-
1
-
-
0008302889
-
"Use of a taxonomy of security faults"
-
Technical Report TR-96-051, COAST Laboratory, Department of Computer Sciences, Purdue University, IN
-
Aslam, T., Krsul, I. and Spafford, E. (1996), "Use of a taxonomy of security faults", Technical Report TR-96-051, COAST Laboratory, Department of Computer Sciences, Purdue University, IN.
-
(1996)
-
-
Aslam, T.1
Krsul, I.2
Spafford, E.3
-
3
-
-
85167528504
-
-
Syngress Publishing, Rockland, MA
-
Beale, J., Foster, J.C. and Posluns, J. (2003), Snort 2.0 Intrusion Detection, Syngress Publishing, Rockland, MA.
-
(2003)
Snort 2.0 Intrusion Detection
-
-
Beale, J.1
Foster, J.C.2
Posluns, J.3
-
4
-
-
0003872263
-
-
Stockton Press, New York, NY
-
Caelli, W., Longley, D. and Shain, M. (1991), Information Security Handbook, Stockton Press, New York, NY.
-
(1991)
Information Security Handbook
-
-
Caelli, W.1
Longley, D.2
Shain, M.3
-
5
-
-
33746585668
-
"The case against Robert Hanssen"
-
CNN.com available at
-
CNN.com (2002), "The case against Robert Hanssen", available at: http://edition.cnn.com/SPECIALS/2001/hanssen/.
-
(2002)
-
-
-
6
-
-
84947258927
-
"From a program family to a domain-specific language"
-
Lengauer, C., Batory, D., Consel, C. and Odersky, M. (Eds), Springer-Verlag, New York, NY
-
Consel, C. (2004), "From a program family to a domain-specific language", in Lengauer, C., Batory, D., Consel, C. and Odersky, M. (Eds), Domain-Specific Program Generation, Lecture Notes in Computer Science 3016, Springer-Verlag, New York, NY, pp. 19-29.
-
(2004)
Domain-Specific Program Generation, Lecture Notes in Computer Science 3016
, pp. 19-29
-
-
Consel, C.1
-
7
-
-
0004225165
-
"The intrusion detection message exchange format"
-
internet draft, Intrusion Detection Exchange Format Working Group, Internet Engineering Task Force, 8 July
-
Curry, D., Debar, H. and Feinstein, B. (2004), "The intrusion detection message exchange format", internet draft, Intrusion Detection Exchange Format Working Group, Internet Engineering Task Force, 8 July.
-
(2004)
-
-
Curry, D.1
Debar, H.2
Feinstein, B.3
-
8
-
-
33746638729
-
-
Laboratory for Computer Science, Massachusetts Institute of Technology Cambridge, MA, November
-
Doyle, J. (1999), Some Representational Limitations of the Common Intrusion Specification Language, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA, November.
-
(1999)
Some Representational Limitations of the Common Intrusion Specification Language
-
-
Doyle, J.1
-
9
-
-
7544225357
-
-
McGraw Hill, New York, NY
-
Endorf, C., Schultz, E. and Mellander, J. (2003), Intrusion Detection and Prevention: The Authorative Guide to Detecting Malicious Activity, McGraw Hill, New York, NY.
-
(2003)
Intrusion Detection and Prevention: The Authorative Guide to Detecting Malicious Activity
-
-
Endorf, C.1
Schultz, E.2
Mellander, J.3
-
10
-
-
0342602262
-
"A common intrusion specification language (CISL)"
-
available at 11 June
-
Feiertag, R., Kahn, C., Porras, P., Schnackenberg, D., Staniford-Chen, S. and Tung, B. (1999), "A common intrusion specification language (CISL)", available at: www.isi.edu/~brian/cidf/drafts/ language.txt, 11 June.
