1. M. Bishop, “Computer Security: Art and Science”, Addison Wesly, 2003 2. A. Charnes and W. W. Cooper, “Chance-Constrained Programming,” Management Science, Vol. 6, No. 1, pp. 73-79, 1959 3. E. M. Hutchins, M. J. Cloppert,R. M. Amin, “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains,” Leading Issues in Information Warfare and Security Research, 2011 4. J. A. Tirpak, “Find, Fix, Track, Target, Engage, Assess,” The Air Force Magazine, Vol. 83, No. 7, pp. 24-29, 2000 5. R. Wahbe, S. Lucco, T. E. Anderson,S. L. Graham, “Efficient Software-based Fault Isolation,” inProceedings of the Fourteenth ACM Symposium on Operating Systems Principles, pp. 203-216, December 1993 6. F. A.Ameiri and K. Salah, “Evaluation of Popular Application Sandboxing,” inProceedings of International Conference for Internet Technology and Secured Transactions (IC- ITST), pp. 358-362, December 2011 7. T. Hunt, Z. Zhu, Y. Xu, S. Peter,E. Withchel, “Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data,” ACM Transactions on Computer Systems, Vol. 35, No. 4, pp. 1-32, 2018 8. T. Kim and N. Zeldovich. “Practical and Effective Sandbox for Non-root Users,” inProceedings of USENIX Annual Technical Conference, pp. 139-144, 2013 9. “Netblue30/Firejail: Linux Namespaces and Seccomp-Bpf Sandbox,”(https://github.com/netblue30/firejail) 10. “Google/Nsjail: A Light-Weight Process Isolation Tool, Making Use of Linux Namespaces and Secomp-Bpf Syscall Filters,”(https://github.com/google/nsjail) 11. I. A. Raknes, B. Fjukstad,L. A. Bongo, “Nsroot: Minimalist Process Isolation Tool Implemented with Linux Namespaces,” 2016 12. “IOTA Foundation: Consensus,”(https://blog.iota.org/consensus-in-the-iota-tangle-fpc-b98e0f1e8fa) |