000 |
Method and apparatus for exercising an unknown program with a graphical user interface A Segal, MG Swimmer, JM Boulay US Patent 6,766,475, 2004 | 36 | 2004 |
Elevating the discussion on security management: The data centric paradigm T Grandison, M Bilger, L O'Connor, M Graf, M Swimmer, M Schunter, ... 2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007 | 33 | 2007 |
Cyberattacks against intelligent transportation systems N Huq, R Vosseler, M Swimmer TrendLabs Research Paper, 2017 | 29 | 2017 |
Towards an ontology of malware classes M Swimmer Online] January 27, 2008 | 23 | 2008 |
Cyberattacks Against Intelligent Transportation Systems Assessing Future Threats to ITS N Huq, R Vosseler, M Swimmer Trend Micro: Tokyo, Japan, 2017 | 17 | 2017 |
Investigating sharing of cyber threat intelligence and proposing a new data model for enabling automation in knowledge representation and exchange S Bromander, M Swimmer, LP Muller, A Jøsang, M Eian, G Skjøtskift, ... Digital Threats: Research and Practice (DTRAP) 3 (1), 1-22, 2021 | 16 | 2021 |
Data-centric security M Bilger, L O’Connor, M Schunter, M Swimmer, N Zunic IBM Corporation (December 2006), http://www-935. ibm. com/services/us/cio …, 2006 | 11 | 2006 |
Concepts of an expert system for virus detection K Brunnstein, S Fisher-Hübner, M Swimmer Proceedings of the 7th IFIP International Conference and Exhibition on …, 1991 | 10 | 1991 |