dc.contributor.author |
Heberlein, LT |
|
dc.contributor.author |
Mukherjee, B |
|
dc.contributor.author |
Levitt, K |
|
dc.contributor.author |
Dias, G |
|
dc.contributor.author |
Mansur, D |
|
dc.date.accessioned |
1991T10:06:32Z |
|
dc.date.available |
1991T10:06:32Z |
|
dc.identifier.uri |
http://dl.lib.mrt.ac.lk/handle/123/12255 |
|
dc.description.abstract |
To date, current authentication and access control mechanisms have been shown to be insufficient for preventing intrusive activity in computer systems. Frequent media reports, and now our own research, have shown the widespread proliferation of intrusive behavior on the world's computer systems. With the recognition of the failure of current mechanisms to prevent intrusive activity, a number of institutions have begun to research methods to detect the intmsive activity. |
en_US |
dc.relation.uri |
http://netsq.com/Documents/NSM_TR_91.pdf |
en_US |
dc.source.uri |
http://netsq.com/Documents/NSM_TR_91.pdf |
en_US |
dc.title |
Towards detecting intrusions in a networked environment |
en_US |
dc.type |
Article-Abstract |
en_US |
dc.identifier.year |
1991 |
en_US |
dc.identifier.email |
[email protected] |
en_US |