-
1
-
-
85030050694
-
-
Joint Program Office for Special Technology Countermeasures, September 30, 1996
-
Agudo, 1996. Assessment of Electric Power Control Systems Security, Joint Program Office for Special Technology Countermeasures, September 30, 1996.
-
(1996)
Assessment of Electric Power Control Systems Security
-
-
Agudo1
-
7
-
-
0017629542
-
A unified method for the specification and verification of protocols
-
Toronto, 1977
-
Bochmann, G.V. and Gecsei, J., 1977. A Unified Method for the Specification and Verification of Protocols, IFIP Congress, Toronto, 1977, pp. 229-234.
-
(1977)
IFIP Congress
, pp. 229-234
-
-
Bochmann, G.V.1
Gecsei, J.2
-
9
-
-
0021558192
-
Computer viruses - Theory and experiments
-
Toronto, 1984
-
Cohen, F., 1984. Computer Viruses - Theory and Experiments, IFIP TC-11 Conference, Toronto, 1984.
-
(1984)
IFIP TC-11 Conference
-
-
Cohen, F.1
-
10
-
-
0042686337
-
Algorithmic authentication of identification
-
January 1985
-
Cohen, F., 1985. Algorithmic Authentication of Identification, Information Age, January 1985, pp. 35-41, 7, 1.
-
(1985)
Information Age
, pp. 35-41
-
-
Cohen, F.1
-
11
-
-
0022131794
-
A secure computer network design, IFIP, TC-11
-
1985
-
Cohen, F., 1985b . A Secure Computer Network Design, IFIP, TC-11, Computers & Security, Vol. 4, No. 3, 1985, pp. 189-205.
-
(1985)
Computers & Security
, vol.4
, Issue.3
, pp. 189-205
-
-
Cohen, F.1
-
13
-
-
0023331449
-
Protection and administration of information networks under partial orderings, IFI
-
1987
-
Cohen, F., 1987. Protection and Administration of Information Networks under Partial Orderings, IFIP-TC11, Computers & Security, Vol. 6, 1987, pp. 118-128.
-
(1987)
Computers & Security
, vol.6
, pp. 118-128
-
-
Cohen, F.1
-
15
-
-
0042686330
-
-
Masters Thesis, The Pennsylvania State University, College Park, PA, 1988
-
Cohen, F., 1988. A New Integrity-Based Model for Limited Protection Against Computer Viruses, Masters Thesis, The Pennsylvania State University, College Park, PA, 1988.
-
(1988)
A New Integrity-Based Model for Limited Protection Against Computer Viruses
-
-
Cohen, F.1
-
16
-
-
0042686338
-
Models of practical defenses against computer viruses, IFIP-TC11
-
1988
-
Cohen, F., 1988b. Models of Practical Defenses Against Computer Viruses, IFIP-TC11, Computers & Security, Vol. 7, No. 6, 1988.
-
(1988)
Computers & Security
, vol.7
, Issue.6
-
-
Cohen, F.1
-
19
-
-
0042686339
-
Operating systems protection through program evolution, IFIP-TC11
-
1994
-
Cohen, F., 1994b. Operating Systems Protection Through Program Evolution, IFIP-TC11, Computers & Security, 1994.
-
(1994)
Computers & Security
-
-
Cohen, F.1
-
20
-
-
0040825839
-
-
John Wiley and Sons, 1994
-
Cohen, F., 1994c. It's Alive!!!, John Wiley and Sons, 1994.
-
(1994)
It's Alive!!!
-
-
Cohen, F.1
-
22
-
-
85030049520
-
-
Task Order 90-SAIC-019, DoD Contract No. DCA 100-90-C-0058, December, 1993
-
Cohen, F. et al., 1993. Defensive Information Warfare -Information Assurance, Task Order 90-SAIC-019, DoD Contract No. DCA 100-90-C-0058, December, 1993.
-
(1993)
Defensive Information Warfare -information Assurance
-
-
Cohen, F.1
-
23
-
-
0042185237
-
Experiments on the impact of computer viruses on modern computer networks, IFIP-TC11
-
1994
-
Cohen, F., and Mishra, S., 1994. Experiments on the Impact of Computer Viruses on Modern Computer Networks, IFIP-TC11, Computers & Security, 1994.
-
(1994)
Computers & Security
-
-
Cohen, F.1
Mishra, S.2
-
25
-
-
85030055442
-
A secure world-wide-web server, IFIP-TC11
-
1997, in press
-
Cohen, F., 1997. A Secure World-Wide-Web Server, IFIP-TC11, Computers & Security, 1997, in press.
-
(1997)
Computers & Security
-
-
Cohen, F.1
-
27
-
-
85030040000
-
-
Power Research Institute, Draft, December 5, 1996, Palo Alto, California, USA
-
Power Research Institute, Draft, December 5, 1996, Palo Alto, California, USA.
-
-
-
-
28
-
-
0042185227
-
-
P.E. Green, Jr. Editor, Plenum Press, 1982.
