Information Technology Reference
In-Depth Information
Trompeter, C.M., and Eloff, J.H.P. A framework for the implementation of socio-ethical controls in information
security.
Computers & Security
, 20 (2001), 384-391.
Tudor, J.K.
Information Security Architecture: An Integrated Approach to Security in the Organization.
Boca
Raton, FL: CRC Press, 2000.
Warman, A.R. Organizational computer security policy: the reality.
European Journal of Information Systems
,
1, 5 (1992), 305-310.
Wei, H.; Frinke, D.; Olivia, C.; and Ritter, C. Cost-Benefit Analysis for Network Intrusion Detection Systems.
In
Proceedings of the CSI 28th Annual Computer Security Conference
, Washington, DC, October 2001.
Won, D. (ed.)
Proceedings of the Third International Conference on Information Security and Cryptology
(ICISC 2000).
Berlin: Springer, 2001.
Wood, C.C. Writing infosec policies.
Computer & Security
, 14, 8 (1995), 667-674.
Wood, C.C. Constructing difficult-to-guess passwords.
Information Management & Computer Security
, 4,
1 (1996), 43-44.
Yan, J.; Blackwell, A.; Anderson, R.; and Grant, A.
The Memorability and Security of Passwords
—
Some
Empirical Results.
Technical Report No. 500, Computer Laboratory, University of Cambridge, 2000
(available at http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf).
Yeung, D.-Y., and Ding, Y. (2002). User profiling for intrusion detection using dynamic and static behavioral
models. In M.-S. Cheng, P.S. Yu, and B. Liu (eds.),
Advances in Knowledge Discovery and Data Mining 6th
Pacific-Asia Conference, PAKDD 2002, Taipei, Taiwan, May 6-8, 2002. Proceedings,
2002, pp. 494-505.
Search WWH ::
Custom Search