-
1
-
-
0003478316
-
The Architecture of a Network Level Intrusion Detection System
-
Technical Report, Dept. of Computer Science, University of New Mexico, August.
-
R. Heady, G. Luger, A. Maccabe and M. Servilla (1990) ‘The Architecture of a Network Level Intrusion Detection System’, Technical Report, Dept. of Computer Science, University of New Mexico, August.
-
(1990)
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
2
-
-
0004048154
-
Computer Security Threat Monitoring and Surveillance
-
Technical Report, James P. Anderson Co., Fort Washington, PA, April.
-
J. P. Anderson (1980) ‘Computer Security Threat Monitoring and Surveillance’, Technical Report, James P. Anderson Co., Fort Washington, PA, April.
-
(1980)
-
-
Anderson, J.P.1
-
3
-
-
84993048422
-
The IW Threat from Sub-State Groups: an Interdisciplinary Approach
-
17-20th June, National Defense University, Washington, DC
-
A. Rathmell, R. Overill, L. Valeri and J. Gearson (1997) ‘The IW Threat from Sub-State Groups: an Interdisciplinary Approach’, in Proceedings of the 3rd International Command & Control Research and Technology Symposium, 17-20th June, National Defense University, Washington, DC, p\p. 164–178.
-
(1997)
Proceedings of the 3rd International Command & Control Research and Technology Symposium
, pp. 164-178
-
-
Rathmell, A.1
Overill, R.2
Valeri, L.3
Gearson, J.4
-
4
-
-
84993048423
-
Computer Crime — an Historial Survey
-
Autumn
-
R. E. Overill (1997) ‘Computer Crime — an Historial Survey’, Defence Systems International, Autumn, pp. 102–103.
-
(1997)
Defence Systems International
, pp. 102-103
-
-
Overill, R.E.1
-
5
-
-
84993105323
-
Network Security Risks: a Question of Vulnerabilities x Threats
-
September
-
K. Black (1997) ‘Network Security Risks: a Question of Vulnerabilities x Threats’, Secure Computing, September, p. 47.
-
(1997)
Secure Computing
, pp. 47
-
-
Black, K.1
-
6
-
-
84993033277
-
Practical Intrusion Detection Introduction
-
Fed-CIRC, CSATC 97-063
-
S. Sparks and R. Pethia (1997) ‘Practical Intrusion Detection Introduction’, Fed-CIRC, CSATC 97-063, p. 32.
-
(1997)
, pp. 32
-
-
Sparks, S.1
Pethia, R.2
-
7
-
-
0007473204
-
An Introduction to Intrusion Detection
-
URL org/crossroads/xrds2-1.
-
A. Sundaram (1996) An Introduction to Intrusion Detection, AMC Crossroads, Vol. 2, No. 4. URL http://www.acrn. org/crossroads/xrds2-1.
-
(1996)
AMC Crossroads
, vol.2
, Issue.4
-
-
Sundaram, A.1
-
8
-
-
0027609384
-
A Survey of Intrusion Detection Techniques
-
T. F. Lunt (1993) ‘A Survey of Intrusion Detection Techniques’, Computers and Security, Vol. 12, No. 4, pp. 405–418.
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
|