-
3
-
-
33846031322
-
-
Fall, University of Washington, Seattle, WA
-
D. Dittrich and Endicott-Popovsky, B.E. (Fall, 2003). INFO498 Introduction to Computer Security Incident Response, University of Washington, Seattle, WA.
-
(2003)
INFO498 Introduction to Computer Security Incident Response
-
-
Dittrich, D.1
Endicott-Popovsky, B.E.2
-
4
-
-
33846013428
-
-
Dittrich, D. Basic Steps in Forensic Analysis of Unix Systems. Retrieved October 28, 2004 from the World Wide Web http://staff.washington. edu/dittrich/misc/forensics/
-
Dittrich, D. Basic Steps in Forensic Analysis of Unix Systems. Retrieved October 28, 2004 from the World Wide Web http://staff.washington. edu/dittrich/misc/forensics/
-
-
-
-
5
-
-
3242808612
-
-
CSI/FBI, Computer Security Institute, San Francisco, CA
-
[4a] CSI/FBI. (2005) CSI/FBI Computer Crime and Security Survey, Computer Security Institute, San Francisco, CA.
-
(2005)
CSI/FBI Computer Crime and Security Survey
-
-
-
6
-
-
84866704625
-
The New Zealand Hacker Case: A Post Mortem
-
September, The University of Oxford, Oxford, England. Retrieved September 9, 2005 from the World Wide Web
-
Endicott-Popovsky, B.E., Ryan, D., Frincke, D. (2005, September). The New Zealand Hacker Case: A Post Mortem, in Proceedings of the Safety and Security in a Networked World: Balancing Cyber-Rights & Responsibilities Conference at the Oxford Internet Institute, The University of Oxford, Oxford, England. Retrieved September 9, 2005 from the World Wide Web: http://www.oii.ox.ac.uk/research/cybersafety/?view=papers.
-
(2005)
Proceedings of the Safety and Security in a Networked World: Balancing Cyber-Rights & Responsibilities Conference at the Oxford Internet Institute
-
-
Endicott-Popovsky, B.E.1
Ryan, D.2
Frincke, D.3
-
7
-
-
33845965918
-
-
Dittrich, D. Developing an Effective Incident Cost Analysis Mechanism, Security Focus, June 12, 2002. Retrieved August 14, 2005 from the World Wide Web: http://online.securityfocus.com/infocus/1592
-
Dittrich, D. Developing an Effective Incident Cost Analysis Mechanism, Security Focus, June 12, 2002. Retrieved August 14, 2005 from the World Wide Web: http://online.securityfocus.com/infocus/1592
-
-
-
-
8
-
-
33846013774
-
-
Endicott-Popovsky, B.E., (Spring '02) Lectures and Assignments: CSSE591 Computer Forensics: Seattle University, Seattle, WA.
-
Endicott-Popovsky, B.E., (Spring '02) Lectures and Assignments: CSSE591 Computer Forensics: Seattle University, Seattle, WA.
-
-
-
-
10
-
-
33845987258
-
-
Honeynet Project, Retrieved August 04, 2005, from the World Wide Web
-
Honeynet Project. (2001). Know Your Enemy II. Tracking the Blackhat's Moves. Retrieved August 04, 2005, from the World Wide Web: http://project.honeynet.org/papers/enemy2/index.html
-
(2001)
Know Your Enemy II. Tracking the Blackhat's Moves
-
-
-
11
-
-
33846028608
-
-
Honeynet Project, Retrieved August 04, 2005, from the World Wide Web
-
Honeynet Project. (2000). Know Your Enemy III: They Gain Root. Retrieved August 04, 2005, from the World Wide Web: http://project.honeynet. org/papers/enemy3/index.html
-
(2000)
Know Your Enemy III: They Gain Root
-
-
-
12
-
-
33846022189
-
-
New Zealand Herald, November 19, Retrieved August 13, 2005 from the World Wide Web
-
Barton, C. Hacker Destroys 4500 Web Sites, New Zealand Herald, November 19, 1998. Retrieved August 13, 2005 from the World Wide Web: http://www.landfield.com/isn/mail-archive/1998/Nov/0098.html
-
(1998)
Hacker Destroys 4500 Web Sites
-
-
Barton, C.1
-
13
-
-
33846012384
-
-
New Zealand Herald, November 23, Retrieved August 13, 2005 from the World Wide Web
-
Wall, T. Associates Denounce Website Hacker, New Zealand Herald, November 23, 1998. Retrieved August 13, 2005 from the World Wide Web: http://www.landfield.com/isn/mail-archive/1998/Nov/0098.html
-
(1998)
Associates Denounce Website Hacker
-
-
Wall, T.1
-
14
-
-
33846031814
-
-
The (New Zealand) Press, December 01, Retrieved August 13, 2005 from the World Wide Web
-
Armstrong, D. Chch Fraud Squad out to Nail Hackers, The (New Zealand) Press, December 01, 1998. Retrieved August 13, 2005 from the World Wide Web: http://www.press.co.nz/48/981201c7.htm
-
(1998)
Chch Fraud Squad out to Nail Hackers
-
-
Armstrong, D.1
-
16
-
-
33845982770
-
Real-World Access Control Systematic Failures: Reality or Virtual Reality
-
Ukraine
-
Attfield, P., Real-World Access Control Systematic Failures: Reality or Virtual Reality, in Journal Article Workshop, June '05, Ukraine.
