-
3
-
-
0032256131
-
Protecting IT systems from cyber crime
-
R. Benjamin, B. Gladman and B. Randell, Protecting IT systems from Cyber Crime, The Computer Journal, Vol. 41 (7), 1999.
-
(1999)
The Computer Journal
, vol.41
, Issue.7
-
-
Benjamin, R.1
Gladman, B.2
Randell, B.3
-
5
-
-
0003527984
-
-
Prentice-Hall, ISBN 0-13-216987-8
-
Douglas E. Comer, Internetworking with TCP/IP: Volume 1 - Principles, Protocols, and Architecture, Third Edition, Prentice-Hall, 1995, ISBN 0-13-216987-8.
-
(1995)
Internetworking with TCP/IP: Volume 1 - Principles, Protocols, and Architecture, Third Edition
, vol.1
-
-
Comer, D.E.1
-
7
-
-
0012292276
-
A neutral network approach towards intrusion detection
-
Washington, DC, October
-
Kevin L. Fox, Ronda R. Henning, Jonathan H. Read and Richard Simonian, A Neutral Network Approach Towards Intrusion Detection, In: Proceedings of the 13th National Computer Security Conference, Washington, DC, October 1990, pp. 125-134.
-
(1990)
Proceedings of the 13th National Computer Security Conference
, pp. 125-134
-
-
Fox, K.L.1
Henning, R.R.2
Read, J.H.3
Simonian, R.4
-
8
-
-
0004118981
-
The NIDES statistical component: Description and justification
-
March
-
Harold S. Javitz and Alfonso Valdes, The NIDES Statistical Component: Description and Justification, SRI Technical Report, March 1993.
-
(1993)
SRI Technical Report
-
-
Javitz, H.S.1
Valdes, A.2
-
10
-
-
0343302295
-
IDES: An enhanced prototype, a real-time intrusion-detection expert system
-
SRI-CSL-88-12
-
T. Lunt, R. Jagannathan, R. Lee, S. Listgarten, D. L Edwards, P. G. Neumann, H.D. Javit and A. Valdes, IDES: An Enhanced Prototype, A Real-Time Intrusion-Detection Expert System, SRI International Report, SRI-CSL-88-12, 1988.
-
(1988)
SRI International Report
-
-
Lunt, T.1
Jagannathan, R.2
Lee, R.3
Listgarten, S.4
Edwards, D.L.5
Neumann, P.G.6
Javit, H.D.7
Valdes, A.8
-
11
-
-
85030065499
-
A theory of human motiviation
-
Heather Clark, John Chandler and Jim Barry (Eds), Chapman and Hall, ISBN 0-412-56410-6
-
A. H. Maslow, "A Theory of Human Motiviation", Heather Clark, John Chandler and Jim Barry (Eds), Organisation and Identities, Chapman and Hall, 1994, ISBN 0-412-56410-6.
-
(1994)
Organisation and Identities
-
-
Maslow, A.H.1
-
12
-
-
0009373436
-
How hackers break in . . . And how they are caught
-
October
-
Carolyn P. Meinel, How Hackers Break In . . . and How They Are Caught, Scientific American, October 1998.
-
(1998)
Scientific American
-
-
Meinel, C.P.1
-
16
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, MD, October
-
P.A. Porras and P.G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances, In: National Information Systems Security Conference, Baltimore, MD, October 1997, pp. 353-365.
-
(1997)
National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
17
-
-
0024011325
-
Stalking the Wily Hacker
-
May
-
Clifford Stoll, Stalking the Wily Hacker, Communications of the ACM, Vol. 31 (5), May 1988.
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
-
-
Stoll, C.1
-
18
-
-
0003605887
-
-
Doubleday, ISBN 0-370-31433-6
-
Clifford Stoll, The Cuckoo's Egg, Doubleday, 1989, ISBN 0-370-31433-6.
-
(1989)
The Cuckoo's Egg
-
-
Stoll, C.1
-
20
-
-
0040749982
-
Cooperating security managers: Distributed intrusion detection systems
-
Elsevier Science Limited
-
Gregory White and Vdo Pooch, Cooperating Security Managers: Distributed Intrusion Detection Systems, Computers and Security, Vol. 15 (5), Elsevier Science Limited, 1996, pp. 441-450.
-
(1996)
Computers and Security
, vol.15
, Issue.5
, pp. 441-450
-
-
White, G.1
Pooch, V.2
|