Follow
Morton Swimmer
Morton Swimmer
Trend Micro
Verified email at swimmer.org
Title
Cited by
Cited by
Year
Automated sample creation of polymorphic and non-polymorphic marcro viruses
JMY Boulay, AT Petrillo, MG Swimmer
US Patent 6,108,799, 2000
3582000
Method and apparatus for replicating and analyzing worm programs
WC Arnold, DM Chess, JF Morar, A Segal, MG Swimmer, IN Whalley, ...
US Patent 6,981,279, 2005
3462005
Blueprint for a computer immune system
J Kephart, G Sorkin, M Swimmer, S White
Artificial immune systems and their applications, 242-261, 1999
1761999
Method and apparatus for repairing damage to a computer system using a system rollback mechanism
MG Swimmer, IN Whalley
US Patent 7,188,368, 2007
1482007
Preventing attacks in a data processing system
MD Swimmer, A Wespi, DM Zamboni
US Patent 7,555,777, 2009
1132009
Anatomy of a commercial-grade immune system
SR White, M Swimmer, EJ Pring, WC Arnold, DM Chess, JF Morar
IBM Research White Paper, 1999
1071999
Using the danger model of immune systems for distributed defense in modern data networks
M Swimmer
Computer Networks 51 (5), 1315-1333, 2007
652007
An immune system for cyberspace
JO Kephart, GB Sorkin, M Swimmer
1997 IEEE International Conference on Systems, Man, and Cybernetics …, 1997
651997
Dynamic detection and classification of computer viruses using general behaviour patterns
B Le Charlier, A Mounji, M Swimmer, VT Center
International Virus Bulletin Conference, 1-22, 1995
641995
System and method for detecting and repairing document-infecting viruses using dynamic heuristics
DM Chess, R Ford, JO Kephart, MG Swimmer
US Patent 6,711,583, 2004
572004
Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment
JF Morar, DM Chess, JO Kephart, MG Swimmer, SR White
US Patent 6,678,822, 2004
532004
An environment for controlled worm replication and analysis
I Whalley, B Arnold, D Chess, J Morar, A Segal, M Swimmer
IBM TJ Watson Research Center 37, 2000
442000
Method and apparatus for exercising an unknown program with a graphical user interface
A Segal, MG Swimmer, JM Boulay
US Patent 6,766,475, 2004
362004
Elevating the discussion on security management: The data centric paradigm
T Grandison, M Bilger, L O'Connor, M Graf, M Swimmer, M Schunter, ...
2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management …, 2007
332007
Cyberattacks against intelligent transportation systems
N Huq, R Vosseler, M Swimmer
TrendLabs Research Paper, 2017
292017
Towards an ontology of malware classes
M Swimmer
Online] January 27, 2008
232008
Cyberattacks Against Intelligent Transportation Systems Assessing Future Threats to ITS
N Huq, R Vosseler, M Swimmer
Trend Micro: Tokyo, Japan, 2017
172017
Investigating sharing of cyber threat intelligence and proposing a new data model for enabling automation in knowledge representation and exchange
S Bromander, M Swimmer, LP Muller, A Jøsang, M Eian, G Skjøtskift, ...
Digital Threats: Research and Practice (DTRAP) 3 (1), 1-22, 2021
162021
Data-centric security
M Bilger, L O’Connor, M Schunter, M Swimmer, N Zunic
IBM Corporation (December 2006), http://www-935. ibm. com/services/us/cio …, 2006
112006
Concepts of an expert system for virus detection
K Brunnstein, S Fisher-Hübner, M Swimmer
Proceedings of the 7th IFIP International Conference and Exhibition on …, 1991
101991
The system can't perform the operation now. Try again later.
Articles 1–20