메뉴 건너뛰기




Volumn 31, Issue 23, 1999, Pages 2477-2487

Intrusion detection systems as evidence

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER PRIVACY; DATA PRIVACY; LAWS AND LEGISLATION; SECURITY OF DATA; SIGNAL DETECTION;

EID: 0033295914     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1389-1286(99)00113-9     Document Type: Article
Times cited : (41)

References (11)
  • 1
    • 85031569955 scopus 로고    scopus 로고
    • President's National Security Telecommunications Advisory Committee (NTSAC) Network Group Intrusion Detection Subgroup
    • President's National Security Telecommunications Advisory Committee (NTSAC) Network Group Intrusion Detection Subgroup, available on http://www.ntsac.org as FIDSGREP.PDF.
  • 3
    • 85031561940 scopus 로고    scopus 로고
    • ss 23-24 Criminal Justice Act, 1988, s 8 Civil Evidence Act 1995
    • ss 23-24 Criminal Justice Act, 1988, s 8 Civil Evidence Act 1995.
  • 4
    • 85031570635 scopus 로고    scopus 로고
    • s 78 Police and Criminal Evidence Act, 1984
    • s 78 Police and Criminal Evidence Act, 1984.
  • 6
    • 85031559592 scopus 로고    scopus 로고
    • Court of Appeal, July 31, 1996
    • Court of Appeal, July 31, 1996.
  • 7
    • 85031575787 scopus 로고    scopus 로고
    • Frye v US 293 F. 1013 (D.C. Cir. 1923)
    • Frye v US 293 F. 1013 (D.C. Cir. 1923).
  • 8
    • 85031560671 scopus 로고    scopus 로고
    • Daubert v. Merrell Dow Pharmaceuticals Inc. 113 S.Ct. 2786, 1993
    • Daubert v. Merrell Dow Pharmaceuticals Inc. 113 S.Ct. 2786, 1993.
  • 9
    • 85031576992 scopus 로고    scopus 로고
    • Beyond the rule in Mohan: A new model for assessing the reliability of scientific evidence
    • L.P. Brad, Beyond the rule in Mohan: a new model for assessing the reliability of scientific evidence, Toronto Law Review 54 (1).
    • Toronto Law Review , vol.54 , Issue.1
    • Brad, L.P.1
  • 10
    • 85031573942 scopus 로고    scopus 로고
    • Evidence from cyberspace: Downloads, logs and captures
    • P. Sommer, Evidence from cyberspace: downloads, logs and captures, Journal of Financial Crime 5JFC2, 138-152.
    • Journal of Financial Crime 5JFC2 , pp. 138-152
    • Sommer, P.1
  • 11
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic support for secure logs on untrusted machines
    • USENIX Press, January
    • B. Schneier, J. Kelsey, Cryptographic support for secure logs on untrusted machines, The Seventh USENIX Security Symposium Proceedings, USENIX Press, January 1998, pp. 53-62.
    • (1998) The Seventh USENIX Security Symposium Proceedings , pp. 53-62
    • Schneier, B.1    Kelsey, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.