메뉴 건너뛰기




Volumn 19, Issue 1, 2002, Pages 35-44

Intrusion detection technology: Leveraging the organization's security posture

Author keywords

[No Author keywords available]

Indexed keywords


EID: 49249132931     PISSN: 10580530     EISSN: None     Source Type: Journal    
DOI: 10.1201/1078/43199.19.1.20020101/31474.5     Document Type: Article
Times cited : (12)

References (12)
  • 2
    • 0031673674 scopus 로고    scopus 로고
    • Catapults and Grappling Hooks: The Tools and Techniques of Information Warfare
    • Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web
    • Boulanger, A., 1998. Catapults and Grappling Hooks:The Tools and Techniques of Information Warfare. IBM Systems Journal, 37 (1):106–114. Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web:http://www.epnet.com
    • (1998) IBM Systems Journal , vol.37 , Issue.1 , pp. 106-114
    • Boulanger, A.1
  • 3
    • 85023863401 scopus 로고    scopus 로고
    • May, May, Retrieved March 20, 2001, from the World Wide Web
    • National Institute of Standards and Technology (NIST). May 1999. ITL Bulletin — Computer Attacks:What They Are and How to Defend Against Them May, Retrieved March 20, 2001, from the World Wide Web:http://www.nist.gov/itl/lab/bulletns/may99.htm
    • (1999) ITL Bulletin — Computer Attacks: What They Are and How to Defend Against Them
  • 4
    • 85023819838 scopus 로고    scopus 로고
    • Cracker Tracking: Tighter Security with Intrusion Detection
    • Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web
    • Hurwicz, M., 1998. Cracker Tracking:Tighter Security with Intrusion Detection. Byte, 23 (5):112–116. Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web:http://www.epnet.com
    • (1998) Byte , vol.23 , Issue.5 , pp. 112-116
    • Hurwicz, M.1
  • 6
    • 0342600000 scopus 로고    scopus 로고
    • ICSA, Inc. White Paper, Retrieved March 20, 2001, from the World Wide Web
    • Bace, R., 1999. An Introduction to Intrusion Detection and Assessment, ICSA, Inc. White Paper. Retrieved March 20, 2001, from the World Wide Web:http://www.icsa.net/html.communities/ids/White%20Paper/index.shtml
    • (1999) An Introduction to Intrusion Detection and Assessment
    • Bace, R.1
  • 7
    • 85023886474 scopus 로고    scopus 로고
    • November, November, Retrieved March 20, 2001, from the World Wide Web
    • National Institute of Standards and Technology (NIST). November 1999. ITL Bulletin — Acquiring and Deploying Intrusion Detection Systems November, Retrieved March 20, 2001, from the World Wide Web:http://www.nist. gov/itl/lab/bulletns/nov99.htm
    • (1999) ITL Bulletin — Acquiring and Deploying Intrusion Detection Systems
  • 8
    • 85023829124 scopus 로고    scopus 로고
    • Retrieved March 20, 2001, from the World Wide Web
    • Phoenix Health Systems. 2001. HIPAAdvisory — HIPAAtech:Intrusion Detection Retrieved March 20, 2001, from the World Wide Web:http://www.hipaadvisory. com/tech/IntrusionDetection.htm
    • (2001) HIPAAdvisory — HIPAAtech: Intrusion Detection
  • 9
    • 0000010513 scopus 로고    scopus 로고
    • Network Based Intrusion Detection: A Review of Technologies
    • Richards, K., 1999. Network Based Intrusion Detection:A Review of Technologies. Computers & Security, 18:671–682.
    • (1999) Computers & Security , vol.18 , pp. 671-682
    • Richards, K.1
  • 11
    • 0033351533 scopus 로고    scopus 로고
    • Practical Security Issues with High-Speed Networks
    • Retrieved March 17, 2001, from the EBSCOhost database on the World Wide Web
    • Velissaris, J., and Santarossa, R., 1999. Practical Security Issues with High-Speed Networks. Journal of High Speed Networks, 8 (4):311–324. Retrieved March 17, 2001, from the EBSCOhost database on the World Wide Web:http://www.epnet.com
    • (1999) Journal of High Speed Networks , vol.8 , Issue.1 , pp. 311-324
    • Velissaris, J.1    Santarossa, R.2
  • 12
    • 79151472621 scopus 로고
    • Intrusion-Detection Systems
    • Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web
    • O'Leary, D., 1992. Intrusion-Detection Systems. Journal of Information Systems, 6 (1):63–74. Retrieved March 17, 2001, from the MasterFILE Premier database on the World Wide Web:http://www.epnet.com
    • (1992) Journal of Information Systems , vol.6 , Issue.1 , pp. 63-74
    • O'Leary, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.