메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 226-237

When not to pull the plug-the need for network counter-surveillance operations

Author keywords

Computer Network Security; Network Counter Surveillance Operation; Network Defence

Indexed keywords

COMPUTER NETWORKS; MONITORING; NETWORK SECURITY;

EID: 80051543539     PISSN: 18716431     EISSN: 18798101     Source Type: Book Series    
DOI: 10.3233/978-1-60750-060-5-226     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
    • 84865410075 scopus 로고    scopus 로고
    • Computer Emergency Readiness Team (CERT) 20 May
    • Computer Emergency Readiness Team (CERT), Steps for Recovering from a UNIX or NT System Compromise, Online Available: http://www.cert.org/tech-tips/ win-UNIX-system-compromise.html, 20 May 2009.
    • (2009) Steps for Recovering from A UNIX or NT System Compromise
  • 2
    • 84865418649 scopus 로고    scopus 로고
    • The United States Army Department of the Army, Washington, DC 4 July
    • The United States Army, Army Field Manual FM 3-90, Department of the Army, Washington, DC , 4 July 2001.
    • (2001) Army Field Manual FM 3-90
  • 5
    • 33745056138 scopus 로고    scopus 로고
    • U.S. Department of Defence, Joint Publication 3-06 DoD 16 Sep
    • U.S. Department of Defence, Joint Publication 3-06 Doctrine for Joint Urban Operations, DoD, 16 Sep 2002.
    • (2002) Doctrine for Joint Urban Operations
  • 11
    • 84865416948 scopus 로고    scopus 로고
    • SIG 2 G-TEC-, Jun.
    • C. K. Tan, \Detecting sebek win32 client," SIG 2 G-TEC-, Jun. 2004. [Online]. Available: http://www.security.org.sg/vuln/sebek215.html
    • (2004) Detecting Sebek win32 Client
    • Tan, C.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.