Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biologically Inspired Defenses Against Computer Viruses., , , , , and . IJCAI (1), page 985-996. Morgan Kaufmann, (1995)Directed-Graph Epidemiological Models of Computer Viruses., and . S&P, page 343-361. IEEE Computer Society, (1991)Measuring and modeling computer virus prevalence., and . S&P, page 2-15. IEEE Computer Society, (1993)ABYSS: A Trusted Architecture for Software Protection., and . S&P, page 38-51. IEEE Computer Society, (1987)A Multi-Agent Systems Approach to Autonomic Computing., , , , , , , and . AAMAS, page 464-471. IEEE Computer Society, (2004)Covert Distributed Processing with Computer Viruses.. CRYPTO, volume 435 of Lecture Notes in Computer Science, page 616-619. Springer, (1989)Autonomic computing: Architectural approach and prototype., , , , , and . Integr. Comput. Aided Eng., 13 (2): 173-188 (2006)Unity: Experiences with a Prototype Autonomic Computing System., , , and . ICAC, page 140-147. IEEE Computer Society, (2004)An Architectural Approach to Autonomic Computing., , , , and . ICAC, page 2-9. IEEE Computer Society, (2004)Emergent Behavior in Information Economies., , , , , , and . ICMAS, page 441-442. IEEE Computer Society, (1998)