參考文獻 |
[1] Davis, R. “Aerospace Computer Security Applications Conference”, Fourth , 1988 , Page(s): 7/11.
[2]Lawrence M. Bridwell, Content Security Program Manager, ICSA Labs, Peter Tippett, MD, phD, Chief Technology Officer, ISCA.net. “ICSA Labs 6th Annual Computer Virus Prevalence Survey 2000”. http://www.icsa.net/html/communities/antivirus/vps2000/vps20001.pdf.
[3]趨勢科技網站
http://www.trend.com.tw/endusers/products/pcc2000.htm
[4]賽門鐵克網站http://www.Symantec.com/region/tw/enterprise/article/virus_protect.html
[5] Garber, L. “Melissa Virus Creates a New Type of Threat”; Computer Volume: 32 6 , June 1999 , Page(s): 16 -19
[6]Matt, Curtin. Gary, Ellison. Doug, Monroe(Interhack Corporation), “Why Anti-Virus Software Cannot Stop the Spread of Email Worms “ http://www.interhack.net/pubs/email-trojan, May 11, 2000.
[7] 賽門鐵克SARC 防毒研究中心
http://www.symantec.com/avcenter/index.html
[8] 趨勢科技病毒字典http://www.trend.com.tw/EncyclopediaV2/vinfo/virusencyclo/default.asp
[9] Cohen, F. Security Technology. “Current best practice against computer viruses”, 25th Annual 1991 IEEE International Carnahan Conference on, 1991, Page(s): 261-270.
[10]蔡秉欣. “利用字碼組合病毒特徵的病毒偵測法”, 逢甲大學資訊工程研究所碩士論文, Dec, 2000.
[11] Luke, J.; Harris, C.J. “The application of CMAC based intelligent agents in the detection of previously unseen computer viruses”,Information Intelligence and Systems, 1999. Proceedings. 1999 International Conference on, 1999 ,Page(s): 662 —666.
[12] ”Understanding Heuristics: Symatec’s Bloodhound Technology”, Symatec White Paper Series, Vo1.XXXIV.
[13]Jieh-Sheng Lee, Jieh Hsiang, Po-Hao Tsang. “A Generic Virus Detection Agent on the Internet”, System Sciences, Proceedings of the Thirtieth Hwaii International Conference on Volume: 4 , 1997 , Page(s): 210 -219 vol.4
[14]Julla Alien, Alan Christie, William Fithen, John Mcrlugh, Jed Pickel, Ed Stoner. “State of the Practice of Intrusion Detection Technologies”,http:// www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028abstract.html, Jan, 2000.
[15]Intrusion Detection FAQ
www.sans.org/newlook/resources/IDFAQ/aint.htm
[16]Stefan Axelsson. “Intrusion Detection Systems: A Survey and Taxonomy”, http://citeseer.nj.nec.com/axelsson00intrusion.html, (2000).
[17]Philip A Porras and Peter G Neimann. “EMERALD: Event monitoring enabling responses to anomalous live disturbances”, In Proceedings of the 20th National Information Sysytems Security Conference, Oct, 1997, pages 353-365.
[18]A. Larson. “Global security survey: virus attack”, http://www.informationweek.com/743/security.htm
[19]Stuart Staniford, James A. Hoagland, Joseph M. McAlerney. “Practical Automated Detection of Stealthy Portscans”, Silicon Defense, http://www.silicondefense.com/research/index.htm.
[20] Vigna, Giovanni & Kemmerer, Richard A. "NetSTAT: A Network-Based Intrusion Detection Approach" Computer Security Applications Conference, 1998. Proceedings. 14th Annual , 1998 , Page(s): 25 -34.
[21] Kemmerer, Richard A., et al. (University of California, Santa Barbara). “STAT Projects”, http://www.cs.ucsb.edu/~kemm/netstat.html/project.html, 1999.
[22] Steven Cheung, Rick Crawford, Mark Dilger, Jeremy Frank, Jim Hoagland, Karl Levitt, Jeff Rowe Stuart Staniford-Chen, Raymond Yip, Dan Zerkle Department of Computer Science, “The Design of GrIDS: a graph based intrusion detection system”, Department of Computer Science, University of California at Davis. Jan, 1999.
[23] Maxion, R.A.; Tan, K.M.C. “Benchmarking Anomaly-Based Detection System”, Dependable Systems and Networks, 2000. DSN 2000. Proceedings International Conference on , 2000 , Page(s): 623 -630.
[24]” Intrusion Detection and Response”, Lawrence Livermore National Laboratory Sandia National Laboratories, http://all.net/journal/ntb/ids.html. Dec, 1996.
[25]歐士源. “環境相依之入侵偵測系統評估方法設計”, 中原大學資訊工程研究所碩士論文, Jun, 2000.
[26]Lee Gaber. “Melissa Virus Create a New Type of Thread”, IEEE Technology News: Computer, Vol. 32, No. 6, June 1999, Page(s):16-19.
[27] Hruska, J. “Virus Detection”, Security and Detection, 1997. ECOS 97., European Conference on , 1997 , Page(s): 128 -130.
[28] Davis, R. “Exploring Computer Virus”, Aerospace Computer Security Applications Conference, 1988., Fourth , 1988 , Page(s): 7-11.
[29]Ian Whalley, Bill Arnold, David Chess, John Morar, Alla Segal, Morton Swimmer. “An Environment for Controlled Worm Replication and Analysis”, IBM TJ Watson Research Center. http://www.research.ibm.com/antivirus/SciPapers/VB2000INW.htm
[30] Yin Zhang. “Detecting Stepping Stone”, Department of Computer Science
Cornell University. http://www.aciri.org/vern/papers/stepping/.
[31]William Sanders, Clarion. “Chi-Square Test”, Applied STATISTICS forth edition, 1992, Page(s):482-487.
[32]Outlook 98/2000 SR-1 E-mail Security Update. (2001/4/5) http://office.Microsoft.com/2000/downloadDetails/Out2ksec.htm.
[33]趨勢科技掃瞄引擎換裝雷霆緝毒手-ScriptTrap(2001/6/18)
http://www.trend.com.tw/corporate/about/pressscenter/2001news/20010615.htm
[34]孫藹彬. “台灣資訊軟體產業發展之生態演進分析”, 國立中央大學資訊管理研究所博士論文, 1998, Page(s):20-21 |