{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:22:40Z","timestamp":1763580160189,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265448","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":3,"title":["Functionality defense by heterogeneity: a new paradigm for securing systems"],"prefix":"10.1109","author":[{"given":"R.","family":"Sharman","sequence":"first","affiliation":[]},{"given":"H.R.","family":"Rao","sequence":"additional","affiliation":[]},{"given":"S.","family":"Upadhyaya","sequence":"additional","affiliation":[]},{"given":"P.","family":"Khot","sequence":"additional","affiliation":[]},{"given":"S.","family":"Manocha","sequence":"additional","affiliation":[]},{"given":"S.","family":"Ganguly","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"journal-title":"Auditing Intrusion Detection from Securing Windows 2000 Server","year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0029"},{"article-title":"The design and implementation of tripwire: a file system integrity checker","year":"1993","author":"kim","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.772901"},{"key":"ref17","article-title":"ED4I: Error Detection by Diverse Data and Duplicated Instructions","volume":"51","author":"nahmsuk","year":"2002","journal-title":"IEEE"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1996.558714"},{"article-title":"Medical Immunology, Tenth Edition, Lange Medical Books","year":"2001","author":"parslow","key":"ref19"},{"key":"ref4","first-page":"22","article-title":"Computer viruses. Computers and Security","volume":"6","author":"cohen","year":"1987"},{"key":"ref3","first-page":"132","article-title":"Information Immune Systems","author":"chao","year":"2002","journal-title":"Proceedings of The First International Conference on Artificial Immune Systems (ICARIS 2002)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/262793.262811"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WORDS.1997.609943"},{"key":"ref7","article-title":"The dawning of the autonomic computer era IBM Systems Journal","volume":"42","author":"ganek","year":"2003"},{"article-title":"How Your Immune System Works","year":"0","author":"brian","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion Detection Using Sequences of System Calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/12.2185"},{"journal-title":"Rand Report","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/568965.568966"},{"article-title":"The evolution of the Recovery Block concept","year":"1995","author":"randell","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1998.689471"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283742"},{"key":"ref25","article-title":"A New Architectural Approach for Self-Verification and Fault-Tolerance of Enterprise Servers","author":"upadhyaya","year":"0","journal-title":"15th International Conference on Parallel and Distributed Computing Systems (PDCS) 2002"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265448.pdf?arnumber=1265448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T08:01:25Z","timestamp":1527667285000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265448","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}