-
2
-
-
33746713807
-
CERT guide to system and network security practices
-
Allen J. CERT guide to system and network security practices. Addison-Wesley (2001)
-
(2001)
Addison-Wesley
-
-
Allen, J.1
-
3
-
-
0036329754
-
Tracing network attacks to their sources
-
Baba T., and Matsuda S. Tracing network attacks to their sources. IEEE Internet Computing 6 3 (2002)
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.3
-
-
Baba, T.1
Matsuda, S.2
-
4
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Bellovin S.M. Security problems in the TCP/IP protocol suite. Computer Communication Review 19 2 (April 1989) 32-48
-
(1989)
Computer Communication Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
5
-
-
33746738939
-
-
Bellovin SM. ICMP traceback messages, Internet draft (work in progress); February 2003.
-
-
-
-
6
-
-
4243105024
-
The discipline of Internet forensics
-
Berghel H. The discipline of Internet forensics. Communications of the ACM 46 8 (August 2003)
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
-
-
Berghel, H.1
-
7
-
-
33746694898
-
-
BSI. Information security management, BS7799, part 1: code of practice for information security management; 1999.
-
-
-
-
8
-
-
33746716321
-
-
Available from: [3/01/2005]
-
CERT/CC. Security of the Internet [online]. Available from:. http://www.cert.org/encyc_article/tocencyc.html [3/01/2005]
-
Security of the Internet [online]
-
-
-
9
-
-
33746693817
-
-
Council of Europe. Convention on cyber crime. In: European treaty series - no. 185, Budapest; 2001.
-
-
-
-
10
-
-
0342602262
-
-
Available from:
-
Feiertag R., Kahn C., Porras P., Schnackenberg D., Staniford-Chen S., and Tung B. A common intrusion specification language. Available from: (June 1999). http://people.emich.edu/pstephen/other_papers/CISL-Original.PDF
-
(1999)
A common intrusion specification language
-
-
Feiertag, R.1
Kahn, C.2
Porras, P.3
Schnackenberg, D.4
Staniford-Chen, S.5
Tung, B.6
-
12
-
-
33746696735
-
-
Harris Interactive. Identity theft new survey & trend report. Commissioned by Privacy & American Business; August 2003.
-
-
-
-
13
-
-
84969506813
-
-
Hiltz SR, Han HJ, Briller V. Public attitudes towards a national identity "Smart Card:" privacy and security concerns. In: Proceedings of the 36th Hawaii international conference on system sciences (HICSS'03). Hilton Waikoloa Village, Island of Hawaii, January 6-9; 2003.
-
-
-
-
18
-
-
33746716944
-
-
Jung HT, Kim HL, Seo YM, Choe G, Min SL, Kim CS, et al. Caller identification system in the Internet environment. In: Proceedings of fourth USENIX security symposium; 1993.
-
-
-
-
21
-
-
0343472276
-
-
Report: CMU/SEI-SIM-006, Carnegie Melon University/Software Engineering Institute
-
Kossakowski K.P., Allen J., Alberts C., Cohen C., Ford G., Fraser B., et al. Responding to intrusions. Report: CMU/SEI-SIM-006 (February 1999), Carnegie Melon University/Software Engineering Institute
-
(1999)
Responding to intrusions
-
-
Kossakowski, K.P.1
Allen, J.2
Alberts, C.3
Cohen, C.4
Ford, G.5
Fraser, B.6
-
25
-
-
84950242640
-
-
Mankin A, Massey D, Wu CL, Zhang L. On design and evaluation of intention-driven ICMP traceback. In: IEEE international conference on computer communications and networks (ICCCN); October 2001.
-
-
-
-
30
-
-
84949856103
-
-
Nong Y, Giordano J, Feldman J, Zhong Q. Information fusion techniques for network intrusion detection. In: IEEE information technology conference, information environment for the future, Syracuse, NY, USA; September 1998
-
-
-
-
31
-
-
33746776929
-
-
Available from: [05/01/2005]
-
OMB's Circular No. A-130. Appendix III online. Available from:. http://www.whitehouse.gov/omb/circulars/a130/a130trans4.html [05/01/2005]
-
Appendix III online
-
-
-
32
-
-
33746688648
-
-
Park K, Lee H. On the effectiveness of probabilistic packet marking for IP traceback. In: Proceedings of 2001 conference on applications, technologies, architectures and protocols for computer communication, ACM SIGCOMM'01. San Francisco, US; August 2001.
-
-
-
-
33
-
-
33746732358
-
-
Patsos D. A strategic approach to incident response, M.Sc. thesis. London: Department of Mathematics/Information Security Group, Royal Holloway University of London; 2002.
-
-
-
-
36
-
-
33746679930
-
-
Savage S, Wetherall D, Karlin A, Anderson T. Practical network support for IP traceback. In: Proceedings of SIGCOMM'00. Stockholm, Sweden; August 2000.
-
-
-
-
37
-
-
33746671388
-
-
Schnackenberg D, Djahandari K, Reid T, Wilson B. Cooperative intrusion traceback and response architecture (CITRA), Boeing Phantom Works and NAI Labs, prepared under contract N66001-01-C-8048 for Space and Naval Warfare System Center (SSC), San Diego; February 2002.
-
-
-
-
38
-
-
1542305470
-
Incident response teams need to change
-
Schultz E. Incident response teams need to change. Computers and Security Journal 23 (January 2004) 87-88
-
(2004)
Computers and Security Journal
, vol.23
, pp. 87-88
-
-
Schultz, E.1
-
39
-
-
33746716318
-
-
Solove DJ. The legal construction of identity theft. In: Symposium: digital cops in a virtual environment Yale law school; March 26-28, 2004.
-
-
-
-
40
-
-
0034997397
-
-
Song DX, Perrig A. Advanced and authenticated marking schemes for IP traceback. In: Proceeding of the IEEE INFOCOM01. Anchorage, Alaska; April 2001.
-
-
-
-
41
-
-
33746664342
-
-
Spafford EH, Weeber SA. Software forensics: can we track code to its authors? Purdue Technical Report CSD-TR 92-010; February 1992.
-
-
-
-
42
-
-
0029232080
-
-
Staniford-Chen S, Heberlein LT. Holding intruders accountable on the Internet. In: Proceedings of IEEE symposium on security and privacy; 1995.
-
-
-
-
43
-
-
33746755449
-
-
Stoll C. The cuckoo's egg, pocket; reprint edition; November 1, 1990.
-
-
-
-
44
-
-
85084163540
-
-
Stone R. CenterTrack: an IP overlay network for tracking DoS floods. In: Proceedings of 9th Usenix security symposium; August 2000.
-
-
-
-
45
-
-
33746725433
-
-
United States Code, Chapter 35 of Title 44, Subchapter III - Information Security, Federal Information Security Management Act (FISMA) of 2002.
-
-
-
-
46
-
-
33746740551
-
-
US Department of Commerce. Federal Information Processing Standards Publication 198, The Keyed-Hash Message Authentication Code (HMAC); March 6, 2002.
-
-
-
-
48
-
-
33746708244
-
-
Wang XY, Reeves DS, Wu SF, Yuill J. Sleepy watermark tracing: an active intrusion response framework. In: Proceedings of the 16th international information security conference (IFIP/Sec'01); June 2001.
-
-
-
-
52
-
-
85084161090
-
-
Zhang Y, Paxson V. Detecting stepping stones. In: Proceedings of the 9th USENIX security symposium. Denver, Colorado, August 14-17; 2000.
-
-
-
|