Page 170 - ICDEBI2018
P. 170

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456nternational Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101
         I
        14. Morris,  Robert;  Thompson,  Ken,  June  1978,Morris,  Robert;  Thompson,  Ken,  June  1978,  18. Standards  for  Technology  in  Automotive  Retail for  Technology  in  Automotive  Retail
            “Password  Security:  A  Case  History” Password  Security:  A  Case  History”  NJ,  USA:   ,July  2010,  “Types  Of  Malicious  SoftwareTypes  Of  Malicious  Software”,
                                                                   http://www.starstandard.org/ ttp://www.starstandard.org/
            Bell Laboratories, , p. 5                              h
        15. Michael  Kaiser  ,April  17,  2009  ,"Small  and Michael  Kaiser  ,April  17,  2009  ,"Small  and  19. Scarfone,  Karen;  Mell,  Peter Scarfone,  Karen;  Mell,  Peter  .  ,February
                                                                                                    Detection etection
            Medium  Size  Businesses  are  Vulnerable", Medium  Size  Businesses  are  Vulnerable",   2007,"Guide 007,"Guide   t to o   I Intrusion ntrusion   D  and nd
                                                                                                                 a
                                                                   2
                                                                   P
            National Cyber Security , vol 2, , p.46, vol 2, , p.46   Prevention Systems (IDPS)revention Systems (IDPS)". National Institute of
                                                                   Standards and Technology chnology vol2, , pno. 44
        16. Pfleenger, Pfleenger,   C, C,   October1997, October1997,   “Security “Security   in in
            Computing” NJ: Prentice Hall, vol3, pno.23 , vol3, pno.23    20. Teng, Henry S., Chen, Kaihu, and Lu, Stephen CTeng, Henry S., Chen, Kaihu, and Lu, Stephen C-
                                                                   Y,  May  1990,  "Adaptive  RealAdaptive  Real-time  Anomaly
        17. Robert  C.  Newman.,  19  February  2009, February  2009,
                                                                   Detection Using Inductively Generated Sequential etection Using Inductively Generated Sequential
                                                                   D
            “Computer “Computer   Security: Security:   Protecting Protecting   Digital Digital
                                                                   Patterns,"  IEEE  Symposium  on  Security  and IEEE  Symposium  on  Security  and
            Resources” Jones & Bartlett Learning” Jones & Bartlett Learning, ,pno 35.
                                                                   Privacy, pno 102


































































        @ IJTSRD  |  Available Online @ www.ijtsrd.comwww.ijtsrd.com |  Conference Issue: ICDEBI-2018 | | Oct 2018   Page: 162
   165   166   167   168   169   170   171   172   173   174   175