메뉴 건너뛰기




Volumn , Issue , 2000, Pages 31-38

A requires/provides model for computer attacks

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; COMPUTER PROGRAMMING LANGUAGES; COMPUTER SYSTEMS; NETWORK PROTOCOLS;

EID: 0034593179     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/366173.366187     Document Type: Conference Paper
Times cited : (280)

References (14)
  • 7
    • 0031190959 scopus 로고    scopus 로고
    • Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
    • IEEE, July-Aug. 1997
    • Guha, B.; Mukherjee, B. (1997) Network security via reverse engineering of TCP code: vulnerability analysis and proposed solutions. IEEE Network, vol. 11, (no.4), IEEE, July-Aug. 1997. p.40-8.
    • (1997) IEEE Network , vol.11 , Issue.4 , pp. 40-48
    • Guha, B.1    Mukherjee, B.2
  • 9
    • 84893511281 scopus 로고    scopus 로고
    • Tripwire: A case study in integrity monitoring
    • D. Denning and P. Denning, editors, Addison-Wesley, 1997
    • Kim, G. and Spafford, E. H. (1997) Tripwire: A Case Study in Integrity Monitoring. In D. Denning and P. Denning, editors, Interact Beseiged: Countering Cyberspace Scofflaws, Addison-Wesley, 1997.
    • (1997) Interact Beseiged: Countering Cyberspace Scofflaws
    • Kim, G.1    Spafford, E.H.2
  • 11
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • Ko, Calvin, Fink, George, and Levitt, Karl (1997) Execution Monitoring of Security-critical Programs in Distributed Systems: A Specification-based Approach, In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 134-144
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 14
    • 85084161252 scopus 로고    scopus 로고
    • NetKuang - A multi-host configuration vulnerability checker
    • San Jose, CA. July 1996
    • Zerkle, Dan and Levitt, Karl (1996) NetKuang - A multi-host configuration vulnerability checker. In Proceedings of the 6th USENIX UNIX Security Symposium. San Jose, CA. July 1996, p. 195-2
    • (1996) Proceedings of the 6th USENIX UNIX Security Symposium , pp. 195-202
    • Zerkle, D.1    Levitt, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.