Data dependency based logging for defensive information warfare
暂无分享,去创建一个
[1] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[2] David S Alberts,et al. Defensive Information Warfare , 1996 .
[3] Sushil Jajodia,et al. Trusted recovery , 1999, CACM.
[4] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[5] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.
[6] Terrance Goan. A cop on the beat: collecting and appraising intrusion evidence , 1999, CACM.
[7] Brajendra Panda,et al. An overview of post information warfare data recovery , 1998, SAC '98.
[8] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.
[9] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .