-
1
-
-
0041489879
-
Clinton, IT execs huddle on anti-hack-attack plan
-
Bacheldor, B. (2000). Clinton, IT execs huddle on anti-hack-attack plan. Informationweek (774), 167.
-
(2000)
Informationweek
, Issue.774
, pp. 167
-
-
Bacheldor, B.1
-
2
-
-
0002082632
-
The developmental duality of information systems security
-
Baskerville, R. (1992). The developmental duality of information systems security. The Journal of Management Systems, 4(1), 1-12.
-
(1992)
The Journal of Management Systems
, vol.4
, Issue.1
, pp. 1-12
-
-
Baskerville, R.1
-
3
-
-
84900087781
-
A framework for evaluation of security provided by firewalls
-
Atlanta: Georgia State University
-
Baskerville, R., & Portougal, V. (2000). A Framework for Evaluation of Security Provided by Firewalls (Working Paper). Atlanta: Georgia State University.
-
(2000)
Working Paper
-
-
Baskerville, R.1
Portougal, V.2
-
4
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Bass, T. (2000). Intrusion detection systems and multisensor data fusion. Communications of the ACM, 43(4), 99-105.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
5
-
-
0035665469
-
A comparison of intrusion detection systems
-
Biermann, E., Cloete, E., & Venter, L. M. (2001). A comparison of intrusion detection systems. Computers & Security, 20(8), 676-683.
-
(2001)
Computers & Security
, vol.20
, Issue.8
, pp. 676-683
-
-
Biermann, E.1
Cloete, E.2
Venter, L.M.3
-
6
-
-
0041489880
-
-
Montvale, NJ: National Association of Accountants
-
Corr, A. (1983). The Capital Expenditure Decision. Montvale, NJ: National Association of Accountants.
-
(1983)
The Capital Expenditure Decision
-
-
Corr, A.1
-
7
-
-
0041489878
-
A digital D-day?
-
August 31 (3593 Industrial/Technology Edition)
-
Crock, S. (1998). A digital D-day? Business Week, August 31 (3593 Industrial/Technology Edition), 15.
-
(1998)
Business Week
, pp. 15
-
-
Crock, S.1
-
9
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst, R., Champion, T., Witten, B., Miller, E., & Spagnuolo, L. (1999). Testing and evaluating computer intrusion detection systems. Communications of the ACM, 42(7), 53-61.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
10
-
-
0034825084
-
NIDS - Pattern search vs. protocol decode
-
Graham, R. (2001). NIDS - Pattern search vs. Protocol decode. Computers & Security, 20(1), 37-41.
-
(2001)
Computers & Security
, vol.20
, Issue.1
, pp. 37-41
-
-
Graham, R.1
-
11
-
-
0041489877
-
Protecting an invaluable and ever-widening infrastructure
-
Lukasik, S. J., Greenberg, L. T., & Goodman, S. E. (1998). Protecting an invaluable and ever-widening infrastructure. Communications of the ACM, 41(6), 1116.
-
(1998)
Communications of the ACM
, vol.41
, Issue.6
, pp. 1116
-
-
Lukasik, S.J.1
Greenberg, L.T.2
Goodman, S.E.3
-
12
-
-
0041990843
-
Sketching a national information warfare defense plan
-
Munro, N. (1996). Sketching a national information warfare defense plan. Communications of the ACM, 39(11), 15-17.
-
(1996)
Communications of the ACM
, vol.39
, Issue.11
, pp. 15-17
-
-
Munro, N.1
-
13
-
-
0042992516
-
Protecting the infrastructures
-
Neumann, P. G. (1998). Protecting the infrastructures. Communications of the ACM, 41(1), 128.
-
(1998)
Communications of the ACM
, vol.41
, Issue.1
, pp. 128
-
-
Neumann, P.G.1
-
14
-
-
84962333563
-
Defensive information warfare
-
Panda, B., & Giordano, J. (1999). Defensive information warfare. Communications of the ACM, 42(7), 30-32.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 30-32
-
-
Panda, B.1
Giordano, J.2
-
17
-
-
0035248930
-
Stochastic scheduling with optimal customer service
-
Portougal, V., & Trietsch, D. (2001). Stochastic scheduling with optimal customer service. The Journal of the Operational Research Society, 52(2), 226-223.
-
(2001)
The Journal of the Operational Research Society
, vol.52
, Issue.2
, pp. 226-223
-
-
Portougal, V.1
Trietsch, D.2
-
18
-
-
0000010513
-
Network based intrusion detection: A review of technologies
-
Richards, K. (1999). Network based intrusion detection: A review of technologies. Computers & Security, 18(8), 671-682.
-
(1999)
Computers & Security
, vol.18
, Issue.8
, pp. 671-682
-
-
Richards, K.1
-
19
-
-
0041990842
-
New tool makes attacks undetectable
-
Schultz, E. (2002). New tool makes attacks undetectable. Computers & Security, 21(4), 301-302.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 301-302
-
-
Schultz, E.1
-
21
-
-
49349133217
-
Fuzzy Sets as a basis for a theory of possibility
-
Zadeh, L. A. (1978). Fuzzy Sets as a basis for a theory of possibility. Fuzzy Sets Systems, 1, 3-28.
-
(1978)
Fuzzy Sets Systems
, vol.1
, pp. 3-28
-
-
Zadeh, L.A.1
-
22
-
-
0040431304
-
Data mining for network intrusion detection: A comparison of alternative methods
-
Zhu, D., Premkumar, G., Zhang, X., & Chu, C.-H. (2001). Data mining for network intrusion detection: A comparison of alternative methods. Decision Sciences, 32(4), 635-660.
-
(2001)
Decision Sciences
, vol.32
, Issue.4
, pp. 635-660
-
-
Zhu, D.1
Premkumar, G.2
Zhang, X.3
Chu, C.-H.4
|