-
1
-
-
0004200684
-
Computer security technology planning study
-
U.S. Air Force Electronic System Division Technical Report 73-51, October
-
Anderson J., "Computer security technology planning study," U.S. Air Force Electronic System Division Technical Report 73-51, October 1972.
-
(1972)
-
-
Anderson, J.1
-
2
-
-
4243284763
-
Linux security toolkit
-
IDG Books
-
Bandel D. "Linux Security Toolkit," IDG Books, 2000.
-
(2000)
-
-
Bandel, D.1
-
3
-
-
84949501111
-
Less harm, less worry or how to improve network security by bounding system offensiveness
-
Bruschi D., Cavallaro L., Rosti E., "Less harm, less worry or how to improve network security by bounding system offensiveness," Proceedings of ACSAC '00, 16th Annual Computer Security Application Conference, New Orleans, pp 188-195, 2000.
-
(2000)
Proceedings of ACSAC '00, 16th Annual Computer Security Application Conference, New Orleans
, pp. 188-195
-
-
Bruschi, D.1
Cavallaro, L.2
Rosti, E.3
-
4
-
-
0034593306
-
Disarming offense to facilitate defense
-
Sept.
-
Bruschi D., Rosti E., "Disarming offense to facilitate defense," Proceedings of the New Security Paradigm Workshop 2000, Ireland, pp 69-75, Sept. 2000.
-
(2000)
Proceedings of the New Security Paradigm Workshop 2000, Ireland
, pp. 69-75
-
-
Bruschi, D.1
Rosti, E.2
-
5
-
-
0242697281
-
TCP SYN flooding attacks and IP spoofing attacks
-
CERT-CC; CERT Advisory CA-96.21
-
CERT-CC, "TCP SYN flooding attacks and IP Spoofing attacks," CERT Advisory CA-96.21, http://www.cert.org, 1996-98.
-
(1996)
-
-
-
6
-
-
0011192575
-
IP denial of service attacks
-
CERT-CC; CERT Advisory CA-97.28
-
CERT-CC, "IP Denial of service attacks," CERT Advisory CA-97.28, http://www.cert.org, 1997-98.
-
(1997)
-
-
-
7
-
-
0242528412
-
-
Computer Security Institute
-
Computer Security Institute, http://www.gocsi.com/prelea_00321.htm.
-
-
-
-
8
-
-
0242444903
-
Detecting source code of attacks that increase privilege
-
Cunningham R., Rieser A., "Detecting source code of attacks that increase privilege," presented at RAID 2000, available at http://www.raid-symposium.org/raid2000/Materials/Abstracts/53/53.pdf
-
RAID 2000
-
-
Cunningham, R.1
Rieser, A.2
-
9
-
-
0033724116
-
IRM enforcement of java stack inspection
-
May
-
Erlingsson, U., Schneider, F.B., "IRM Enforcement of Java Stack Inspection", Proceedings of the IEEE Symposium on Security and Privacy, pp. 246-55, May 2000.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 246-255
-
-
Erlingsson, U.1
Schneider, F.B.2
-
10
-
-
84940106242
-
Hardening COTS software with generic software wrappers
-
Fraser T., Badger L., Feldman M., "Hardening COTS software with generic software wrappers," Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.
-
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1999
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
11
-
-
0004066524
-
The latest in denial of service attacks: Smurfing. Description and information to minimize effects
-
last update Feb.
-
Huegen C., "The latest in denial of service attacks: smurfing. Description and information to minimize effects," http://users.quadrunner.com/chuegen/smurf.cgi, last update Feb. 2000.
-
(2000)
-
-
Huegen, C.1
-
12
-
-
0002179618
-
Protection
-
Jan.
-
Lampson B., "Protection," republished in Proc. of the 5th Princeton Symposium, Operating System Review, Vol 8, No 1, pp 18-24, Jan. 1974.
-
(1974)
Proc. of the 5th Princeton Symposium, Operating System Review
, vol.8
, Issue.1
, pp. 18-24
-
-
Lampson, B.1
-
14
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
Sekar R., Uppuluri P., "Synthesizing fast intrusion prevention/detection systems from high-level specifications," Proceedings of the Usenix Security Symposium, pp, 1999.
-
(1999)
Proceedings of the Usenix Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
|