|
1. Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. 2. Ahn, L. v., Blum, M., & Langford, J. (2004). Telling humans and computers apart automatically. Communications of the ACM, 47(2), 56-60. 3. Aljifri, H., Smets, M., & Pons, A. (2003). IP traceback using header compression. Computers & Security, 22(2), 136-151. 4. Baba, T., & Matsuda, S. (2002). Tracing network attacks to their sources. Internet Computing, IEEE, 6(2), 20-26. 5. Bellare, M., Kohno, T., & Namprempre, C. (2006). The secure shell (SSH) transport layer encryption modes. IETF, RFC 4344. 6. Bellovin, S., Leech, M., & Taylor, T. (2003). ICMP traceback messages. IETF, Internet draft, work in progress, http://tools.ietf.org/html/draft-ietf-itrace-04. 7. Boser, B. E., Guyon, I. M., & Vapnik, V. N. (1992). A training algorithm for optimal margin classifiers. Paper presented at the Proceedings of the fifth annual workshop on Computational learning theory. 8. Cisco (2008a). Cisco IOS NetFlow, http://www.cisco.com/en/US/products/ps6601/products_ios_protocol_group_home.html 9. Cisco (2008b). Cisco IOS NetFlow data sheet, http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/product_data_sheet0900aecd80173f71.html 10. Cisco (2008c). Introduction to Cisco IOS NetFlow - A technical overview, http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/prod_white_paper0900aecd80406232.html 11. Dean, D., Franklin, M., & Stubblefield, A. (2002). An algebraic approach to IP traceback. ACM Transactions on Information and System Security (TISSEC), 5(2), 119-137. 12. Furnell, S. (2007). An assessment of website password practices. Computers & Security, 26(7-8), 445-451. 13. Halevi, S., & Krawczyk, H. (1999). Public-key cryptography and password protocols. ACM Transactions on Information and System Security (TISSEC), 2(3), 230-268. 14. Ianelli, N., & Hackworth, A. (2005). Botnets as a vehicle for a online crime, http://www.cert.org.tw/archive/pdf/Botnets.pdf 15. Ives, B., Walsh, K. R., & Schneider, H. (2004). The domino effect of password reuse. Communication of the ACM, 47(4), 75-78. 16. Kim, H. S., Lee, S. W., & Yoo, K. Y. (2003). ID-based password authentication scheme using smart cards and fingerprints. SIGOPS Operating Systems Review, 37(4), 32-41. 17. Oorschot, P. C. V., & Stubblebine, S. (2006). On countering online dictionary attacks with login histories and humans-in-the-loop. ACM Transations on Information and System Security, 9(3), 235-258. 18. Peslyak, A. (2008). John the ripper password cracker, http://www.openwall.com/john/ 19. Pinkas, B., & Sander, T. (2002). Securing passwords against dictionary attacks. Paper presented at the Proceedings of the 9th ACM conference on Computer and communications security. 20. Quinlan, J. R. (1993). C4.5: programs for machine learning. San Mateo: Morgan Kaufmann Publishers Inc. 21. Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3), 614-634. 22. Savage, S., Wetherall, D., Karlin, A., & Anderson, T. (2001). Network support for IP traceback. IEEE/ACM Transactions on Networking, 9(3), 226-237. 23. Schwartz, P. (2008). Denyhosts project, http://denyhosts.sourceforge.net 24. Wolverton, T. (2002). Hackers find new way to bilk eBay users, http://www.news.com/2100-1017-868278.html 25. Zhang, Y., & Paxson, V. (2000a, August 14-17). Detecting Backdoors. Paper presented at the Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA. 26. Zhang, Y., & Paxson, V. (2000b, August 14-17). Detecting stepping stones. Paper presented at the Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA.
|