-
Journal Article Workshop, June '05
-
-
Attfield, P.1
-
17
-
-
33846015694
-
Seattle FBI Briefing: Operation Flyhook
-
April 18, Seattle, WA
-
Schuler, M and P. Attfield. (April 18, 2002). Seattle FBI Briefing: Operation Flyhook, Boeing Security Forum, Seattle, WA.
-
(2002)
Boeing Security Forum
-
-
Schuler, M.1
Attfield, P.2
-
18
-
-
84866671794
-
From Russia with Lopht
-
May 1, Retrieved August 7, 2005 from the World Wide Web
-
Koerner, B. From Russia with Lopht. Legal Affairs, May 1, 2002. Retrieved August 7, 2005 from the World Wide Web: http://www. newamerica.net/index.cfm?pg=article&DocID=792
-
(2002)
Legal Affairs
-
-
Koerner, B.1
-
19
-
-
33846000140
-
-
United States. Department of Justice. Court proceedings and public-record trial exhibits, United States v. Vasily Gorshkov. Seattle, WA, September 2001.
-
United States. Department of Justice. Court proceedings and public-record trial exhibits, United States v. Vasily Gorshkov. Seattle, WA, September 2001.
-
-
-
-
20
-
-
33846028974
-
-
United States. Department of Justice. Press Release: Russian Hacker Sentenced. Newark, NJ, July 25, 2003. Retrieved August 7, 2005 from the World Wide Web: http://www.usdoj.gov/criminal/cybercrime/ivanovSent_NJ.htm
-
United States. Department of Justice. Press Release: Russian Hacker Sentenced. Newark, NJ, July 25, 2003. Retrieved August 7, 2005 from the World Wide Web: http://www.usdoj.gov/criminal/cybercrime/ivanovSent_NJ.htm
-
-
-
-
21
-
-
84866658243
-
Redefining Computer Security to Include Forensics
-
7-9 September, Seattle, WA
-
Endicott-Popovsky, B.E., Frincke, D. Redefining Computer Security to Include Forensics, Poster session, 8th Annual Recent Advances in Intrusion Detection (RAID) Conference 7-9 September 2005, Seattle, WA.
-
(2005)
Poster session, 8th Annual Recent Advances in Intrusion Detection (RAID) Conference
-
-
Endicott-Popovsky, B.E.1
Frincke, D.2
-
22
-
-
33845972480
-
-
Simon, M. Seminar in Data Security. Preston Gates: Seattle, WA, March 2, 2005.
-
Simon, M. Seminar in Data Security. Preston Gates: Seattle, WA, March 2, 2005.
-
-
-
-
23
-
-
33845981681
-
-
Ellison, R.J., Mead, N.R., Longstaff, T.A. and R.C. Linger. (No Date) The Survivability Imperative: Protecting Critical Systems. Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA. Retrieved October 10, 2003 from the World Wide Web: http://www.cert.org
-
Ellison, R.J., Mead, N.R., Longstaff, T.A. and R.C. Linger. (No Date) The Survivability Imperative: Protecting Critical Systems. Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA. Retrieved October 10, 2003 from the World Wide Web: http://www.cert.org
-
-
-
-
24
-
-
33846025858
-
-
CERT Coordination Center. (no date). The Survivable Network Analysis Method: Assessing Survivability of Critical Systems. Presentation: Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. Retrieved October 10, 2003 from the World Wide Web: http://www.cert.org
-
CERT Coordination Center. (no date). The Survivable Network Analysis Method: Assessing Survivability of Critical Systems. Presentation: Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. Retrieved October 10, 2003 from the World Wide Web: http://www.cert.org
-
-
-
-
25
-
-
33846011711
-
-
Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T.A. and. N.R. Mead. (May, 1999). Survivable Network Systems: An Emerging Discipline. CMU/SEI 97-TR-013, Software Engineering Institute, Camegie-Mellon University, Pittsburgh, PA.
-
Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T.A. and. N.R. Mead. (May, 1999). Survivable Network Systems: An Emerging Discipline. CMU/SEI 97-TR-013, Software Engineering Institute, Camegie-Mellon University, Pittsburgh, PA.
