-
2
-
-
4043050752
-
What your Systems Programmer never told you... Using SMF as an Audit Tool for IBM Computer Systems
-
Sydney. May
-
CAVILL, S. and DOODY, N. (1993): What your Systems Programmer never told you ... Using SMF as an Audit Tool for IBM Computer Systems. Proc. EDPAC 93. Sydney. May.
-
(1993)
Proc. EDPAC 93
-
-
Cavill, S.1
Doody, N.2
-
6
-
-
84969573885
-
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis
-
Toulouse, November
-
HABRA, N., LE CHARLIER, B., MOUNJI, A. and MATHIEU, I. (1992): ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. Proc. Computer Security - ESORICS 92, Toulouse, November, 435-450.
-
(1992)
Proc. Computer Security - ESORICS 92
, pp. 435-450
-
-
Habra, N.1
Le Charlier, B.2
Mounji, A.3
Mathieu, I.4
-
8
-
-
0003690982
-
-
Technical Report. SRI International. Menlo Park
-
JAGANNATHAN, R., LUNT, T., ANDERSON, D., DODD, C., GILHAM, F., JALALI, C., JAVITZ, H., NEUMANN, P., TAMARU, A. and VALDES, A. (1993): System Design Document: Next-Generation Intrusion Detection Expert System (NIDES). Technical Report. SRI International. Menlo Park.
-
(1993)
System Design Document: Next-Generation Intrusion Detection Expert System (NIDES)
-
-
Jagannathan, R.1
Lunt, T.2
Anderson, D.3
Dodd, C.4
Gilham, F.5
Jalali, C.6
Javitz, H.7
Neumann, P.8
Tamaru, A.9
Valdes, A.10
-
10
-
-
0000524153
-
Intrusion Detection: Its Role and Validation
-
LIEPINS, G.E. and VACCARO, H.S. (1992): Intrusion Detection: Its Role and Validation, Computers & Security, 11(4):347-355.
-
(1992)
Computers & Security
, vol.11
, Issue.4
, pp. 347-355
-
-
Liepins, G.E.1
Vaccaro, H.S.2
-
11
-
-
0003451777
-
-
Technical Report. SRI-CSL-90-05. SRI International. Menlo Park
-
LUNT, T.F., TAMARU, A., GILHAM, F., JAGANNATHAN, R., JALALI, C., JAVITZ, H.S., VALDES, A. and NEUMANN, P.G. (1990): A Real-Time Intrusion-Detection Expert System. Technical Report. SRI-CSL-90-05. SRI International. Menlo Park.
-
(1990)
A Real-Time Intrusion-Detection Expert System
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalali, C.5
Javitz, H.S.6
Valdes, A.7
Neumann, P.G.8
-
14
-
-
84961841379
-
System Implications of Information Privacy
-
Spring
-
PETERSEN, H.E. and TURN, R. (1967) System Implications of Information Privacy. Proc. AFIPS Conference, Spring, 30:291-300.
-
(1967)
Proc. AFIPS Conference
, vol.30
, pp. 291-300
-
-
Petersen, H.E.1
Turn, R.2
-
16
-
-
84909718092
-
Reflections on Some Recent Widespread Computer Break-Ins
-
REID, B. (1989): Reflections on Some Recent Widespread Computer Break-Ins. Commun. ACM, 30(2):103-105.
-
(1989)
Commun. ACM
, vol.30
, Issue.2
, pp. 103-105
-
-
Reid, B.1
-
17
-
-
0024684041
-
With Microscope and Tweezers: The Worm from MTT's Perspective
-
ROCHLIS, J.A. and EICHIN, M.W (1989): With Microscope and Tweezers: The Worm from MTT's Perspective. Commun. ACM, 32(6):689-698.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 689-698
-
-
Rochlis, J.A.1
Eichin, M.W.2
-
18
-
-
0024683697
-
Password Cracking a Game of Wits
-
SEELEY, D. (1989): Password Cracking a Game of Wits. Commun. ACM, 32(6):700-704.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 700-704
-
-
Seeley, D.1
-
20
-
-
0024681099
-
The Internet Worm: Crisis and Aftermath
-
SPAFFORD, E.H. (1989): The Internet Worm: Crisis and Aftermath. Commun. ACM, 32(6):678-687.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
Spafford, E.H.1
-
21
-
-
0024011325
-
Stalking the Wily Hacker
-
STOLL, C. (1988): Stalking the Wily Hacker. Commun. ACM, 31(5):484-497.
-
(1988)
Commun. ACM
, vol.31
, Issue.5
, pp. 484-497
-
-
Stoll, C.1
-
23
-
-
4043128777
-
Computer (In)security: Infiltrating Open Systems
-
WITTEN, I.H. (1987): Computer (In)security: Infiltrating Open Systems. ABACUS, 4(4):7-25.
-
(1987)
ABACUS
, vol.4
, Issue.4
, pp. 7-25
-
-
Witten, I.H.1
|