Material likely to be included in the next version of the book.
- Numenta research papers
- L. Olav, K.J. Hole, C. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes. “Vendor Malware: Detection Limits and Mitigation,” IEEE Computer, vol. 49, no. 8, 2016, 62–69
- C.W. Otterstad and T. Yarygina, “Low-level Exploitation Mitigation by Diverse Microservices,” in proc. 6th European Conference on Service-Oriented and Cloud Computing (ESOCC 2017), Oslo, Norway, Sep. 27–29, 2017