-
1
-
-
0004048154
-
-
James P. Anderson Co, April, Fort Washington, PA
-
Anderson, J.P. (1980), Computer Security Threat Monitoring and Surveillance, James P. Anderson Co., April, Fort Washington, PA
-
(1980)
Computer Security Threat Monitoring and Surveillance
-
-
Anderson, J.P.1
-
3
-
-
1842659342
-
Classification of computer anomalies
-
1-4 October, Washington, DC
-
Brunnstein, K., Fischer-Hubner, S and Swimmer, M. (1990), “Classification of computer anomalies”, in Proceedings of 13th National Computer Security Conference, 1-4 October, Washington, DC, pp. 374-84
-
(1990)
Proceedings of 13th National Computer Security Conference
, pp. 374-384
-
-
Brunnstein, K.1
Fischer-Hubner, S.2
Swimmer, M.3
-
5
-
-
1842709396
-
Enhancing operating system authentication techniques
-
to appear in, 3-6 July, Plymouth
-
Dowland, P.S. and Furnell, S.M. (2000), “Enhancing operating system authentication techniques”, to appear in Proceedings of the Second International Network Conference (INC 2000), 3-6 July, Plymouth
-
(2000)
Proceedings of the Second International Network Conference (INC 2000)
-
-
Dowland, P.S.1
Furnell, S.M.2
-
6
-
-
1842659340
-
Data security in European healthcare information systems
-
PhD Thesis, University of Plymouth, UK
-
Furnell, S.M. (1995), “Data security in European healthcare information systems”, PhD Thesis, University of Plymouth, UK
-
(1995)
-
-
Furnell, S.M.1
-
7
-
-
1842709392
-
A survey of computer abuse
-
10-12 October, London
-
Gliss, H. (1990), “A survey of computer abuse”, in Proceedings of Compsec 90 International, 10-12 October, London, pp. 495-517
-
(1990)
Proceedings of Compsec 90 International
, pp. 495-517
-
-
Gliss, H.1
-
8
-
-
0005661981
-
Question-and-answer passwords: an empirical evalution
-
Haga, W.J. and Zviran, M. (1991), “Question-and-answer passwords: an empirical evalution”, Information Systems, Vol. 16 No. 3, pp. 335-43
-
(1991)
Information Systems
, vol.16
, Issue.3
, pp. 335-343
-
-
Haga, W.J.1
Zviran, M.2
-
9
-
-
0024771499
-
A survey of password mechanisms: part 1
-
Jobusch, D.L. and Oldehoeft, A.E. (1989), “A survey of password mechanisms: part 1”, Computers & Security, Vol. 8 No. 7, pp. 587-604
-
(1989)
Computers & Security
, vol.8
, Issue.7
, pp. 587-604
-
-
Jobusch, D.L.1
Oldehoeft, A.E.2
-
10
-
-
1842709394
-
IDES: an intelligent system for detecting intruders
-
November, Rome, Italy
-
Lunt, T.F. (1990), “IDES: an intelligent system for detecting intruders”, in Proceedings of the Symposium: Computer Security, Threat and Countermeasures, November, Rome, Italy
-
(1990)
Proceedings of the Symposium: Computer Security, Threat and Countermeasures
-
-
Lunt, T.F.1
-
11
-
-
84936893490
-
Vital signs of identity
-
February
-
Miller, B. (1994), “Vital signs of identity”, IEEE Spectrum, February
-
(1994)
IEEE Spectrum
-
-
Miller, B.1
-
12
-
-
1842709393
-
Password security: a case history’
-
in, Bell Laboratories, (1983)
-
Morris, R. and Thompson, K. (1978), “Password security: a case history’’, in UNIX Time-Sharing System: UNIX Programmer's Manual, seventh edition, Bell Laboratories (1983), pp. 595-601
-
(1978)
UNIX Time-Sharing System: UNIX Programmer's Manual, seventh edition
, pp. 595-601
-
-
Morris, R.1
Thompson, K.2
-
13
-
-
0028430224
-
Network intrusion detection’
-
Mukherjee, B., Heberlein, L.T. and Levitt, K.N. (1994), “Network intrusion detection’’, IEEE Networks, Vol. 8 No. 3, pp. 26-41
-
(1994)
IEEE Networks
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
14
-
-
1842810391
-
-
National Computing Centre, National Computing Centre Limited, Manchester, UK
-
National Computing Centre (1998), BISS '98 – Information Security. The True Cost to Business, National Computing Centre Limited, Manchester, UK
-
(1998)
BISS '98 – Information Security. The True Cost to Business
-
-
-
15
-
-
1842810387
-
Participational management and the implementation of multimedia systems
-
Southampton, UK
-
Warren, M.J., Sanders, P.W. and Gaunt, P.N. (1995), “Participational management and the implementation of multimedia systems”, in Proceedings of MEDIACOMM 95 – International Conference on Multimedia Communications, Southampton, UK, pp. 131-5
-
(1995)
Proceedings of MEDIACOMM 95 – International Conference on Multimedia Communications
, pp. 131-135
-
-
Warren, M.J.1
Sanders, P.W.2
Gaunt, P.N.3
-
16
-
-
1842709391
-
Securing the distributed environment: a question of trust
-
Wolfe, A.D. (1992), “Securing the distributed environment: a question of trust”, Patricia Seybold's Network Monitor, Vol. 7 No. 1, pp. 3-19
-
(1992)
Patricia Seybold's Network Monitor
, vol.7
, Issue.1
, pp. 3-19
-
-
Wolfe, A.D.1
|