Internet Attack Methods and Internet Security Technology
暂无分享,去创建一个
[1] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[2] Sonia Fahmy,et al. Refereed papers: A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals1 1This work was supported by sponsers of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. , 2001 .
[3] Matt Bishop,et al. A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .
[4] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[5] Wenliang Du,et al. Categorization of Software Errors that led to Security Breaches , 1998 .
[6] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[7] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[8] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[9] Sonia Fahmy,et al. A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals , 2001, Comput. Secur..
[10] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[11] Marco de Vivo,et al. Internet security attacks at the basic levels , 1998, OPSR.
[12] A. Householder,et al. Computer attack trends challenge Internet security , 2002 .