메뉴 건너뛰기




Volumn , Issue , 2001, Pages 63-69

AngeL: A tool to disarm computer systems

Author keywords

Attack; Computer and network security; Defense; Disarm; Monitor; Offense

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER SYSTEMS; SECURITY SYSTEMS;

EID: 0242456146     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 1
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • U.S. Air Force Electronic System Division Technical Report 73-51, October
    • Anderson J., "Computer security technology planning study," U.S. Air Force Electronic System Division Technical Report 73-51, October 1972.
    • (1972)
    • Anderson, J.1
  • 2
    • 4243284763 scopus 로고    scopus 로고
    • Linux security toolkit
    • IDG Books
    • Bandel D. "Linux Security Toolkit," IDG Books, 2000.
    • (2000)
    • Bandel, D.1
  • 5
    • 0242697281 scopus 로고    scopus 로고
    • TCP SYN flooding attacks and IP spoofing attacks
    • CERT-CC; CERT Advisory CA-96.21
    • CERT-CC, "TCP SYN flooding attacks and IP Spoofing attacks," CERT Advisory CA-96.21, http://www.cert.org, 1996-98.
    • (1996)
  • 6
    • 0011192575 scopus 로고    scopus 로고
    • IP denial of service attacks
    • CERT-CC; CERT Advisory CA-97.28
    • CERT-CC, "IP Denial of service attacks," CERT Advisory CA-97.28, http://www.cert.org, 1997-98.
    • (1997)
  • 7
    • 0242528412 scopus 로고    scopus 로고
    • Computer Security Institute
    • Computer Security Institute, http://www.gocsi.com/prelea_00321.htm.
  • 8
    • 0242444903 scopus 로고    scopus 로고
    • Detecting source code of attacks that increase privilege
    • Cunningham R., Rieser A., "Detecting source code of attacks that increase privilege," presented at RAID 2000, available at http://www.raid-symposium.org/raid2000/Materials/Abstracts/53/53.pdf
    • RAID 2000
    • Cunningham, R.1    Rieser, A.2
  • 11
    • 0004066524 scopus 로고    scopus 로고
    • The latest in denial of service attacks: Smurfing. Description and information to minimize effects
    • last update Feb.
    • Huegen C., "The latest in denial of service attacks: smurfing. Description and information to minimize effects," http://users.quadrunner.com/chuegen/smurf.cgi, last update Feb. 2000.
    • (2000)
    • Huegen, C.1
  • 14
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • Sekar R., Uppuluri P., "Synthesizing fast intrusion prevention/detection systems from high-level specifications," Proceedings of the Usenix Security Symposium, pp, 1999.
    • (1999) Proceedings of the Usenix Security Symposium
    • Sekar, R.1    Uppuluri, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.