Entry Endler:1998:DIR from sysadmin.bib
Last update: Wed Jul 13 02:04:01 2016
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Endler:1998:DIR,
author = "David Endler",
title = "Detecting Illegal Root Transition in {Solaris}",
journal = j-SYS-ADMIN,
volume = "7",
number = "8",
pages = "29--32, 34--35",
month = aug,
year = "1998",
CODEN = "SYADE7",
ISSN = "1061-2688",
bibdate = "Tue Jun 16 20:53:06 1998",
URL = "http://www.samag.com/",
abstract = "Endler discusses intrusion detection systems and
presents a system for detecting illegal root
transitions achieved through buffer overrun attacks.",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sysadmin.bib",
acknowledgement = ack-nhfb,
}
Related entries
- 7-7-18, 7-7-24,
7(7)41,
7(7)69,
7(8)19
- attack, 5-11-8,
7(7)69,
7(9)63,
8(4)37,
9(3)61,
10(2)39,
10(5)z
- detection,
2(4)5,
6(12)37,
7(11)61,
9(2)49,
9(12)61,
10(1)z,
10(8)z-1,
10(8)z-3
- Endler, David,
5(11)21
- intrusion,
6(12)37,
9(2)49,
9(12)61,
10(1)z,
10(8)z-1,
10(8)z-3
- present,
6(8)57,
7(8)19,
8(1)49,
9(4)27,
9(4)55,
9(7)z-4,
9(11)49,
10(1)51,
10(2)31,
10(2)39,
10(3)53,
10(6)z-1
- Solaris,
6(4)47,
6(11)27,
7(5)57
- through, 6-8-8, 6-10-63,
7(5)33,
7(6)19,
7(9)z-z,
9(9)55,
10(1)67,
10(8)33