메뉴 건너뛰기




Volumn 23, Issue , 2004, Pages 827-832

A classification of malicious software attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; COMPUTER PROGRAM LISTINGS; COMPUTER PROGRAMMING; ERROR ANALYSIS; INTERFACES (COMPUTER); SCANNING; SECURITY OF DATA; TURING MACHINES;

EID: 2442616960     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 3
    • 2442605789 scopus 로고
    • Technical Report ISI/SR-78-I3, Information Sciences Institute, University of Southern California. Presented and reference given in [5]
    • Bisbey II, R. and Hollingworth, D. (1978). Protection Analysis: Final Report. Technical Report ISI/SR-78-I3, Information Sciences Institute, University of Southern California. Presented and reference given in [5] pp. 665-670.
    • (1978) Protection Analysis: Final Report , pp. 665-670
    • Bisbey II, R.1    Hollingworth, D.2
  • 4
    • 0003487594 scopus 로고    scopus 로고
    • Technical Report CSE-96-11, Department of Computer Science, University of California at Davis
    • Bishop, M. and Bailey, D. (1996). A Critical Analysis of Vulnerability Taxonomies. Technical Report CSE-96-11, Department of Computer Science, University of California at Davis.
    • (1996) A Critical Analysis of Vulnerability Taxonomies
    • Bishop, M.1    Bailey, D.2
  • 6
    • 0004246220 scopus 로고
    • PhD thesis, University of Southern California
    • Cohen, F. (1985). Computer Viruses, PhD thesis, University of Southern California.
    • (1985) Computer Viruses
    • Cohen, F.1
  • 9
    • 0024050729 scopus 로고
    • Protection imperfect: The security of some computing environments
    • 22.3(1988)
    • Hogan, C.B. (1988). 'Protection Imperfect: The Security of Some Computing Environments'. Operating Systems Review 22.3(1988):7-27.
    • (1988) Operating Systems Review , pp. 7-27
    • Hogan, C.B.1
  • 17
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • 63.9(1975)
    • Saltzer, J.H. and Schroeder, M.D. (1975). "The protection of information in computer systems'. Proceedings of the IEEE 63.9(1975):1278-1308. http-//web-mitedu/Saltzer/www/publications/protection/
    • (1975) Proceedings of the IEEE , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.