Information Technology Reference
In-Depth Information
Trompeter, C.M., and Eloff, J.H.P. A framework for the implementation of socio-ethical controls in information
security. Computers & Security , 20 (2001), 384-391.
Tudor, J.K. Information Security Architecture: An Integrated Approach to Security in the Organization. Boca
Raton, FL: CRC Press, 2000.
Warman, A.R. Organizational computer security policy: the reality. European Journal of Information Systems ,
1, 5 (1992), 305-310.
Wei, H.; Frinke, D.; Olivia, C.; and Ritter, C. Cost-Benefit Analysis for Network Intrusion Detection Systems.
In Proceedings of the CSI 28th Annual Computer Security Conference , Washington, DC, October 2001.
Won, D. (ed.) Proceedings of the Third International Conference on Information Security and Cryptology
(ICISC 2000). Berlin: Springer, 2001.
Wood, C.C. Writing infosec policies. Computer & Security , 14, 8 (1995), 667-674.
Wood, C.C. Constructing difficult-to-guess passwords. Information Management & Computer Security , 4,
1 (1996), 43-44.
Yan, J.; Blackwell, A.; Anderson, R.; and Grant, A. The Memorability and Security of Passwords Some
Empirical Results. Technical Report No. 500, Computer Laboratory, University of Cambridge, 2000
(available at http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf).
Yeung, D.-Y., and Ding, Y. (2002). User profiling for intrusion detection using dynamic and static behavioral
models. In M.-S. Cheng, P.S. Yu, and B. Liu (eds.), Advances in Knowledge Discovery and Data Mining 6th
Pacific-Asia Conference, PAKDD 2002, Taipei, Taiwan, May 6-8, 2002. Proceedings, 2002, pp. 494-505.
Search WWH ::




Custom Search