-
Danthine, A.A.S., 1982. Protocol Representation with Finite State Machines, Computer Network Architectures and Protocols, P.E. Green, Jr. Editor, Plenum Press, 1982.
-
(1982)
Protocol Representation with Finite State Machines, Computer Network Architectures and Protocols
-
-
Danthine, A.A.S.1
-
29
-
-
0041684496
-
-
Ph.D. dissertation, Purdue Univ., West Lafayette, Indiana, USA, 1975
-
Denning, D.E., 1975. Secure Information Flow in Computer Systems, Ph.D. dissertation, Purdue Univ., West Lafayette, Indiana, USA, 1975.
-
(1975)
Secure Information Flow in Computer Systems
-
-
Denning, D.E.1
-
30
-
-
0016949746
-
A lattice model of secure information flow
-
1976
-
Denning, D.E., 1976. A Lattice Model of Secure Information Flow, Communications of the ACM, Vol. 19, No. 5, 1976, pp. 236-243.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
31
-
-
0004238984
-
-
Addison Wesley, Reading, Masachusetts, USA, 1982
-
Denning, D.E., 1982. Cryptography and Data Security, Addison Wesley, Reading, Masachusetts, USA, 1982.
-
(1982)
Cryptography and Data Security
-
-
Denning, D.E.1
-
33
-
-
0015641828
-
On the advantages of tagged architecture
-
July 1973
-
Feustal, E.A., 1973. On the Advantages of Tagged Architecture, IEEE Trans. on Computers C-22, No. 7, July 1973, pp. 644-656.
-
(1973)
IEEE Trans. on Computers
, vol.C-22
, Issue.7
, pp. 644-656
-
-
Feustal, E.A.1
-
35
-
-
0020647877
-
Modular verification of computer communication protocols
-
January 1983
-
Hailpern, B.T. and Owicki, S.S., 1983. Modular Verification of Computer Communication Protocols, IEEE Communications, Vol. 31, No. 1, January 1983.
-
(1983)
IEEE Communications
, vol.31
, Issue.1
-
-
Hailpern, B.T.1
Owicki, S.S.2
-
36
-
-
0016984825
-
Protection in operating systems
-
August 1976
-
Harrison, M. et al., 1976. Protection in Operating Systems. CACM, Vol.19, No. 8, August 1976, pp. 461-471.
-
(1976)
CACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
-
38
-
-
0003726062
-
-
Von Noisted, Reinhold, 1990
-
Hoffman, L.J., 1990. Rogue Programs: Viruses, Worms, and Trojan Horses, Von Noisted, Reinhold, 1990.
-
(1990)
Rogue Programs: Viruses, Worms, and Trojan Horses
-
-
Hoffman, L.J.1
-
39
-
-
0042185226
-
Cryptanalysts corner
-
January 1978
-
Knight, G., 1978. Cryptanalysts Corner, Cryptologia, Vol. 1, January 1978, pp. 68-74.
-
(1978)
Cryptologia
, vol.1
, pp. 68-74
-
-
Knight, G.1
-
40
-
-
0015672289
-
A note on the confinement problem
-
October 1973
-
Lampson, B.W., 1973. A Note on the Confinement Problem, CACM, 16(1), October 1973, pp. 613-615.
-
(1973)
CACM
, vol.16
, Issue.1
, pp. 613-615
-
-
Lampson, B.W.1
-
41
-
-
0020780166
-
The best available technologies for computer security
-
July 1983
-
Landwehr, C.E., 1983. The Best Available Technologies for Computer Security, IEEE Computer, Vol. 16, No. 7, July 1983.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
-
-
Landwehr, C.E.1
-
43
-
-
0000524153
-
Intrusion detection: Its role and validation
-
1992
-
Liepins, G.E. and Vaccaro, H.S., 1982. Intrusion Detection: Its Role and Validation, Computers & Security, Vol. 11, 1992, pp. 347-355.
-
(1982)
Computers & Security
, vol.11
, pp. 347-355
-
-
Liepins, G.E.1
Vaccaro, H.S.2
-
45
-
-
0018541899
-
Specification and validation of protocols
-
November 1979
-
Merlin, P.M., 1979. Specification and Validation of Protocols, IEEE Communications, Vol. 27, No. 11, November 1979.
-
(1979)
IEEE Communications
, vol.27
, Issue.11
-
-
Merlin, P.M.1
-
46
-
-
0004131498
-
-
Addison Wesley, ACM Press, 1995
-
Neumann, P.G., 1995. Computer Related Risks. Addison Wesley, ACM Press, 1995. Neumann, E and Parker, D., 1989. A Summary of Computer Misuse Techniques, Proceedings of the 12th National Computer Conference, October 1989.
-
(1995)
Computer Related Risks
-
-
Neumann, P.G.1
-
47
-
-
0000565716
-
A summary of computer misuse techniques
-
October 1989
-
Neumann, P.G., 1995. Computer Related Risks. Addison Wesley, ACM Press, 1995. Neumann, E and Parker, D., 1989. A Summary of Computer Misuse Techniques, Proceedings of the 12th National Computer Conference, October 1989.
-
(1989)
Proceedings of the 12th National Computer Conference
-
-
Neumann, E.1
Parker, D.2
-
48
-
-
85030035500
-
-
note
-
NSTAC, 1996. National Security Telecommunication Advisory Committee, Information Assurance Task Force - Electric Power Information Assurance Risk Assessment, November 1996 draft.
-
-
-
-
50
-
-
0042185219
-
Restoration in a flash - Using DS3 cross-connects
-
September 10, 1990
-
Pekarske, R., 1990. Restoration in a Flash - Using DS3 Cross-connects, Telephony, September 10, 1990.
-
(1990)
Telephony
-
-
Pekarske, R.1
-
52
-
-
0041684488
-
-
July 4, 1995
-
SAIC-IW, 1995. Information Warfare - Legal, Regulatory, Policy, and Organizational Considerations for Assurance, July 4, 1995.
-
(1995)
Information Warfare - Legal, Regulatory, Policy, and Organizational Considerations for Assurance
-
-
-
53
-
-
33646946462
-
Some experience with test sequence generation for protocols
-
C. Sunshine editor, North-Holland Publishing, 1982
-
Sarikaya, B and Bochmann, G.V., 1982. Some Experience with Test Sequence Generation for Protocols, Protocol Specification, Testing, and Verification II, C. Sunshine editor, North-Holland Publishing, 1982.
-
(1982)
Protocol Specification, Testing, and Verification II
-
-
Sarikaya, B.1
Bochmann, G.V.2
-
54
-
-
84890522850
-
Communications theory of secrecy systems
-
1949
-
Shannon, C., 1949. Communications Theory of Secrecy Systems, Bell Systems Technical Journal, 1949, pp. 656-715.
-
(1949)
Bell Systems Technical Journal
, pp. 656-715
-
-
Shannon, C.1
-
55
-
-
85030048142
-
-
Software Engineering Research Center, Computer Science Department, Purdue University, March 1992
-
Spafford, E., 1992. Common System Vulnerabilities, Software Engineering Research Center, Computer Science Department, Purdue University, March 1992.
-
(1992)
Common System Vulnerabilities
-
-
Spafford, E.1
-
56
-
-
0018520773
-
Formal techniques for protocol specification and verification
-
1979
-
Sunshine, C., 1979. Formal Techniques for Protocol Specification and Verification, IEEE Computer, 1979.
-
(1979)
IEEE Computer
-
-
Sunshine, C.1
-
57
-
-
0042185216
-
Weak links
-
1992
-
Thyfault, M.E. et al., 1992. Weak Links, Information Week, August 10, 1992, pp. 26-31.
-
(1992)
Information Week, August
, vol.10
, pp. 26-31
-
-
Thyfault, M.E.1
-
58
-
-
84960561455
-
On computable numbers, with an application to the entscheidungs problem
-
November 12, 1936
-
Turing, A., 1936. On Computable Numbers, with an Application to the Entscheidungs Problem, London Math Soc. Ser 2., Vol 42, November 12, 1936, pp. 230-265.
-
(1936)
London Math Soc. Ser 2
, vol.42
, pp. 230-265
-
-
Turing, A.1
-
59
-
-
0022218742
-
Electromagnetic radiation from video display units: An eavesdropping risk?
-
1985
-
van Eck, W., 1985. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, Computers & Security, Vol 4, 1985, pp. 269-286.
-
(1985)
Computers & Security
, vol.4
, pp. 269-286
-
-
Van Eck, W.1
-
60
-
-
0027590418
-
A model for detecting the existence of software corruptions in real-time, IFIP-TC11
-
1993
-
Voas, J. et al., 1993. A Model for Detecting the Existence of Software Corruptions in Real-Time, IFIP-TC11, Computers & Security, Vol. 12, No. 3, 1993, pp. 275-283.
-
(1993)
Computers & Security
, vol.12
, Issue.3
, pp. 275-283
-
-
Voas, J.1
-
61
-
-
0043187339
-
Misdirected phone call shuts down local power
-
July 1995
-
Winkelman, 1995. Misdirected phone call shuts down local power, ACM SIGSOFT Software Engineering Notes, Vol. 20, No. 3; July 1995, pp. 7-8.
-
(1995)
ACM SIGSOFT Software Engineering Notes
, vol.20
, Issue.3
, pp. 7-8
-
-
Winkelman1
-
62
-
-
85030034393
-
Western systems coordinating council
-
August 10, 1996, draft
-
WSCC, 1996. Western Systems Coordinating Council, WSCC Preliminary System Disturbance Report, August 10, 1996, draft.
-
(1996)
WSCC Preliminary System Disturbance Report
-
-
|