Information Technology Reference
In-Depth Information
References
1. Avdoshin, S., Serdiouk, V.: Some approaches to information security of communication
networks. Vol. 26. Slovenia, Informatica. (2002) 1-10.
2. Cohen, F.B.: Information System Attacks: A Preliminary Classification Scheme.
Computers and Security, Vol.16, No.1 (1997)
3. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems.
Computer Networks. Vol. 31 (1999) 805-822.
4. Denning, D.: An intrusion-detection model. IEEE Transactions on Software Engineering.
Vol. 13 (1987) 222-232.
5. Gorodetski, V., Kotenko I., Attacks against Computer Network: Formal Grammar-Based
Framework and Simulation Tool: RAID 2002 (2002) 219-238.
6. Krsul, I.V.: Software Vulnerability Analysis, Ph.D. Dissertation, Computer Sciences
Department, Purdue University, Lafayette, IN (1998)
7. Kumar, S., Spafford, E.:A pattern matching model for misuse intrusion detection, Proc.
17th National Computer Security Conf. October (1994) 11-21.
8. Serdiouk, V.: Methods of data collection by intrusion detection systems. BYTE/Russia, 54
(2003) 74-78
9. Serdiouk, V.: Prevention of computer attacks. Network Magazine. Russia. 2 (2003) 62-67.
10. Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Computer
communications. Vol. 25 (2002) 1356-1365.
 
Search WWH ::




Custom Search