Back to Results
First PageMeta Content
Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare


IJIS: 14–35 / Digital Object Identifier (DOIs102070100001 Intrusion and intrusion detection John McHugh CERT Coordination Center∗ , Software Engineering Institute, Carnegie Mellon University,
Add to Reading List

Document Date: 2014-02-03 21:40:14


Open Document

File Size: 366,32 KB

Share Result on Facebook

Company

Naval Research Laboratory / Intrusion Detection Systems / Krusl / Phrack / RAND Corporation / IBM / Oracle / James P. Anderson & Co. / Sybase / TRW / /

/

Event

Judicial Event / Business Partnership / /

Facility

University of Maryland Computer Science Faculty / Stanford University / Software Engineering Institute / University of California at Davis / National Institute of Standards and Technology / Carnegie Mellon University / National Computer Security Center / Naval Research Laboratory / /

IndustryTerm

adequate computer systems / anti-virus products / software design / multilevel secure systems / system utilities / multiuser systems / secure systems / modified utilities / Financial systems / proper user accounting / online magazine / realistic processing / rst internet-wide attack / system software / software component / software development / accessible services / language processor / multiuser batch systems / software features / host/applications / segmentation hardware / database management systems / information sharing systems / incorrect software design / system operators / public-domain systems / unclassified computing / insecure protocols / online database / host hardware / computing / target systems / penetrated computing system / detection systems / re-entrant processor / host-based systems / software engineering failure / large networks / subsequent systems / network interface device / notable systems / keyword search / rst systems / Assurance technologies / denial-ofservice tools / multi-level secure computing system / detection technology / intruder tools / present-day web servers / commodity operating systems / early systems / network sensing devices / substantial computing / /

OperatingSystem

Unix / BSD / Solaris / Microsoft Windows / Unix system / MS-DOS / Multics / Windows NT / /

Organization

University of California / CERT / National Computer Security Center / National Institute of Standards and Technology / Software Engineering Institute / Carnegie Mellon University / Pittsburgh / Air Force / United States Navy / predefined administration / University of Maryland Computer Science Faculty / CERT Coordination Center / Coordination Center / Stanford University / Department of Defense / Defense Science Board’s Task Force on Computer Security / /

Person

Roger R. Schell / David Stryker / Peter Neumann / Brian Reid / Morris Worm / Fred Cohen / Dorothy Denning / Willis H. Ware / John Brunner / Robert T. Morris / Sr. / Lunt / Robert T. Morris / Jr. / Roger Schell / Password / Rebecca Bace / John McHugh / Mike Lay / Paul Karger / /

/

Position

specialized auditor / engineer / author / supervisor / Major / programmer / yielding administrator / manager / Scientist / model / Chief Scientist / Denning’s model / /

ProvinceOrState

California / /

PublishedMedium

Phrack / /

SportsLeague

Stanford University / /

Technology

interface device / 1972 Computer Security Technology / operating system / TCP/IP protocol / re-entrant processor / GUI / Expert System / inherently insecure protocols / language processor / Unix / Unix operating system / same processor / machine learning / operating systems / intrusion detection technology / ethernet / DNS / Unix system / Assurance technologies / gigabit / /

URL

http /

SocialTag