Show simple item record

dc.contributor.author Heberlein, LT
dc.contributor.author Mukherjee, B
dc.contributor.author Levitt, K
dc.contributor.author Dias, G
dc.contributor.author Mansur, D
dc.date.accessioned 1991T10:06:32Z
dc.date.available 1991T10:06:32Z
dc.identifier.uri http://dl.lib.mrt.ac.lk/handle/123/12255
dc.description.abstract To date, current authentication and access control mechanisms have been shown to be insufficient for preventing intrusive activity in computer systems. Frequent media reports, and now our own research, have shown the widespread proliferation of intrusive behavior on the world's computer systems. With the recognition of the failure of current mechanisms to prevent intrusive activity, a number of institutions have begun to research methods to detect the intmsive activity. en_US
dc.relation.uri http://netsq.com/Documents/NSM_TR_91.pdf en_US
dc.source.uri http://netsq.com/Documents/NSM_TR_91.pdf en_US
dc.title Towards detecting intrusions in a networked environment en_US
dc.type Article-Abstract en_US
dc.identifier.year 1991 en_US
dc.identifier.email gihan@uom.lk en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record