{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:28Z","timestamp":1750308928755,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036935","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"115-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Self-regenerative software components"],"prefix":"10.1145","author":[{"given":"Hassen","family":"Sa\u00efdi","sequence":"first","affiliation":[{"name":"SRI International, CA"}]},{"given":"Bruno","family":"Dutertre","sequence":"additional","affiliation":[{"name":"SRI International, CA"}]},{"given":"Joshua","family":"Levy","sequence":"additional","affiliation":[{"name":"SRI International, CA"}]},{"given":"Alfonso","family":"Valdes","sequence":"additional","affiliation":[{"name":"SRI International, CA"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/850926.851714"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378846"},{"key":"e_1_3_2_1_3_1","volume-title":"Model Checking","author":"Clarke E. M.","year":"1999","unstructured":"E. M. Clarke , O. Grunberg , and D. A. Peled . Model Checking . The MIT Press , Cambridge, Massachusetts , 1999 .]] E. M. Clarke, O. Grunberg, and D. A. Peled. Model Checking. The MIT Press, Cambridge, Massachusetts, 1999.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_5_1","first-page":"63","volume-title":"Proc. 7th USENIX Security Conference","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , J. Walpole , P. Bakke , S. Beattie , A. Grier , P. Wagle , Q. Zhang , and H. Hinton . StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks . In Proc. 7th USENIX Security Conference , pages 63 - 78 , Jan. 1998 .]] C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. 7th USENIX Security Conference, pages 63-78, Jan. 1998.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647540.730008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647766.733618"},{"key":"e_1_3_2_1_8_1","volume-title":"Dec.","author":"Levy J.","year":"2002","unstructured":"J. Levy , H. Sa\u00efdi , and T. E. Uribe . Combining monitors for run-time system verification. Electronic Notes in Theoretical Computer Science, 70(4) , Dec. 2002 .]] J. Levy, H. Sa\u00efdi, and T. E. Uribe. Combining monitors for run-time system verification. Electronic Notes in Theoretical Computer Science, 70(4), Dec. 2002.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Machine Learning","author":"Mitchell T. M.","year":"1997","unstructured":"T. M. Mitchell . Machine Learning . McGraw-Hill , 1997 .]] T. M. Mitchell. Machine Learning. McGraw-Hill, 1997.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(81)90110-9"},{"key":"e_1_3_2_1_12_1","first-page":"353","volume-title":"Proceedings of the 20th National Information Systems Security Conference","author":"Porras P.","year":"1997","unstructured":"P. Porras and P. Neumann . EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances . In Proceedings of the 20th National Information Systems Security Conference , pages 353 - 365 , Baltimore, MD , Oct. 1997 .]] P. Porras and P. Neumann. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In Proceedings of the 20th National Information Systems Security Conference, pages 353-365, Baltimore, MD, Oct. 1997.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX LISA'99","author":"Roesch M.","year":"1999","unstructured":"M. Roesch . Snort : Lightweight intrusion detection for networks . In USENIX LISA'99 , Nov. 1999 . www.snort.org.]] M. Roesch. Snort: Lightweight intrusion detection for networks. In USENIX LISA'99, Nov. 1999. www.snort.org.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/647169.760067"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/786768.786967"}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":15,"alternative-id":["10.1145\/1036921.1036935","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036935","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}