메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 401-404

An e-intelligence approach to e-commerce intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

FUZZY SETS; INFORMATION SCIENCE; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; WORLD WIDE WEB;

EID: 33845313620     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GRC.2005.1547321     Document Type: Conference Paper
Times cited : (2)

References (13)
  • 1
    • 33845331997 scopus 로고    scopus 로고
    • The blended threat: Preventing computer security's new nemesis
    • NaSPA, June
    • Battinelli, C.: "The Blended Threat: Preventing Computer Security's New Nemesis," Technical Support Magazine, NaSPA, June 2003, http://www.naspa.com/PDF/2003/0603/T0306003.pdf
    • (2003) Technical Support Magazine
    • Battinelli, C.1
  • 2
    • 33845319173 scopus 로고    scopus 로고
    • Distributed open proxy honeypots
    • Web Application Security Consortium
    • Barnett, R., et al.: "Distributed Open Proxy Honeypots," Web Application Security Consortium, Honeypots Project Page, http://www.webappsec. org/projects/honeypots/
    • Honeypots Project Page
    • Barnett, R.1
  • 3
    • 33845320087 scopus 로고    scopus 로고
    • The handshake between PKI and web services
    • December
    • Chang, S.: "The Handshake between PKI and Web Services," NATEA 2004 Journal, December 2004.
    • (2004) NATEA 2004 Journal
    • Chang, S.1
  • 4
    • 0345529051 scopus 로고    scopus 로고
    • Managing security policy in a large distributed web services environment
    • November 3-6, 2003, Dallas, USA, IEEE Computer Society Press
    • Chang, S., et al.: "Managing Security Policy in a Large Distributed Web Services Environment," 27th Annual International Computer Software and Applications Conference (COMPSAC 2003), pp. 610-615, November 3-6, 2003, Dallas, USA, IEEE Computer Society Press, 2003.
    • (2003) 27th Annual International Computer Software and Applications Conference (COMPSAC 2003) , pp. 610-615
    • Chang, S.1
  • 5
    • 33845296392 scopus 로고    scopus 로고
    • Pharming - A new technique for Internet fraud
    • March 07
    • Cuadra, F. De La: "Pharming - a new technique for Internet fraud," eChannelLine Canada, March 07, 2005, http://www.crime-research.org/ news/07.03.2005/1015
    • (2005) eChannelLine Canada
    • De La Cuadra, F.1
  • 6
    • 40249101754 scopus 로고    scopus 로고
    • The security of applications: Not all are created equal
    • February
    • Jaquith, A.: "The Security of Applications: Not All Are Created Equal," @stake Research Report, February 2002, http://www. securitymanagement.com/library/atstake_tech0502.pdf
    • (2002) @stake Research Report
    • Jaquith, A.1
  • 8
    • 0036273351 scopus 로고    scopus 로고
    • On Bricks and Walls: Why building secure software is hard
    • May
    • McGraw, G.: "On Bricks and Walls: Why Building Secure Software is Hard," Computers and Security, Volume 21, No. 3, pp 229-238, May 2002.
    • (2002) Computers and Security , vol.21 , Issue.3 , pp. 229-238
    • McGraw, G.1
  • 12
    • 33845344646 scopus 로고    scopus 로고
    • Giles, L. translated
    • Sun-Tzu (Giles, L. translated.) "The Art of War.", 1910. http://www.chinapage.com/sunzi-e.html
    • "The Art of War.", 1910
    • Sun-Tzu1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.