메뉴 건너뛰기




Volumn 6, Issue 4, 1999, Pages 351-

Denial of Service Attacks: Threats and Methodologies

(1)  Overill, R E a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84992969489     PISSN: 13590790     EISSN: 17587239     Source Type: Journal    
DOI: 10.1108/eb025906     Document Type: Review
Times cited : (5)

References (13)
  • 1
    • 0003561143 scopus 로고    scopus 로고
    • The Next World War
    • Simon and Schuster, Ch. 10
    • Adams. J. (1998) ‘The Next World War’, Simon and Schuster, Ch. 10.
    • (1998)
    • Adams, J.1
  • 2
    • 84976720856 scopus 로고
    • The “Worm” Programs — Early Experience with a Distributed Computation
    • Shoch, J. F. and Hupp, J. A. (1982) ‘The “Worm” Programs — Early Experience with a Distributed Computation’, Commun. ACM, Vol. 25, No. 3, pp. 172–180.
    • (1982) Commun. ACM , vol.25 , Issue.3 , pp. 172-180
    • Shoch, J.F.1    Hupp, J.A.2
  • 3
    • 0041065277 scopus 로고
    • The Internet Worm: An Analysis
    • Spafford, E. H. (1989) ‘The Internet Worm: An Analysis’, Computer Commun. Review, Vol. 19, No. 1, pp. 17–57.
    • (1989) Computer Commun. Review , vol.19 , Issue.1 , pp. 17-57
    • Spafford, E.H.1
  • 4
    • 0242444735 scopus 로고
    • The Worm Story
    • Spafford, E. H. et al. (1989) ‘The Worm Story’, Commun. ACM, Vol. 32, No. 6, pp. 677–710.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 677-710
    • Spafford, E.H.1
  • 5
    • 84992971368 scopus 로고    scopus 로고
    • Web Security in Focus
    • July
    • ‘Web Security in Focus’ (1998) Secure Computing, July, pp. 24–33.
    • (1998) Secure Computing , pp. 24-33
  • 6
    • 0032374128 scopus 로고    scopus 로고
    • CSI Roundtable: Experts Discuss Present and Future Intrusion Detection Systems
    • Power, R. (1998) ‘CSI Roundtable: Experts Discuss Present and Future Intrusion Detection Systems’, Computer Security Journal, Vol. XIV, No. 1, pp. 1–18.
    • (1998) Computer Security Journal , vol.14 , Issue.1 , pp. 1-18
    • Power, R.1
  • 7
    • 0004210998 scopus 로고
    • Building Internet Firewalls
    • O'Reilly and Associates, Ch. 6
    • Chapman, D. B. and Zwicky, E. D. (1995) ‘Building Internet Firewalls’, O'Reilly and Associates, Ch. 6.
    • (1995)
    • Chapman, D.B.1    Zwicky, E.D.2
  • 8
    • 84992969694 scopus 로고    scopus 로고
    • Return of the Hack
    • 30th April
    • Smith, S. (1998) ‘Return of the Hack’, Computing, 30th April.
    • (1998) Computing
    • Smith, S.1
  • 9
    • 84993074014 scopus 로고    scopus 로고
    • Intrusion Detection Systems: Threats, Taxonomy, Tuning
    • Overill, R. E. (1998) ‘Intrusion Detection Systems: Threats, Taxonomy, Tuning’, Journal of Financial Crime, Vol. 6, No. 1, pp. 49–51.
    • (1998) Journal of Financial Crime , vol.6 , Issue.1 , pp. 49-51
    • Overill, R.E.1
  • 10
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection
    • available at URL http://www.secnet.com/papers/
    • Ptacek, T. and Newsham, T. (1998) ‘Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection’, available at URL http://www.secnet.com/papers/
    • (1998)
    • Ptacek, T.1    Newsham, T.2
  • 11
    • 84992947539 scopus 로고    scopus 로고
    • The Secret War
    • 20th June
    • Warren, P. (1996) ‘The Secret War’, Computing, 20th June.
    • (1996) Computing
    • Warren, P.1
  • 12
    • 84992992155 scopus 로고    scopus 로고
    • Trends in Computer Crime
    • Overill, R. E. (1998) ‘Trends in Computer Crime’, Journal of Financial Crime, Vol. 6, No. 2, pp. 157—162.
    • (1998) Journal of Financial Crime , vol.6 , Issue.2 , pp. 157-162
    • Overill, R.E.1
  • 13
    • 84993027952 scopus 로고    scopus 로고
    • Return of the Hack
    • Smith ‘Return of the Hack’
    • Smith1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.