-
(1999)
-
-
Feiertag, R.1
Kahn, C.2
Porras, P.3
Schnackenberg, D.4
Staniford-Chen, S.5
Tung, B.6
-
11
-
-
0012163370
-
"The intrusion detection exchange protocol (IDXP)"
-
Internet Draft, Intrusion Detection Exchange Format Working Group, Internet Engineering Task Force, 22 April 2003, available at
-
Feinstein, B., Matthews, G. and White, J. (2002), "The intrusion detection exchange protocol (IDXP)", Internet Draft, Intrusion Detection Exchange Format Working Group, Internet Engineering Task Force, 22 April 2003, available at: www.ietf.org/internet-drafts/ draft-ietf-idwg-beep-idxp-07.txt.
-
(2002)
-
-
Feinstein, B.1
Matthews, G.2
White, J.3
-
12
-
-
0008308204
-
"Countermeasures against buffer overflow attacks"
-
White Paper, RSA Laboratories
-
Frykholm, N. (2000), "Countermeasures against buffer overflow attacks", White Paper, RSA Laboratories.
-
(2000)
-
-
Frykholm, N.1
-
13
-
-
0008364384
-
"A generic taxonomy for intrusion specification and response"
-
Furnell, S., Magklaras, G., Papadaki, M. and Dowland, P. (2001), "A generic taxonomy for intrusion specification and response", Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April 2001, pp. 125-31.
-
(2001)
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April 2001
, pp. 125-231
-
-
Furnell, S.1
Magklaras, G.2
Papadaki, M.3
Dowland, P.4
-
16
-
-
33746587353
-
"An architecture for insider misuse threat prediction in IT systems"
-
MPhil Thesis, School of Computing, Communications and Electronics, University of Plymouth, Plymouth
-
Magklaras, G. (2005), "An architecture for insider misuse threat prediction in IT systems", MPhil Thesis, School of Computing, Communications and Electronics, University of Plymouth, Plymouth.
-
(2005)
-
-
Magklaras, G.1
-
17
-
-
0036173202
-
"Insider threat prediction tool: Evaluating the probability of IT misuse"
-
Magklaras, G. and Furnell, S. (2002), "Insider threat prediction tool: evaluating the probability of IT misuse", Computers & Security, Vol. 21 No. 1, pp. 62-73.
-
(2002)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.1
Furnell, S.2
-
18
-
-
84886499825
-
"The insider misuse threat survey: Investigating IT misuse from legitimate users"
-
Magklaras, G. and Furnell, S. (2004), "The insider misuse threat survey: Investigating IT misuse from legitimate users", Proceedings of the 5th Australian Information Warfare & Security Conference, Perth Western Australia, 25-26 November 2004, pp. 42-51.
-
(2004)
Proceedings of the 5th Australian Information Warfare & Security Conference, Perth Western Australia, 25-26 November 2004
, pp. 42-51
-
-
Magklaras, G.1
Furnell, S.2
-
19
-
-
85084161486
-
"Inferring internet denial of service activity"
-
Moore, D., Voelker, G. and Savage, S. (2001), "Inferring internet denial of service activity", Proceedings of the 10th USENIX Security Symposium, Washington DC, August 2001, pp. 9-22.
-
(2001)
Proceedings of the 10th USENIX Security Symposium, Washington DC, August 2001
, pp. 9-22
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
20
-
-
33745893010
-
-
NSTISSAM NSTISSAM INFOSEC/1-99, US National Security Telecommunications And Information Systems Security Committee, available at
-
NSTISSAM (1999), The Insider Threat To US Government Information Systems, NSTISSAM INFOSEC/1-99, US National Security Telecommunications And Information Systems Security Committee, available at: www.cnss.gov/ Assets/pdf/nstissam_infosec_1-99.pdf.
-
(1999)
The Insider Threat To US Government Information Systems
-
-
-
21
-
-
0004198635
-
-
3rd ed., Prentice-Hall, Englewood Cliffs, NJ
-
Pfleeger, C. and Pfleeger, S. (2003), Security in Computing, 3rd ed., Prentice-Hall, Englewood Cliffs, NJ.
