The quest for intruder-proof computer systems | IEEE Journals & Magazine | IEEE Xplore