Next: About this document
Up: Threat Assesment of Malicious
Previous: Summary
References
- CON91
-
Computer security: Hackers penetrate DoD computer systems.
Testimony before the Subcommittee on Government Information and
Regulation, Committee on Government Affairs, United States Senate, Washington
DC, November 1991.
- Den90
-
Peter Denning.
Computers Under Attack: Intruders, Worms, and Viruses.
ACM Press, 1990.
- GS91
-
Simon Garfinkel and Eugene Spafford.
Practical UNIX Security.
O'Reilly &Associates, Inc., 1991.
- HM91
-
Katie Hafner and John Markoff.
Cyberpunk: Outlaws and Hackers on the Computer Frontier.
Simon and Schuster, 1991.
- Hof90
-
Lance Hoffman.
Rogue Programs: Viruses, Worms, and Trojan Horses.
Van Norstrand Reinhold, 1990.
- HP91
-
Benjamin Hsaio and W. Timothy Polk.
Computer-assisted audit techniques for unix.
In 14th Department of Energy Computer Security Group
Conference, 1991.
- Joh85
-
Mike St. Johns.
Rfc 931: Authentication server, January 1985.
- L+92
-
Theresa Lunt et al.
A real-time Intrusion-Detection Expert System (IDES).
In Final Technical Report for SRI Project 6784. SRI
International, 1992.
- Qua90
-
John Quarterman.
The Matrix - Computer Networks and Conferencing Systems
Worldwide.
Digital Press, 1990.
- S+89
-
Eugene Spafford et al.
Computer Viruses: Dealing with Electronic Vandalism and
Programmed Threats.
ADAPSO, 1989.
- S+91
-
Steven R. Snapp et al.
DIDS (Distributed Intrusion Detection System) - motivation,
architecture, and an early prototype.
In Proceedings of the 14th National Computer Security
Conference, 1991.
- SH82
-
John F. Shoch and Jon A. Hupp.
The ``worm'' programs - early experience with a distributed
computation.
Association for Computing Machinery, 25(3), March 1982.
- Spa89
-
Eugene Spafford.
The internet worm program: An analysis.
Computer Communication Review, 19(1), January 1989.
- Wac91
-
John Wack.
Establishing a Computer Security Incident Response Capability
(CSIRC).
NIST Special Publication 800-3, National Institute of Standards and
Technology, 1991.