-
(2003)
Security in Computing
-
-
Pfleeger, C.1
Pfleeger, S.2
-
22
-
-
0004037761
-
"TELNET protocol specification"
-
Request For Comments (RFC) 854, IETF Network Working Group, May
-
Postel, J. and Reynolds, J. (1983), "TELNET protocol specification", Request For Comments (RFC) 854, IETF Network Working Group, May.
-
(1983)
-
-
Postel, J.1
Reynolds, J.2
-
24
-
-
0041766619
-
"2003 CSI/FBI computer crime and security survey"
-
Computer Security Institute. Spring
-
Richardson, R. (2003), "2003 CSI/FBI computer crime and security survey", Computer Security Institute. Spring.
-
(2003)
-
-
Richardson, R.1
-
25
-
-
0003998307
-
-
Microsoft Press, Redmond, DC
-
Richter, J. (1997), Advanced Windows, Microsoft Press, Redmond, DC.
-
(1997)
Advanced Windows
-
-
Richter, J.1
-
26
-
-
0036395373
-
"A framework for understanding and predicting insider attacks"
-
Schultz, E.E. (2002), "A framework for understanding and predicting insider attacks", Computers & Security, Vol. 21 No. 6, pp. 526-31.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
27
-
-
0038656626
-
-
Chapter 12, Prentice-Hall, Englewood Cliffs, NJ
-
Sharda, N. (1999), Multimedia Information Networking, Chapter 12, Prentice-Hall, Englewood Cliffs, NJ.
-
(1999)
Multimedia Information Networking
-
-
Sharda, N.1
-
28
-
-
33746622841
-
"Spying and technology: Robert Philip Hanssen"
-
Slashdot posting on Slashdot.org, 22 February 2001, available at
-
Slashdot (2001), "Spying and technology: Robert Philip Hanssen", posting on Slashdot.org, 22 February 2001, available at: http://slashdot.org/articles/01/02/22/0622249.shtml.
-
(2001)
-
-
-
29
-
-
0008390093
-
"A preliminary structural approach to insider computer misuse incidents"
-
Tuglular, T. (2000), "A preliminary structural approach to insider computer misuse incidents", EICAR 2000 Best Paper Proceedings, pp. 105-25.
-
(2000)
EICAR 2000 Best Paper Proceedings
, pp. 105-125
-
-
Tuglular, T.1
-
30
-
-
33746654464
-
"Extensible markup language, architecture domain, world wide web consortium (W3C)"
-
W3C available at
-
W3C (2006), "Extensible markup language, architecture domain, world wide web consortium (W3C)", available at: www.w3.org/XML/.
-
(2006)
-
-
-
32
-
-
0342829715
-
"The SSH (secure shell) remote login protocol"
-
Internet Draft, IETF Network Working Group, 15 November 1995, available at
-
Ylonen, T. (1995), "The SSH (secure shell) remote login protocol", Internet Draft, IETF Network Working Group, 15 November 1995, available at: www.free.lp.se/fish/rfc.txt.
-
(1995)
-
-
Ylonen, T.1
-
33
-
-
33746596108
-
-
2nd ed., Chapter 2, New Riders Publishing, Indianapolis, IN
-
Ziegler, R. (2002), LINUX Firewalls, 2nd ed., Chapter 2, New Riders Publishing, Indianapolis, IN, pp. 48-50.
-
(2002)
LINUX Firewalls
, pp. 48-50
-
-
Ziegler, R.1
-
34
-
-
0004210998
-
-
2nd ed., O'Reilly & Associates, Sebastopol, CA
-
Zwicky, E.D., Cooper, S. and Chapman, D.B. (2000), "Building Internet Firewalls", 2nd ed., O'Reilly & Associates, Sebastopol, CA.
-
(2000)
"Building Internet Firewalls"
-
-
Zwicky, E.D.1
Cooper, S.2
Chapman, D.B.3
|