A Study on Monitoring and Protecting Computer System against Interception Threat
暂无分享,去创建一个
Jongmoo Choi | Joonmo Kim | Seongje Cho | Chulyean Chang | Jongmoo Choi | Seong-je Cho | Chu-Young Chang | Joonmo Kim
[1] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[2] Karl N. Levitt,et al. Towards a testbed for malicious code detection , 1991, COMPCON Spring '91 Digest of Papers.
[3] John McHugh,et al. Intrusion and intrusion detection , 2001, International Journal of Information Security.
[4] Carl E. Landwehr,et al. A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .
[5] Gerald Tesauro,et al. Neural networks for computer virus recognition , 1996 .
[6] Computer Staff,et al. Compcon Spring 91 , 1991 .
[7] N. D. Durie,et al. Digest of papers , 1976 .
[8] Thierry Lecroq,et al. Handbook of Exact String Matching Algorithms , 2004 .
[9] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[10] M. Bishop. Vulnerabilities Analysis , 1967 .
[11] John Ray. Maximum Linux security , 2001 .