Next: About this document ...
Up: A Framework for Adaptive
Previous: List of Tables
- ATK95
- ATKINSON,
R.,
``RFC
1825
-
Standards
track'',
Naval
Research
Laboratory,
Network
working
group,
Aug
1995.
- BEL94
- BELLOVIN,
S.
and
CHESWICK,
W.,
``Network
Firewalls'',
IEEE
Communications
magazine,
Sep
1994.
- DED97
- DEDENE,
G.,
Economics
of
Information
Processing,
lecture
notes,
Katholieke
Universiteit
Leuven,
1997.
- FOR94
- FORD,
W.,
Computer
Communications
Security,
Principles,
Standard
Protocols
and
Techniques,
Prentice
Hall,
Englewood
Cliffs,
New
Jersey,
1994.
- FRA94
- FRANK,
J.,
``Artificial
Intelligence
and
Intrusion
Detection:
Current
and
Future
Directions'',
paper,
Division
of
Computer
Science,
University
of
California
at
Davis,
Jun
1994.
- GOL97
- GOLLMANN,
D.,
Computer
Security,
lecture
notes,
Royal
Holloway
and
Bedford
New
College,
University
of
London,
1997.
- HAR85
- HARMON,
P.
and
KING,
D.,
Artificial
Intelligence
in
Business:
Expert
Systems,
John
Wiley
and
Sons,
1985.
- ISO89
- ISO/IEC
7498-2,
Information
processing
systems
-
Open
Systems
Interconnection
-
Basic
Reference
Model
-
Part
2:
Security
Architecture,
1989 (E).
- ISO94
- ISO/IEC
DIS
10181-3,
Information
Technology
-
Open
Systems
Interconnection
-
Security
Frameworks
in
Open
Systems
-
Part
3:
Access
Control,
1994.
- ISO95
- ISO/IEC
10736,
Information
Technology
-
Telecommunications
and
Information
Exchange
between
Systems
-
Transport
Layer
Security
Protocol,
1995 (E).
- ISO96a
- ISO/IEC
10181-1,
Information
Technology
-
Security
Frameworks
in
Open
Systems
-
Frameworks
Overview,
?.
- ISO96b
- ISO/IEC
2nd
DIS
11770-1,
Information
Technology
-
Security
Techniques
-
Key
Management
-
Part
1:
Framework,
1996.
- ISO97
- ISO/IEC
TR
13335-2,
Information
Technology
-
Security
Techniques
-
Guidelines
for
the
Management
of
IT
Security
-
Part
2:
Managing
and
Planning
IT
Security,
1997
(E).
- ISS98a
- ISS,
``Adaptive
security
model
-
There
are
no
silver
bullets'',
http://www.iss.net/prod/sil_bul.html,
1998.
- ISS98b
- ISS,
Corporate
backgrounder,
1998.
- JOH97
- JOHNSON,
J.Z.,
CLAUS,
C.,
TAYLOR,
P.
et
al.,
``Getting
Passed
The
Cyperspace
Hype
-
Adaptive
Security
-
A
Model
Solution-A
Solution
Model'',
white
paper,
ISS,
Jun
1997.
- MIT98
- MITCHELL,
C.,
Standards
and
Evaluation
Criteria,
lecture
notes,
Royal
Holloway
and
Bedford
New
College,
University
of
London,
1998.
- PAX98
- PAXSON,
V.,
``Bro:
A
System
for
Detecting
Network
Intruders
in
Real-Time'',
Lawrence
Berkeley
National
Laboratory,
Network
Research
Group,
Jan
1998.
Paper
appeared
in
Proceedings
of
the
7th
USENIX
Security
Symposium,
San
Antonio,
TX,
Jan
1998.
- PFL97
- PFLEEGER,
C.
P.,
Security
in
Computing,
Prentice
Hall
International,
2nd
ed
1997.
- PTA98
- PTACEK,
T.
H.
and
NEWSHAM,
T.
N.,
``Insertion,
Evasion
and
Denial
of
Service:
Eluding
Network
Intrusion
Detection'',
paper,
Secure
Networks,
Inc.,
Jan
1998.
- STA96
- STANIFORD-CHEN,
S.
ET
AL.,
``GrIDS-A
Graph
Based
Intrusion
Detection
System
for
Large
Networks'',
paper,
Department
of
Computer
Science,
University
of
California,
Davis,
1996.
- TRI94
- TRINZIC,
Developing
Applications
with
AionDS,
student
guide
V1.0,
Trinzic
Corporation,
Palo
Alto
CA,
1994.
- TUN98
- TUNG,
B.,
ET.
AL.,
``A
Common
Intrusion
Specification
Language
(CISL)'',
Rev.
0.7,
the
Common
Intrusion
Detection
Framework
(CIDF)
homepage
at
http://seclab.cs.ucdavis.edu/cidf,
Aug
1998.
- VAN97
- VANTHIENEN,
J.,
Knowledge
Based
Systems,
lecture
notes,
Katholieke
Universiteit
Leuven,
1997.
- ZAB97
- ZABA,
S.,``Cryptographic
Security
in
the
Internet
Protocol
Suite:
Practice
and
Proposals'',
Paper,
HP
Labs
Bristol,
Aug
1997.
(c) 1998, Filip Schepers