Material likely to be included in the next version of the book.


  • Numenta research papers
  • L. Olav, K.J. Hole, C. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes. “Vendor Malware: Detection Limits and Mitigation,” IEEE Computer, vol. 49, no. 8, 2016, 62–69
  • C.W. Otterstad and T. Yarygina, “Low-level Exploitation Mitigation by Diverse Microservices,” submitted to the 6th European Conference on Service-Oriented and Cloud Computing (ESOCC 2017), Oslo, Norway, Sep. 27–29, 2017