Next: About this document ...
 Up: A Framework for Adaptive
 Previous: List of Tables
 
- ATK95
 - ATKINSON,
R.,
``RFC
1825
-
Standards
track'',
Naval
Research
Laboratory,
Network
working
group,
Aug
1995.
 - BEL94
 - BELLOVIN,
S.
and
CHESWICK,
W.,
``Network
Firewalls'',
IEEE
Communications
magazine,
Sep
1994.
 - DED97
 - DEDENE,
G.,
Economics
of
Information
Processing,
lecture
notes,
Katholieke
Universiteit
Leuven,
1997.
 - FOR94
 - FORD,
W.,
Computer
Communications
Security,
Principles,
Standard
Protocols
and
Techniques,
Prentice
Hall,
Englewood
Cliffs,
New
Jersey,
1994.
 - FRA94
 - FRANK,
J.,
``Artificial
Intelligence
and
Intrusion
Detection:
Current
and
Future
Directions'',
paper,
Division
of
Computer
Science,
University
of
California
at
Davis,
Jun
1994.
 - GOL97
 - GOLLMANN,
D.,
Computer
Security,
lecture
notes,
Royal
Holloway
and
Bedford
New
College,
University
of
London,
1997.
 - HAR85
 - HARMON,
P.
and
KING,
D.,
Artificial
Intelligence
in
Business:
Expert
Systems,
John
Wiley
and
Sons,
1985. 
 - ISO89
 - ISO/IEC
7498-2,
Information
processing
systems
-
Open
Systems
Interconnection
-
Basic
Reference
Model
-
Part
2:
Security
Architecture,
1989 (E).
 - ISO94
 - ISO/IEC
DIS
10181-3,
Information
Technology
-
Open
Systems
Interconnection
-
Security
Frameworks
in
Open
Systems
-
Part
3:
Access
Control,
1994.
 - ISO95
 - ISO/IEC
10736,
Information
Technology
-
Telecommunications
and
Information
Exchange
between
Systems
-
Transport
Layer
Security
Protocol,
1995 (E).
 - ISO96a
 - ISO/IEC
10181-1,
Information
Technology
-
Security
Frameworks
in
Open
Systems
-
Frameworks
Overview,
?.
 - ISO96b
 - ISO/IEC
2nd
DIS
11770-1,
Information
Technology
-
Security
Techniques
-
Key
Management
-
Part
1:
Framework,
1996.
 - ISO97
 - ISO/IEC
TR
13335-2,
Information
Technology
-
Security
Techniques
-
Guidelines
for
the
Management
of
IT
Security
-
Part
2:
Managing
and
Planning
IT
Security,
1997
 (E).
 - ISS98a
 - ISS,
``Adaptive
security
model
-
There
are
no
silver
bullets'',
http://www.iss.net/prod/sil_bul.html,
1998.
 - ISS98b
 - ISS,
Corporate
backgrounder,
1998.
 - JOH97
 - JOHNSON,
J.Z.,
CLAUS,
C.,
TAYLOR,
P.
et
al.,
``Getting
Passed
The
Cyperspace
Hype
-
Adaptive
Security
-
A
Model
Solution-A
Solution
Model'',
white
paper,
ISS,
Jun
1997.
 - MIT98
 - MITCHELL,
C.,
Standards
and
Evaluation
Criteria,
lecture
notes,
Royal
Holloway
and
Bedford
New
College,
University
of
London,
1998.
 - PAX98
 - PAXSON,
V.,
``Bro:
A
System
for
Detecting
Network
Intruders
in
Real-Time'',
Lawrence
Berkeley
National
Laboratory,
Network
Research
Group,
Jan
1998.
Paper
appeared
in
Proceedings
of
the
7th
USENIX
Security
Symposium,
San
Antonio,
TX,
Jan
1998.
 - PFL97
 - PFLEEGER,
C.
P.,
Security
in
Computing,
Prentice
Hall
International,
2nd
ed
1997.
 - PTA98
 - PTACEK,
T.
H.
and
NEWSHAM,
T.
N.,
``Insertion,
Evasion
and
Denial
of
Service:
Eluding
Network
Intrusion
Detection'',
paper,
Secure
Networks,
Inc.,
Jan
1998.
 - STA96
 - STANIFORD-CHEN,
S.
ET
AL.,
``GrIDS-A
Graph
Based
Intrusion
Detection
System
for
Large
Networks'',
paper,
Department
of
Computer
Science,
University
of
California,
Davis,
1996.
 - TRI94
 - TRINZIC,
Developing
Applications
with
AionDS,
student
guide
V1.0,
Trinzic
Corporation,
Palo
Alto
CA,
1994.
 - TUN98
 - TUNG,
B.,
ET.
AL.,
``A
Common
Intrusion
Specification
Language
(CISL)'',
Rev.
0.7,
the
Common
Intrusion
Detection
Framework
(CIDF)
homepage
at
http://seclab.cs.ucdavis.edu/cidf,
Aug
1998.
 - VAN97
 - VANTHIENEN,
J.,
Knowledge
Based
Systems,
lecture
notes,
Katholieke
Universiteit
Leuven,
1997.
 - ZAB97
 - ZABA,
S.,``Cryptographic
Security
in
the
Internet
Protocol
Suite:
Practice
and
Proposals'',
Paper,
HP
Labs
Bristol,
Aug
1997.
 
(c) 1998, Filip Schepers