Machine-independent audit trail analysis – a decision support tool for continuous audit assurance
暂无分享,去创建一个
[1] Julia H. Allen. The CERT Guide to System and Network Security Practices , 2001 .
[2] Nong Ye,et al. Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection , 2002 .
[3] I. Monitor. Information Security Management Handbook , 2000 .
[4] Rick Elam,et al. Continuous Auditing: Building Automated Auditing Capability , 2002 .
[5] Con Connell,et al. Applications of Expert Systems , 1989 .
[6] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[7] Mohammad J. Abdolmohammadi,et al. Decision Support and Expert Systems in Auditing: A Review and Research Directions , 1987 .
[8] Eugene H. Spafford,et al. The internet worm: crisis and aftermath , 1989 .
[9] Miklos A. Vasarhelyi,et al. Feasibility and Economics of Continuous Assurance , 2002 .
[10] Biswanath Mukherjee,et al. DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype , 1997 .
[11] Richard Barber,et al. The Secured Enterprise: Protecting Your Information Assets , 2002 .
[12] Katherine Schipper,et al. Discussion of "Opportunities for assurance services in the 21st century: A progress report of the Special Committee on Assurance Services:; , 1996 .
[13] N. Connell. Expert Systems in Accountancy: A Review of Some Recent Applications , 1987 .
[14] Nong Ye,et al. First‐order versus high‐order stochastic models for computer intrusion detection , 2002 .
[15] Ian H. Witten,et al. Computer in(security): infiltrating open systems , 1987 .
[16] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[17] Brian J. Garner,et al. Modelling as an Audit Technique , 1984, Aust. Comput. J..
[18] Susan M. Bridges,et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection , 2000, Int. J. Intell. Syst..
[19] Clifford Stoll,et al. Stalking the wily hacker , 1988, CACM.
[20] Oscar N. Garcia,et al. Knowledge-based systems : fundamentals and tools , 1991 .
[21] H. Javitz,et al. IDES : The Enhanced Prototype A Real-Time Intrusion-Detection Expert System , 1988 .
[22] Eugene H. Spafford,et al. Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities , 1999, J. Comput. Secur..
[23] Naji Habra,et al. ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis , 1992, ESORICS.
[24] Rangaswamy Jagannathan,et al. SYSTEM DESIGN DOCUMENT: NEXT-GENERATION INTRUSION DETECTION EXPERT SYSTEM (NIDES) , 1993 .
[25] Harold F. Tipton,et al. Information security management handbook, Sixth Edition , 2003 .
[26] Spyros G. Tzafestas. Knowledge-Based Systems: Advanced Concepts, Techniques and Applications , 1997 .
[27] Gary Rawlinson,et al. Applications of Expert Systems, Volume 2 , 1990 .
[28] Charles P. Pfleeger,et al. Security in computing , 1988 .
[29] Richard P. Lippmann,et al. 1999 DARPA Intrusion Detection Evaluation: Design and Procedures , 2001 .
[30] Qiang Chen,et al. An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems , 2001 .
[31] J. R. Winkler,et al. Intrusion And Anomaly Detection: ISOA Update , 1992 .
[32] Baudouin Le Charlier,et al. Continuous assessment of a Unix configuration: integrating intrusion detection and configuration analysis , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[33] Midori Asaka,et al. Information gathering with mobile agents for an intrusion detection system , 1999, Systems and Computers in Japan.
[34] Alan Sangster. Expert Systems in Auditing , 1990 .
[35] Peter J. Denning,et al. The internet worm , 1991 .
[36] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.