1. Reynolds, J.C., Just, J., Clough, L., Maglich, R.: On-Line Intrusion Detection and Attack Prevention Using Diversity, Genrate-and-Test, and Generalization. In: Proceedings of the 36th Hawaii International Conference on System Science (HICSS) (2003)
2. Keromytis, A.D., Parekh, J., Gross, P.N., Kaiser, G., Misra, V., Nieh, J., Rubenstein, D., Stolfo, S.: A Holistic Approach to Service Survivability. In: Proceedings of the ACM Survivable and Self-Regenerative Systems Workshop, ACM Press, New York (2003)
3. Wang, X., Li, Z., Xu, J., Reiter, M. K., Kil, C., Choi, J.Y.: Packet Vaccine: Black-box Exploit Detection and Signature Generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), pp. 37–46. ACM Press, New York (2006)
4. Costa, M., Crowcroft, J., Castro, M., Rowstron, A.: Vigilante: End-to-End Containment of Internet Worms. In: Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP) (2005)
5. Gosling, J., Joy, B., Steele, G.: The Java Language Specification. Addison Wesley, Reading (1996)