A Taxonomy of Network and Computer Attack Methodologies
暂无分享,去创建一个
[1] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[2] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[3] Matt Bishop,et al. A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .
[4] H. Lipson. Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues , 2002 .
[5] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[6] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[7] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, S&P 1997.
[8] Chris Anley,et al. Advanced SQL Injection In SQL Server Applications , 2002 .
[9] Carlo Kopp. The electromagnetic bomb - a weapon of electrical mass destruction , 1996 .
[10] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[11] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[12] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[13] Eric Chien,et al. BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .
[14] Marco de Vivo,et al. Internet security attacks at the basic levels , 1998, OPSR.
[15] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[16] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[17] Hal Berghel,et al. The Code Red Worm , 2001, CACM.
[18] A. Householder,et al. Computer attack trends challenge Internet security , 2002 .
[19] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[20] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[21] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[22] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[23] Matt Bishop,et al. A Critical Analysis of Vulnerability Taxonomies , 1996 .
[24] Andrew Smith,et al. Digging for worms, fishing for answers , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[25] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.
[26] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .
[27] R. P. Abbott,et al. Security Analysis and Enhancements of Computer Operating Systems , 1976 .
[28] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[29] Dennis Hollingworth,et al. Protection Analysis: Final Report , 1978 .
[30] Samuel Glasstone,et al. The Effects of Nuclear Weapons , 1952 .
[31] S. R. Subramanya,et al. Computer viruses , 2001 .
[32] Lee Garber. Melissa Virus Creates a New Type of Threat , 1999, Computer.
[33] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .