메뉴 건너뛰기




Volumn 8, Issue 2, 2000, Pages 65-75

A conceptual architecture for real-time intrusion monitoring

Author keywords

Access control; Computer security; Information technology; Monitoring; User studies

Indexed keywords

INFORMATION TECHNOLOGY; MONITORING; REAL TIME SYSTEMS; USER INTERFACES;

EID: 0008302890     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220010321317     Document Type: Article
Times cited : (17)

References (16)
  • 6
    • 1842659340 scopus 로고
    • Data security in European healthcare information systems
    • PhD Thesis, University of Plymouth, UK
    • Furnell, S.M. (1995), “Data security in European healthcare information systems”, PhD Thesis, University of Plymouth, UK
    • (1995)
    • Furnell, S.M.1
  • 7
    • 1842709392 scopus 로고
    • A survey of computer abuse
    • 10-12 October, London
    • Gliss, H. (1990), “A survey of computer abuse”, in Proceedings of Compsec 90 International, 10-12 October, London, pp. 495-517
    • (1990) Proceedings of Compsec 90 International , pp. 495-517
    • Gliss, H.1
  • 8
    • 0005661981 scopus 로고
    • Question-and-answer passwords: an empirical evalution
    • Haga, W.J. and Zviran, M. (1991), “Question-and-answer passwords: an empirical evalution”, Information Systems, Vol. 16 No. 3, pp. 335-43
    • (1991) Information Systems , vol.16 , Issue.3 , pp. 335-343
    • Haga, W.J.1    Zviran, M.2
  • 9
    • 0024771499 scopus 로고
    • A survey of password mechanisms: part 1
    • Jobusch, D.L. and Oldehoeft, A.E. (1989), “A survey of password mechanisms: part 1”, Computers & Security, Vol. 8 No. 7, pp. 587-604
    • (1989) Computers & Security , vol.8 , Issue.7 , pp. 587-604
    • Jobusch, D.L.1    Oldehoeft, A.E.2
  • 11
    • 84936893490 scopus 로고
    • Vital signs of identity
    • February
    • Miller, B. (1994), “Vital signs of identity”, IEEE Spectrum, February
    • (1994) IEEE Spectrum
    • Miller, B.1
  • 13
  • 14
  • 16
    • 1842709391 scopus 로고
    • Securing the distributed environment: a question of trust
    • Wolfe, A.D. (1992), “Securing the distributed environment: a question of trust”, Patricia Seybold's Network Monitor, Vol. 7 No. 1, pp. 3-19
    • (1992) Patricia Seybold's Network Monitor , vol.7 , Issue.1 , pp. 3-19
    • Wolfe, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.