Next: About this document
Up: Seguridad en sistemas UNIX
Previous: Técnicas de IA
References
- AFV95
-
Debra Anderson, Thane Frivold, and Alfonso Valdes.
Next-generation intrusion detection system (NIDES).
Technical report, SRI International, Mayo 1995.
A Summary.
- Ams88
-
Ellen Amsel.
Network security and access control.
Network Access Special Interest Group, ISSA, 1988.
- CHS91
-
Peter Cheesman, Robin Hanson, and John Stutz.
Bayesian classification with correlation and inheritance.
In 12th International Conference on Artificial Intelligence, Agosto
1991.
- Cur90
-
David A. Curry.
Improving the security of your UNIX system.
Technical report, Programer Information and Telecomunication Sciences
and Technology Division SRI International, 1990.
- Dep85
-
Departmant of Defense Standard.
Departmen of defense trusted computer. System evaluation
criteria (Orange Book), Diciembre 1985.
- Fra94
-
Jeremy Frank.
Artificial inteligence and intruson detection: Current and future
directions.
Technical report, Division of Computer Science. University of
California at Davis, 1994.
- FS95
-
Daniel Farmer and Eugene H. Spafford.
The COPS security checker system.
Technical report, Computer Emergenci Response Team, Carnegie Mellon
University. Department of Computer Science, Purdue University, 1995.
- FV86
-
Dan Farner and Wietse Venema.
Improving the security of your site by breaking into it.
Technical report, Sun Microsystems, Eeindhoven University of
Technology, 1986.
- HLMS90
-
R. Heady, G. Luger, A. Maccabe, and M. Servilla.
The architecture of a network level intrusion detection system.
Technical report, Department of Computer Science, University of New
Mexico, Agosto 1990.
- HSP91
-
David K. Hess, David R. Spafford, and Udo W. Pooch.
A UNIX network protocol security study: Network information
service.
Technical report, Texas A&M University, 1991.
- IEE90
-
IEEE.
A Computational Model for the Data Compresion Metaphor,
Symposium on Reserach in Computer Security and Privacy, 1990.
- Ilg92
-
Koral Ilgun.
USTAT: A real-time imtrusion detection system for UNIX.
Masterś thesis, Computer Science Department, University of
California Santa Barbara, 1992.
- KS94
-
Sandeep Kumar and Eugene H. Spafford.
An application of pattern matching in intrusion detection.
Technical report, The COAST project. Department of Computer Sciences.
University of California, Davis, 1994.
- MHL94
-
Biswanath Mukherjee, L. Todd Heberlein, and Karl N. Levit.
Network intrusion detection.
IEEE Network, Mayo/Junio 1994.
- Nat94
-
National Institute of Standards and Technology. U.S. Department of
Commerce.
An introdution to Computer Security: The NIST Handbook,
1994.
- Ran94
-
Markus J. Ranum.
Thinking about firewalls.
Technical report, Trusted Information Systems Inc., 1994.
- Rit79
-
Dennis Ritchie.
On the security of UNIX.
Technical report, AT&T Bell Laboratories, 1979.
- Sch93
-
Schubar.
Weackness in the DNS, the domain name service.
Technical report, Purdue University, 1993.
- Sma88
-
Stephen E. Smaha.
Haystack: An intrusion detection system.
In In Fourth Aerospace Computer Security Applications
Conference, pages 37--44, 1988.
- SS92
-
Steven R. Snapp and Stephen E. Smaha.
Signature analysis model definition and formalism, Agosto 1992.
- Sta94
-
William Stallings.
SNMP, SNMPv2 and CMIP. The Practical Guide to
Network-Management Standards.
Addison-Wesley Publishing Company, fourth edition, Abril 1994.
- Sun88
-
Sun Microsystems.
SunOS Reference Manual, part number 800-1751-10 edition, Mayo
1988.
- Sun90a
-
Sun Microsystems.
Administering Security, revision A of 27 march edition, 1990.
- Sun90b
-
Sun Microsystems.
System Network Administration, revision A of 27 march
edition, 1990.
- TCL90
-
Henry S. Teng, Kaihu Chen, and Stephen C Lu.
Analysis using inductively generated predicted rules.
Technical report, Piscataway, New jersey, Marzo 1990.
- Tom94
-
Chris Tomlinson.
Solaris security: A practical guide.
Technical report, Sun Microsystems, 1994.
Celestino Gomez Cid (adm)
Fri Mar 22 16:20:52 MET 1996