메뉴 건너뛰기




Volumn 32, Issue 4, 1999, Pages 57-63

Surviving Information Warfare Attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; INTERNET; ONLINE SEARCHING;

EID: 0344614689     PISSN: 00189162     EISSN: None     Source Type: Journal    
DOI: 10.1109/2.755006     Document Type: Article
Times cited : (29)

References (10)
  • 1
    • 0002538948 scopus 로고    scopus 로고
    • Storage Jamming
    • D.L. Spooner, S. A. Demurjian, and J.E. Dobson, eds., Chapman & Hall, London
    • J. McDermott and D. Goldschlag, “Storage Jamming,” Database Security IX: Status and Prospects, D.L. Spooner, S. A. Demurjian, and J.E. Dobson, eds., Chapman & Hall, London, 1996, pp. 365-381.
    • (1996) Database Security IX: Status and Prospects , pp. 365-381
    • McDermott, J.1    Goldschlag, D.2
  • 2
    • 0004026250 scopus 로고
    • Fault Tolerance: Principles and Practice
    • 2nd Ed., Springer-Verlag, Vienna
    • P.A. Lee and T. Anderson, Fault Tolerance: Principles and Practice, 2nd Ed., Springer-Verlag, Vienna, 1990.
    • (1990)
    • Lee, P.A.1    Anderson, T.2
  • 3
    • 0003997276 scopus 로고
    • Predictably Dependable Computing Systems
    • eds., Springer-Verlag, Berlin
    • B. Randell et al., eds., Predictably Dependable Computing Systems, Springer-Verlag, Berlin, 1995.
    • (1995)
    • Randell, B.1
  • 4
    • 0003851050 scopus 로고
    • Transaction Processing: Concepts and Techniques
    • Morgan Kaufmann, San Mateo, Calif.
    • J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques, Morgan Kaufmann, San Mateo, Calif., 1993.
    • (1993)
    • Gray, J.1    Reuter, A.2
  • 5
    • 0004131498 scopus 로고
    • Computer-Related Risks
    • Addison-Wesley, Reading, Mass.
    • P.G. Neumann, Computer-Related Risks, Addison-Wesley, Reading, Mass., 1995.
    • (1995)
    • Neumann, P.G.1
  • 6
    • 0030649084 scopus 로고    scopus 로고
    • Surviving Information Warfare Attacks on Databases
    • IEEE CS Press, Los Alamitos, Calif.
    • P. Ammann et al., “Surviving Information Warfare Attacks on Databases,” IEEE Symp. Security and Privacy (SP 97), IEEE CS Press, Los Alamitos, Calif., 1997, pp. 164-174.
    • (1997) IEEE Symp. Security and Privacy (SP 97) , pp. 164-174
    • Ammann, P.1
  • 7
    • 0003087020 scopus 로고    scopus 로고
    • Designing Masking Fault-Tolerance via Nonmasking Fault-Tolerance
    • A. Arora and S.S. Kulkarni, “Designing Masking Fault-Tolerance via Nonmasking Fault-Tolerance,” IEEE Trans. Software Eng., Vol. 24, No. 6, 1998, pp. 435-450.
    • (1998) IEEE Trans. Software Eng. , vol.24 , Issue.6 , pp. 435-450
    • Arora, A.1    Kulkarni, S.S.2
  • 8
    • 0023266943 scopus 로고
    • A Comparison of Commercial and Military Computer Security Policies
    • IEEE CS Press, Los Alamitos, Calif.
    • D.D. Clark and D.R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” IEEE Symp. Security and Privacy (SP 87), IEEE CS Press, Los Alamitos, Calif., 1987, pp. 184-194.
    • (1987) IEEE Symp. Security and Privacy (SP 87) , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 10
    • 0027609384 scopus 로고
    • A Survey of Intrusion Detection Techniques
    • T.F. Lunt, “A Survey of Intrusion Detection Techniques,” Computers & Security, Vol. 12, No. 4, 1993, pp. 405-418.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.