Next Page Up (Back to First Page) Previous Page Table of Contents
Next: About this document Up: Threat Assesment of Malicious Previous: Summary

References

CON91
Computer security: Hackers penetrate DoD computer systems. Testimony before the Subcommittee on Government Information and Regulation, Committee on Government Affairs, United States Senate, Washington DC, November 1991.

Den90
Peter Denning. Computers Under Attack: Intruders, Worms, and Viruses. ACM Press, 1990.

GS91
Simon Garfinkel and Eugene Spafford. Practical UNIX Security. O'Reilly &Associates, Inc., 1991.

HM91
Katie Hafner and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. Simon and Schuster, 1991.

Hof90
Lance Hoffman. Rogue Programs: Viruses, Worms, and Trojan Horses. Van Norstrand Reinhold, 1990.

HP91
Benjamin Hsaio and W. Timothy Polk. Computer-assisted audit techniques for unix. In 14th Department of Energy Computer Security Group Conference, 1991.

Joh85
Mike St. Johns. Rfc 931: Authentication server, January 1985.

L+92
Theresa Lunt et al. A real-time Intrusion-Detection Expert System (IDES). In Final Technical Report for SRI Project 6784. SRI International, 1992.

Qua90
John Quarterman. The Matrix - Computer Networks and Conferencing Systems Worldwide. Digital Press, 1990.

S+89
Eugene Spafford et al. Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats. ADAPSO, 1989.

S+91
Steven R. Snapp et al. DIDS (Distributed Intrusion Detection System) - motivation, architecture, and an early prototype. In Proceedings of the 14th National Computer Security Conference, 1991.

SH82
John F. Shoch and Jon A. Hupp. The ``worm'' programs - early experience with a distributed computation. Association for Computing Machinery, 25(3), March 1982.

Spa89
Eugene Spafford. The internet worm program: An analysis. Computer Communication Review, 19(1), January 1989.

Wac91
John Wack. Establishing a Computer Security Incident Response Capability (CSIRC). NIST Special Publication 800-3, National Institute of Standards and Technology, 1991.


konczal@csrc.ncsl.nist.gov
Thu Mar 10 15:32:44 EST 1994