A note on the role of deception in information protection
暂无分享,去创建一个
[1] Fred Cohen. Managing network security - The unpredictability of defence , 1998 .
[2] Fred Cohen,et al. Information system attacks: A preliminary classification scheme , 1997, Comput. Secur..
[3] Frederick B. Cohen. A note on distributed coordinated attacks , 1996, Comput. Secur..
[4] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[5] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[6] James F. Dunnigan,et al. Victory and Deceit: Dirty Tricks at War , 1995 .
[7] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[8] Steven M. Bellovin,et al. There Be Dragons , 1992, USENIX Summer.
[9] B. Cheswick. An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied , 1997 .
[10] F. Cohen. Algorithmic authentication of identification , 1985 .