Author of the publication

Randomized instruction set emulation to disrupt binary code injection attacks.

, , , , and . ACM Conference on Computer and Communications Security, page 281-289. ACM, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Connectionist Algorithm for Genetic Search.. ICGA, page 121-135. Lawrence Erlbaum Associates, (1985)Uniform Subtree Mutation, and . Genetic Programming, Proceedings of the 5th European Conference, EuroGP 2002, volume 2278 of LNCS, page 152--161. Kinsale, Ireland, Springer-Verlag, (3-5 April 2002)Building Diverse Computer Systems., , and . Workshop on Hot Topics in Operating Systems, page 67-72. IEEE Computer Society, (1997)Comparison Criticality in Sorting Algorithms., and . DSN, page 726-731. IEEE Computer Society, (2014)Adaptation in Constant Utility Non-Stationary Environments., and . Proceedings of the Fourth International Conference on Genetic Algorithms, page 136--142. San Francisco, CA: Morgan Kaufmann, (1991)A Case for Lamarckian Evolution?, and . Proceedings of the Workshop on Artificial Life (ALIFE '92), Reading, MA: Addison-Wesley, (1994)Open-Ended Evolution: Perspectives from the OEE Workshop in York., , , , , , , , , and 15 other author(s). Artif. Life, 22 (3): 408-423 (2016)Randomized instruction set emulation to disrupt binary code injection attacks., , , , and . ACM Conference on Computer and Communications Security, page 281-289. ACM, (2003)Computation in the Wild., , , and . The Internet as a Large-Scale Complex System, Oxford University Press, (2005)Building a survivable protocell for a corrosive digital environment.. ALIFE, page 111-118. MIT Press, (2019)