next up previous contents
Next: About this document ... Up: A Framework for Adaptive Previous: List of Tables

Bibliography

ATK95
ATKINSON, R., ``RFC 1825 - Standards track'', Naval Research Laboratory, Network working group, Aug 1995.

BEL94
BELLOVIN, S. and CHESWICK, W., ``Network Firewalls'', IEEE Communications magazine, Sep 1994.

DED97
DEDENE, G., Economics of Information Processing, lecture notes, Katholieke Universiteit Leuven, 1997.

FOR94
FORD, W., Computer Communications Security, Principles, Standard Protocols and Techniques, Prentice Hall, Englewood Cliffs, New Jersey, 1994.

FRA94
FRANK, J., ``Artificial Intelligence and Intrusion Detection: Current and Future Directions'', paper, Division of Computer Science, University of California at Davis, Jun 1994.

GOL97
GOLLMANN, D., Computer Security, lecture notes, Royal Holloway and Bedford New College, University of London, 1997.

HAR85
HARMON, P. and KING, D., Artificial Intelligence in Business: Expert Systems, John Wiley and Sons, 1985.

ISO89
ISO/IEC 7498-2, Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture, 1989 (E).

ISO94
ISO/IEC DIS 10181-3, Information Technology - Open Systems Interconnection - Security Frameworks in Open Systems - Part 3: Access Control, 1994.

ISO95
ISO/IEC 10736, Information Technology - Telecommunications and Information Exchange between Systems - Transport Layer Security Protocol, 1995 (E).

ISO96a
ISO/IEC 10181-1, Information Technology - Security Frameworks in Open Systems - Frameworks Overview, ?.

ISO96b
ISO/IEC 2nd DIS 11770-1, Information Technology - Security Techniques - Key Management - Part 1: Framework, 1996.

ISO97
ISO/IEC TR 13335-2, Information Technology - Security Techniques - Guidelines for the Management of IT Security - Part 2: Managing and Planning IT Security, 1997 (E).

ISS98a
ISS, ``Adaptive security model - There are no silver bullets'', http://www.iss.net/prod/sil_bul.html, 1998.

ISS98b
ISS, Corporate backgrounder, 1998.

JOH97
JOHNSON, J.Z., CLAUS, C., TAYLOR, P. et al., ``Getting Passed The Cyperspace Hype - Adaptive Security - A Model Solution-A Solution Model'', white paper, ISS, Jun 1997.

MIT98
MITCHELL, C., Standards and Evaluation Criteria, lecture notes, Royal Holloway and Bedford New College, University of London, 1998.

PAX98
PAXSON, V., ``Bro: A System for Detecting Network Intruders in Real-Time'', Lawrence Berkeley National Laboratory, Network Research Group, Jan 1998. Paper appeared in Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, Jan 1998.

PFL97
PFLEEGER, C. P., Security in Computing, Prentice Hall International, 2nd ed 1997.

PTA98
PTACEK, T. H. and NEWSHAM, T. N., ``Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection'', paper, Secure Networks, Inc., Jan 1998.

STA96
STANIFORD-CHEN, S. ET AL., ``GrIDS-A Graph Based Intrusion Detection System for Large Networks'', paper, Department of Computer Science, University of California, Davis, 1996.

TRI94
TRINZIC, Developing Applications with AionDS, student guide V1.0, Trinzic Corporation, Palo Alto CA, 1994.

TUN98
TUNG, B., ET. AL., ``A Common Intrusion Specification Language (CISL)'', Rev. 0.7, the Common Intrusion Detection Framework (CIDF) homepage at http://seclab.cs.ucdavis.edu/cidf, Aug 1998.

VAN97
VANTHIENEN, J., Knowledge Based Systems, lecture notes, Katholieke Universiteit Leuven, 1997.

ZAB97
ZABA, S.,``Cryptographic Security in the Internet Protocol Suite: Practice and Proposals'', Paper, HP Labs Bristol, Aug 1997.


(c) 1998, Filip Schepers