메뉴 건너뛰기




Volumn 29, Issue 2, 1997, Pages 57-63

MIATA: A Machine-Independent Audit Trail Analyser

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34648817144     PISSN: 1443458X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (23)
  • 2
    • 4043050752 scopus 로고
    • What your Systems Programmer never told you... Using SMF as an Audit Tool for IBM Computer Systems
    • Sydney. May
    • CAVILL, S. and DOODY, N. (1993): What your Systems Programmer never told you ... Using SMF as an Audit Tool for IBM Computer Systems. Proc. EDPAC 93. Sydney. May.
    • (1993) Proc. EDPAC 93
    • Cavill, S.1    Doody, N.2
  • 6
    • 84969573885 scopus 로고
    • ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis
    • Toulouse, November
    • HABRA, N., LE CHARLIER, B., MOUNJI, A. and MATHIEU, I. (1992): ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. Proc. Computer Security - ESORICS 92, Toulouse, November, 435-450.
    • (1992) Proc. Computer Security - ESORICS 92 , pp. 435-450
    • Habra, N.1    Le Charlier, B.2    Mounji, A.3    Mathieu, I.4
  • 10
    • 0000524153 scopus 로고
    • Intrusion Detection: Its Role and Validation
    • LIEPINS, G.E. and VACCARO, H.S. (1992): Intrusion Detection: Its Role and Validation, Computers & Security, 11(4):347-355.
    • (1992) Computers & Security , vol.11 , Issue.4 , pp. 347-355
    • Liepins, G.E.1    Vaccaro, H.S.2
  • 14
    • 84961841379 scopus 로고
    • System Implications of Information Privacy
    • Spring
    • PETERSEN, H.E. and TURN, R. (1967) System Implications of Information Privacy. Proc. AFIPS Conference, Spring, 30:291-300.
    • (1967) Proc. AFIPS Conference , vol.30 , pp. 291-300
    • Petersen, H.E.1    Turn, R.2
  • 16
    • 84909718092 scopus 로고
    • Reflections on Some Recent Widespread Computer Break-Ins
    • REID, B. (1989): Reflections on Some Recent Widespread Computer Break-Ins. Commun. ACM, 30(2):103-105.
    • (1989) Commun. ACM , vol.30 , Issue.2 , pp. 103-105
    • Reid, B.1
  • 17
    • 0024684041 scopus 로고
    • With Microscope and Tweezers: The Worm from MTT's Perspective
    • ROCHLIS, J.A. and EICHIN, M.W (1989): With Microscope and Tweezers: The Worm from MTT's Perspective. Commun. ACM, 32(6):689-698.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 689-698
    • Rochlis, J.A.1    Eichin, M.W.2
  • 18
    • 0024683697 scopus 로고
    • Password Cracking a Game of Wits
    • SEELEY, D. (1989): Password Cracking a Game of Wits. Commun. ACM, 32(6):700-704.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 700-704
    • Seeley, D.1
  • 20
    • 0024681099 scopus 로고
    • The Internet Worm: Crisis and Aftermath
    • SPAFFORD, E.H. (1989): The Internet Worm: Crisis and Aftermath. Commun. ACM, 32(6):678-687.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 678-687
    • Spafford, E.H.1
  • 21
    • 0024011325 scopus 로고
    • Stalking the Wily Hacker
    • STOLL, C. (1988): Stalking the Wily Hacker. Commun. ACM, 31(5):484-497.
    • (1988) Commun. ACM , vol.31 , Issue.5 , pp. 484-497
    • Stoll, C.1
  • 23
    • 4043128777 scopus 로고
    • Computer (In)security: Infiltrating Open Systems
    • WITTEN, I.H. (1987): Computer (In)security: Infiltrating Open Systems. ABACUS, 4(4):7-25.
    • (1987) ABACUS , vol.4 , Issue.4 , pp. 7-25
    • Witten, I.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.