Klaus-Peter Kossakowski: Computer-Würmer

 

Zur Person


Größere Projekte


IT Incident Response


Publikationen


PGP-Schlüssel


Impressum



Literaturverzeichnis [Kahn, Cerf 1988] bis [Mullender 1989]

  1. [Kahn, Cerf 1988] The World of Knowbots : An Open Architecture for a Digital Library System and a Plan for its Development / Kahn, R. E.; Cerf, V. G. - Reston, Virginia: Corporation for National Research Initiatives, 1988.
  2. [Karger 1987] Limiting the Damage Potential of Discretionary Trojan Horses / Karger, P. A. - In: 1987 Symposium on Security and Privacy. - New York, NY: IEEE Computer Society, 1987. - S. 32-37.
  3. [Kerningham, Pike 1987] Der UNIX-Werkzeugkasten : Programmieren mit UNIX / Kerningham, B.; Pike, R. - München: Hanser, 1987.
  4. [Kersten 1991] ZSI : Ergebnisse und zukünftige Projekte / Kersten, H. - In: Sicherheitsaspekte in der Informationstechnik / Hrsg. v. Cerny, D.; Kersten, H. - Braunschweig: Vieweg, 1991. - S. 64-80.
  5. [Kersten 1992] Neue Aufgabenstellungen des Bundesamtes für Sicherheit in der Informationstechnik / Kersten, H. - In: Datenschutz und Datensicherung. - Vol. 16, Nr. 6, Juni 1992, S. 293-297.
  6. [Kindberg et al. 1987] Worm Programs / Kindberg, T.; Sahiner, A. V.; Paker, Y. - In: Distributed Operating Systems - Theory and Practice. - Berlin: Springer, 1987. - S. 355-379.
  7. [King 1992] Identifying and Controlling Undesirable Program Behaviors / King, M. M. - In: 5. International Computer Virus & Security Conference / Hrsg. v. Lefkon, R. G. - New York, NY, 1992. - S. 213-224.
  8. [Klein] Foiling the Cracker: A Survey of, and Improvements to, Password Security / Klein, D. V. - Carnegie Mellon University, Software Engineering Institute. - Pittsburgh, PA.
  9. [Kohl et al. 1990] The Kerberos Network Authentication Service / Kohl, J. T.; Neumann, B. C.; Steiner, J. G. - Massachusetts Institute of Technology. - Cambridge, Mass. - RFC Draft 3 vom 8. Oktober 1990.
  10. [Kurzban 1989] Defending against Viruses and Worms / Kurzban, S. A. - In: ACM SIGUCCS Newsletter. - Vol. 19, Nr. 3, Herbst 1989, S. 11-23.
  11. [Lenstra, Manasse 1990] Factoring by electronic mail / Lenstra, A. K.; Manasse, M. S. - In: Advances in Cryptology, EUROCRYPT'89 / Hrsg. v. Quisquater, J. - J.; Vandewalle, J. - Berlin: Springer, 1990. - S. 355-371.
  12. [Linde 1975] Operating System Penetration / Linde, R. R. - In: 44. National Computer Conference. - Montvale, NJ: AFIPS-Press, 1975. - S. 361-368.
  13. [Linn 1990] Practical Authentication for Distributed Computing / Linn, J. - In: 1990 Symposium on Research in Security and Privacy. - Los Alamitos, Calif.: IEEE Computer Society, 1990. - S. 31-40.
  14. [Luan, Gligor 1990] On Replay Detection in Distributed Systems / Luan, S. - W.; Gligor, V. D. - In: 10. International Conference on Distributed Computing Systems. - Los Alamitos, Calif.: IEEE Computer Society, 1990. - S. 188-195.
  15. [Lunt 1988] Automated Audit Trail Analysis and Intrusion Detection : A survey / Lunt, T. F. - In: 11. National Computer Security Conference. - o. O., 1988. - S. 65-73.
  16. [Lunt 1992] Tools for intrusion detection - State-of-the-art and trends / Lunt, T. F. - In: SECUNET '92 / Hrsg. v. Lippold, H.; Schmitz, P. - Braunschweig: Vieweg, 1992. - S. 351-369.
  17. [Lux et al. 1989] On the Implementation of Abstract Data Types in BirliX / Lux, W.; Härtig, H.; Kühnhauser, W. E. Gesellschaft für Mathematik und Datenverarbeitung. - 12. Mai 1989.
  18. [Madsen 1988] The World Meganetwork and Terrorism / Madsen, C. W. - In: Computers & Security. - Vol. 7, Nr. 4, August 1988, S. 347-352.
  19. [Madsen 1992] Government-Sponsored Computer Warfare and Sabotage / Madsen, W. - In: Computers & Security. - Vol. 11, Nr. 3, Mai 1992, S. 233-236.
  20. [Manber 1990] Chain Reactions in Networks / Manber, U. - In: Computer. - Vol. 23, Nr. 10, Oktober 1990, S. 57-63.
