Material likely to be included in the next version of the book.


  • Numenta research papers
  • D. Geer, Jr., A Rubicon, Hoover Institution Essay, Aegis Series Paper, no. 1801
  • K.J. Hole and C. Otterstad, “Software Systems with Antifragility to Downtime,” IEEE Computer, vol. 52, no. 2, 2019, 23–31.
  • C. Otterstad and T. Yarygina, “Low-level Exploitation Mitigation by Diverse Microservices,” in proc. 6th European Conference on Service-Oriented and Cloud Computing (ESOCC 2017), Oslo, Norway, Sept. 27–29, 2017
  • L. Olav, K.J. Hole, C. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes. “Vendor Malware: Detection Limits and Mitigation,” IEEE Computer, vol. 49, no. 8, 2016, 62–69