-
-
-
-
26
-
-
15944385610
-
Adding the Fourth "R
-
West Point
-
Endicott-Popovsky, B.E., Frincke, D, Adding the Fourth "R", in Proceedings of the 5th Annual IEEE Information Assurance Workshop, June '04, USMA, West Point.
-
Proceedings of the 5th Annual IEEE Information Assurance Workshop, June '04, USMA
-
-
Endicott-Popovsky, B.E.1
Frincke, D.2
-
27
-
-
33845965558
-
-
Endicott-Popovsky, B.E., Frincke, D. (2006, January 4). Adding the Fourth 'R': A Systems Approach to Solving the Hacker's Arms Race. Hawaii International Conference on System Sciences (HICSS) 39 Symposium: Skilled Human-intelligent Agent Performance: Measurement, Application and Symbiosis, Kauai, HI, Retrieved January 4, 2006 from the World Wide Web: http://www.itl.nist.gov/iaui/vvrg/hicss39/.
-
Endicott-Popovsky, B.E., Frincke, D. (2006, January 4). Adding the Fourth 'R': A Systems Approach to Solving the Hacker's Arms Race. Hawaii International Conference on System Sciences (HICSS) 39 Symposium: Skilled Human-intelligent Agent Performance: Measurement, Application and Symbiosis, Kauai, HI, Retrieved January 4, 2006 from the World Wide Web: http://www.itl.nist.gov/iaui/vvrg/hicss39/.
-
-
-
-
30
-
-
85046981963
-
New Directions in Cyber Law. Paper
-
June, Presented at the, Washington, D.C
-
th Colloquium. Washington, D.C.
-
(2003)
th Colloquium
-
-
Ryan, D.1
-
33
-
-
20144388417
-
The Manuka Project
-
United States Military Academy, West Point, NY, pp
-
Endicott-Popovsky, B.E., Frincke, D., Dittrich, D., et.al. The Manuka Project, in Proceedings from the Fifth IEEE Systems, Man and Cybernetics Information Assurance Workshop 10-11 June 2004, United States Military Academy, West Point, NY, pp.314-320.
-
Proceedings from the Fifth IEEE Systems, Man and Cybernetics Information Assurance Workshop 10-11 June 2004
, pp. 314-320
-
-
Endicott-Popovsky, B.E.1
Frincke, D.2
Dittrich, D.3
-
34
-
-
33845978973
-
Policies to Enhance Computer and Network Forensics
-
United States Military Academy, West Point, NY, June
-
Yasinsac, A. and Manzano, Y. (2001) Policies to Enhance Computer and Network Forensics. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. United States Military Academy, West Point, NY, June 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Yasinsac, A.1
Manzano, Y.2
-
35
-
-
1942505732
-
-
Wolfe-Wilson, J. and Wolfe, H.B. (2003) Management Strategies for Implementing Forensic Security Measures [electronic version]. Information Security Technical Report 8, Issue 2, June 2003, pp.55-64.
-
Wolfe-Wilson, J. and Wolfe, H.B. (2003) Management Strategies for Implementing Forensic Security Measures [electronic version]. Information Security Technical Report Volume 8, Issue 2, June 2003, pp.55-64.
-
-
-
-
36
-
-
33846032502
-
-
Carrier, B. and Spafford, E. Getting Physical with the Digital Investigation Process, International Journal of Digital Evidence, 2, 2 [Electronic version] Fall 2003.
-
Carrier, B. and Spafford, E. Getting Physical with the Digital Investigation Process, International Journal of Digital Evidence, vol. 2, 2 [Electronic version] Fall 2003.
-
-
-
-
38
-
-
33846001522
-
-
Personal Interview in Syracuse, New York, July 12, 2005
-
Pollit, M. Personal Interview in Syracuse, New York. (July 12, 2005).
-
-
-
Pollit, M.1
-
40
-
-
33846004296
-
-
Personal Interviews, March 31, 2006
-
Bailey, K., Winn, J. Personal Interviews, March 31, 2006
-
-
-
Bailey, K.1
Winn, J.2
-
41
-
-
3042774608
-
Building Theoretical Underpinnings for Digital Forensics Research
-
Mocas, S., (2004). Building Theoretical Underpinnings for Digital Forensics Research, Compsec Online: Digital Investigations. Vol. 1, Issue 1.
-
(2004)
Compsec Online: Digital Investigations
, vol.1
, Issue.1
-
-
Mocas, S.1
-
42
-
-
33845992755
-
-
CERIAS Tech Report, Purdue University, Layfayette, 30
-
Rogers, M. and K. Siegfried. (2003). The Future of Computer Forensics: A Needs Survey, CERIAS Tech Report 2003-30, Purdue University, Layfayette, IN.
-
(2003)
The Future of Computer Forensics: A Needs Survey
-
-
Rogers, M.1
Siegfried, K.2
|