Anterior Índice Próxima

7. Bibliografia

[1] Anderson, J. P.; Computer Security Threat Monitoring and Surveillance, James P. Anderson Co., Fort Washington, PA, abril de 1980. http://csrc.nist.gov/publications/history/ande80.pdf

[2] Denning, D. E.; An Intrusion Detection Model, IEEE Transactions On Software Engineering, Vol. SE-13, No. 2, Fevereiro 1987, pp. 222-232. http://www.cs.georgetown.edu/~denning/infosec/ids-model.rtf

[3] Heberlein, L. T., Dias, G. V., Levitt, K. N., Mukherjee B., Wood J., Wolber D.; A Network Security Monitor, Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, Maio 1990, pp. 296-303.

[4] Innella, P.; The Evolution of Intrusion Detection Systems; Tetrad Digital Integrity, LLC, Novembro de 2001. http://www.securityfocus.com/infocus/1514

[5] Innella, P.; An Introduction to Intrusion Detection Systems; Tetrad Digital Integrity, LLC, Dezembro de 2001. http://www.securityfocus.com/infocus/1520

[6] Elson, D.; Intrusion Detection, Theory and Practice; Março de 2000. http://www.securityfocus.com/infocus/1203

[7] Frederick, K. K.; Network Intrusion Detection Signatures - A Five-Part Series; Dezembro de 2001. http://www.securityfocus.com/infocus/1524
http://www.securityfocus.com/infocus/1534
http://www.securityfocus.com/infocus/1544
http://www.securityfocus.com/infocus/1553
http://www.securityfocus.com/infocus/1569

[8] Miller, T.; Intelligence Gathering: Watching a Honeypot at Work, Janeiro de 2003. http://www.securityfocus.com/infocus/1656

[9] Spitzner, L..; The Value Of Honeypots, Part One: Definitions and Values of Honeypots, Outubro de 2001. http://www.securityfocus.com/infocus/1492


Anterior Índice Próxima Copyright © 2003 Rafael P. Laufer