Active Bibliography

224 The design and implementation of Tripwire: A file system integrity checker – Gene H. Kim, Eugene H. Spafford - 1994
1 Writing, Supporting, and Evaluating Tripwire: A Publically Available Security Tool – Gene H. Kim , Eugene H. Spafford - 1994
511 StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks – Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang - 1998
470 Authentication in distributed systems: Theory and practice – Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber - 1992
324 Intrusion Detection using Sequences of System Calls – Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji - 1998
377 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
310 Self-nonself discrimination in a computer – Stephanie Forrest, Alan S. Perelson, Lawrence Allen, Rajesh Cherukur, Stephanie Forrest, Lawrence Allen - 1994
Behavioral feature Extraction for NETWORK ANOMALY DETECTION – James P. Early - 2005
297 A Virtual Machine Introspection Based Architecture for Intrusion Detection – Tal Garfinkel, Mendel Rosenblum - 2003