-
2
-
-
0036090464
-
-
Florian Kerschbaum, Eugene H. Spafford, and Diego Zamboni. "Using internal sensors and embedded detectors for intrusion detection". Journal of Computer Security, 10(1-2): 23-70.
-
Florian Kerschbaum, Eugene H. Spafford, and Diego Zamboni. "Using internal sensors and embedded detectors for intrusion detection". Journal of Computer Security, 10(1-2): 23-70.
-
-
-
-
3
-
-
51549120258
-
-
Frederic Avolio. "Firewalls and Internet security, the second hundred (Internet) years". The Internet Protocol Journal, 2(2): 24-32.
-
Frederic Avolio. "Firewalls and Internet security, the second hundred (Internet) years". The Internet Protocol Journal, 2(2): 24-32.
-
-
-
-
4
-
-
51549117396
-
-
David Koblas. "SOCKS". 3rd USENIX UNIX Security Symposium, Baltimore, MD, USA. USENIX Association, 1992.
-
David Koblas. "SOCKS". 3rd USENIX UNIX Security Symposium, Baltimore, MD, USA. USENIX Association, 1992.
-
-
-
-
5
-
-
51549093266
-
-
D. Brent Chapman and Elizabeth D. Zwicky. 'Proxy Systems'. Chapter 7 in Building Internet Firewalls. O'Reilly, 1995.
-
D. Brent Chapman and Elizabeth D. Zwicky. 'Proxy Systems'. Chapter 7 in Building Internet Firewalls. O'Reilly, 1995.
-
-
-
-
6
-
-
51549117395
-
-
Charlie Russel, Sharon Crawford, and Jason Gerend. 'Managing Users and Groups'. Chapter 9 in Microsoft Windows Server 2003 Administrator's Companion. Microsoft Press, 2003.
-
Charlie Russel, Sharon Crawford, and Jason Gerend. 'Managing Users and Groups'. Chapter 9 in Microsoft Windows Server 2003 Administrator's Companion. Microsoft Press, 2003.
-
-
-
-
7
-
-
51549098077
-
-
Simson Garfinkel, Gene Spafford, and Alan Schwartz. 'Users, passwords, and authentication'. Chapter 4 in Practical UNIX and Internet Security. O'Reilly, 2003.
-
Simson Garfinkel, Gene Spafford, and Alan Schwartz. 'Users, passwords, and authentication'. Chapter 4 in Practical UNIX and Internet Security. O'Reilly, 2003.
-
-
-
-
8
-
-
51549083926
-
-
Peter Szor. 'Antivirus Defense techniques. Chapter 11 in The Art of Computer Virus Research and Defense'. Symantec, 2005.
-
Peter Szor. 'Antivirus Defense techniques. Chapter 11 in The Art of Computer Virus Research and Defense'. Symantec, 2005.
-
-
-
-
9
-
-
84948951525
-
-
Matthew W. Williamson. "Throttling Viruses: Restricting propagation to defeat malicious mobile code". 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA. Washington: IEEE Computer Society, 2002.
-
Matthew W. Williamson. "Throttling Viruses: Restricting propagation to defeat malicious mobile code". 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA. Washington: IEEE Computer Society, 2002.
-
-
-
-
10
-
-
51549103787
-
-
Jim McBee. 'Microsoft Exchange Server 2003 Advanced Administration'. Sybex, 2006.
-
Jim McBee. 'Microsoft Exchange Server 2003 Advanced Administration'. Sybex, 2006.
-
-
-
-
11
-
-
51549112601
-
-
SpamAssassin. 3 August 2008 .
-
SpamAssassin. 3 August 2008 .
-
-
-
-
12
-
-
51549111071
-
-
PureMessage. Sophos. 3 August 2008 .
-
PureMessage. Sophos. 3 August 2008 .
-
-
-
-
13
-
-
0034300682
-
-
Eugene H. Spafford and Diego Zamboni. "Intrusion detection using autonomous agents". Computer Networks, 34(4): 547-570.
-
Eugene H. Spafford and Diego Zamboni. "Intrusion detection using autonomous agents". Computer Networks, 34(4): 547-570.
-
-
-
-
14
-
-
51549100128
-
-
Christopher Krugel and Thomas Toth. "Applying mobile agent technology to intrusion detection". Workshop on Software Engineering and Mobility at the 23rd International Conference on Software Engineering, 2001.
-
Christopher Krugel and Thomas Toth. "Applying mobile agent technology to intrusion detection". Workshop on Software Engineering and Mobility at the 23rd International Conference on Software Engineering, 2001.
-
-
-
-
15
-
-
84867752517
-
-
Midori Asaka, T. Onabuta, T. Inoue, and S. Goto. "The Use of Mobile Agents in Tracing an Intruder in a Local Area Network". 6th Pacific Rim International Conference on Artificial Intelligence, Melbourne, Australia. LNCS Volume 1886/2000: 373-382. Springer, 2000.
-
Midori Asaka, T. Onabuta, T. Inoue, and S. Goto. "The Use of Mobile Agents in Tracing an Intruder in a Local Area Network". 6th Pacific Rim International Conference on Artificial Intelligence, Melbourne, Australia. LNCS Volume 1886/2000: 373-382. Springer, 2000.
-
-
-
-
16
-
-
51549101518
-
-
OSSEC. 3 August 2008 .
-
OSSEC. 3 August 2008 .
-
-
-
-
17
-
-
51549084510
-
-
Rebecca G. Bace. 'Analysis Schemes'. Chapter 4 of Intrusion Detection. Macmillan, 2000.
-
Rebecca G. Bace. 'Analysis Schemes'. Chapter 4 of Intrusion Detection. Macmillan, 2000.
-
-
-
|