  21. [Markoff 1988] 'Virus' in Military Computers Disrupts Systems Nationwide / Markoff, J. - In: The New York Times. - Vol. 138, 4. November 1988, S. I,1:1.
  22. [Markoff 1988a] Author of Computer 'Virus' Is Son of N.S.A. Expert on Data Security : Cornell Graduate Student Described as 'Brilliant' / Markoff, J. - In: The New York Times. - Vol. 138, 5. November 1988, S. I,1:1.
  23. [Markoff 1988b] How a Need for Challenge Seduced Computer Expert / Markoff, J. - In: The New York Times. - Vol. 138, 6. November 1988, S. I,1:1.
  24. [Markoff 1988c] Computer Invasion : 'Back Door' Ajar / Markoff, J. - In: The New York Times. - Vol. 138, 7. November 1988, S. II,10:4.
  25. [Markoff 1988d] Living With the Computer Whiz Kids : Hackers appear to be both a national treasure and a headache / Markoff, J. - In: The New York Times. - Vol. 138, 8. November 1988, S. I,16:1.
  26. [Markoff 1988e] Computer Experts Say Virus Carried No Hidden Dangers / Markoff, J. - In: The New York Times. - Vol. 138, 9. November 1988, S. I,18:1.
  27. [Markoff 1988f] The Computer Jam : How It Came About / Markoff, J. - In: The New York Times. - Vol. 138, 9. November 1988, S. IV,10:1.
  28. [Markoff 1988g] U.S. Is Moving to Restrict Access To Facts About Computer Virus / Markoff, J. - In: The New York Times. - Vol. 138, 11. November 1988, S. I,28:5.
  29. [Markoff 1989] Student Blamed for Rogue Computer Program : Morris was a 'completely absorbed' hacker / Markoff, J. - In: The New York Times. - Vol. 138, 4. April 1989, S. I,16:3.
  30. [Markoff 1989a] Cornell Suspends Computer Student : School Says He Was Author of Program That Jammed a Nationwide Network / Markoff, J. - In: The New York Times. - Vol. 138, 25. Mai 1989, S. I,16:6.
  31. [Markoff 1989b] Student, After Delay, Is Charged In Crippling of Computer Network / Markoff, J. - In: The New York Times. - Vol. 138, 27. Juli 1989, S. I,17:2.
  32. [Markoff 1990] Ex-Student Faces Trial Over Computer Chaos / Markoff, J. - In: The New York Times. - Vol. 139, 7. Januar 1990, S. I,18:5.
  33. [Markoff 1990a] Student Testifies His Error Jammed Computer Network / Markoff, J. - In: The New York Times. - Vol. 139, 19. Januar 1990, S. I,19:1.
  34. [Markoff 1990b] From Hacker to Symbol / Markoff, J. - In: The New York Times. - Vol. 139, 24. Januar 1990, S. I,19:1.
  35. [Markoff 1990c] Computer Intruder Is Found Guilty / Markoff, J. - In: The New York Times. - Vol. 139, 23. Januar 1990, S. I,21:1.
  36. [Markoff 1990d] Caller Says He Broke Computers' Barriers To Taunt the Experts / Markoff, J. - In: The New York Times. - Vol. 139, 21. März 1990, S. I,1:1.
[Zurück zum Anfang]
  • [Markoff 1990e] Computer Intruder Is Put on Probation and Fined $10.000 / Markoff, J. - In: The New York Times. - Vol. 139, 5. Mai 1990, S. I,1:5.
  • [Markoff 1990f] Creating a Giant Computer Highway : Robert Kahn's vision of a national network of information begins to take hold / Markoff, J. - In: The New York Times. - Vol. 139, 2. September 1990, S. III, 1:1.
  • [Martin, Martin 1990] Professional Codes of Conduct and Computer Ethics Education / Martin, C. D.; Martin, D. H. - In: Rogue Programs : Viruses, Worms, and Trojan Horses / Hrsg. v. Hoffman, L. J. - New York, NY: Van Nostrand Reinhold, 1990. - S. 128-140.
  • [Moravec 1990] Mind Children: der Wettlauf zwischen menschlicher und künstlicher Intelligenz / Moravec, H. - Hamburg: Hoffmann und Campe, 1990.
  • [Morris, Thompson 1979] Password Security : A Case History / Morris, R.; Thompson, K. - In: Communications of the ACM. - Vol. 22, Nr. 11, November 1979, S. 594-597.
  • [Muffett 1991] Crack Version 3.3c : A Sensible Password Checker for UNIX / Muffett, A. D. - University College of Wales; Computer Unit. - Aberystwyth, Wales.
  • [Mullender 1989] Distributed Systems / Hrsg. v. Mullender, S. - Wokingham, England: Addison-Wesley, 1991. - [Erstausgabe 1989].

    [Zurück] [Inhaltsverzeichnis] [Weiter]


© 1998-2001 by Klaus-Peter Kossakowski, Germany.