Active Bibliography

199 The design and implementation of Tripwire: A file system integrity checker – Gene H. Kim, Eugene H. Spafford - 1994
1 Writing, Supporting, and Evaluating Tripwire: A Publically Available Security Tool – Gene H. Kim, Eugene H. Spafford, Eugene H. Spa�ord - 1994
Behavioral feature Extraction for NETWORK ANOMALY DETECTION – James P. Early - 2005
Current Intrusion Detection Techniques in Information Technology- A Detailed Analysis – G. Mohammed Nazer, A. Arul, Lawrence Selvakumar
5 An Introduction to Intrusion-Detection Systems – Hervé Debar - 2002
35 A Revised Taxonomy for Intrusion-Detection Systems – Herve Debar, Marc Dacier, Andreas Wespi
SEGURIDAD EN UNIX Y REDES – Antonio Villalón Huerta, Ii Copyright C, Antonio Villalón Huerta
Network Working Group B. Fraser Request for Comments: 2196 Editor – unknown authors - 1244
Network Working Group B. Fraser Request for Comments: 2196 Editor – unknown authors - 1244
Network Working Group B. Fraser Request for Comments: 2196 Editor – unknown authors - 1244
40 Site Security Handbook – B. Fraser - 1997
Network Working Group B. Fraser Request for Comments: 2196 Editor – unknown authors - 1244
6 INTRUSION DETECTION: A SURVEY – Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava - 2005
1 A Control Point for Reducing Root Abuse of File-System Privileges – Glenn Wurster, Paul C. Van Oorschot
12 Forensic Computing: Developing a Conceptual Approach in the Era of Information Warfare – Vlasti Broucek, Paul Turner - 2001
38 Opus: Preventing Weak Password Choices – Eugene H. Spafford - 1992
3 Design principles for dedicated hash functions – Bart Preneel - 1994
51 HAVAL - A One-Way Hashing Algorithm with Variable Length of Output – Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry - 1993
1 New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru – Eli Biham