메뉴 건너뛰기




Volumn 4, Issue 3, 1999, Pages 43-53

Footprinting for intrusion detection and threat assessment

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0346336040     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1363-4127(99)80078-8     Document Type: Article
Times cited : (8)

References (20)
  • 8
    • 0004118981 scopus 로고
    • The NIDES statistical component: Description and justification
    • March
    • Harold S. Javitz and Alfonso Valdes, The NIDES Statistical Component: Description and Justification, SRI Technical Report, March 1993.
    • (1993) SRI Technical Report
    • Javitz, H.S.1    Valdes, A.2
  • 11
    • 85030065499 scopus 로고
    • A theory of human motiviation
    • Heather Clark, John Chandler and Jim Barry (Eds), Chapman and Hall, ISBN 0-412-56410-6
    • A. H. Maslow, "A Theory of Human Motiviation", Heather Clark, John Chandler and Jim Barry (Eds), Organisation and Identities, Chapman and Hall, 1994, ISBN 0-412-56410-6.
    • (1994) Organisation and Identities
    • Maslow, A.H.1
  • 12
    • 0009373436 scopus 로고    scopus 로고
    • How hackers break in . . . And how they are caught
    • October
    • Carolyn P. Meinel, How Hackers Break In . . . and How They Are Caught, Scientific American, October 1998.
    • (1998) Scientific American
    • Meinel, C.P.1
  • 16
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore, MD, October
    • P.A. Porras and P.G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances, In: National Information Systems Security Conference, Baltimore, MD, October 1997, pp. 353-365.
    • (1997) National Information Systems Security Conference , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 17
    • 0024011325 scopus 로고
    • Stalking the Wily Hacker
    • May
    • Clifford Stoll, Stalking the Wily Hacker, Communications of the ACM, Vol. 31 (5), May 1988.
    • (1988) Communications of the ACM , vol.31 , Issue.5
    • Stoll, C.1
  • 18
    • 0003605887 scopus 로고
    • Doubleday, ISBN 0-370-31433-6
    • Clifford Stoll, The Cuckoo's Egg, Doubleday, 1989, ISBN 0-370-31433-6.
    • (1989) The Cuckoo's Egg
    • Stoll, C.1
  • 20
    • 0040749982 scopus 로고    scopus 로고
    • Cooperating security managers: Distributed intrusion detection systems
    • Elsevier Science Limited
    • Gregory White and Vdo Pooch, Cooperating Security Managers: Distributed Intrusion Detection Systems, Computers and Security, Vol. 15 (5), Elsevier Science Limited, 1996, pp. 441-450.
    • (1996) Computers and Security , vol.15 , Issue.5 , pp. 441-450
    • White, G.1    Pooch, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.