UNIX system security
Communications of the ACM
Communications of the ACM
Communications of the ACM
Cryptography and data security
Cryptography and data security
The experimental literature of the internet: an annotated bibliography
ACM SIGCOMM Computer Communication Review
UNIX security in a supercomputing environment
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
Literacy for computer science majors
Proceedings of the symposium on Computers and the quality of life
IEEE Annals of the History of Computing
Top management's view of computer related fraud
ACM SIGSAC Review
Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Password security: an empirical study
Journal of Management Information Systems
Inconsistency in deception for defense
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
International Journal of Electronic Security and Digital Forensics
Pushing boulders uphill: the difficulty of network intrusion recovery
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Proceedings of the 26th Annual Computer Security Applications Conference
Honeypot in network security: a survey
Proceedings of the 2011 International Conference on Communication, Computing & Security
Detecting traffic snooping in tor using decoys
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Using active intrusion detection to recover network trust
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
Internet-services, facilities, protocols and architecture
Computer Communications
Digital forensics research: The next 10 years
Digital Investigation: The International Journal of Digital Forensics & Incident Response
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Forgive and forget: return to obscurity
Proceedings of the 2013 workshop on New security paradigms workshop
A system for generating and injecting indistinguishable network decoys
Journal of Computer Security
Hi-index | 48.22 |
An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?