Page 170 - ICDEBI2018
P. 170
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456nternational Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101
I
14. Morris, Robert; Thompson, Ken, June 1978,Morris, Robert; Thompson, Ken, June 1978, 18. Standards for Technology in Automotive Retail for Technology in Automotive Retail
“Password Security: A Case History” Password Security: A Case History” NJ, USA: ,July 2010, “Types Of Malicious SoftwareTypes Of Malicious Software”,
http://www.starstandard.org/ ttp://www.starstandard.org/
Bell Laboratories, , p. 5 h
15. Michael Kaiser ,April 17, 2009 ,"Small and Michael Kaiser ,April 17, 2009 ,"Small and 19. Scarfone, Karen; Mell, Peter Scarfone, Karen; Mell, Peter . ,February
Detection etection
Medium Size Businesses are Vulnerable", Medium Size Businesses are Vulnerable", 2007,"Guide 007,"Guide t to o I Intrusion ntrusion D and nd
a
2
P
National Cyber Security , vol 2, , p.46, vol 2, , p.46 Prevention Systems (IDPS)revention Systems (IDPS)". National Institute of
Standards and Technology chnology vol2, , pno. 44
16. Pfleenger, Pfleenger, C, C, October1997, October1997, “Security “Security in in
Computing” NJ: Prentice Hall, vol3, pno.23 , vol3, pno.23 20. Teng, Henry S., Chen, Kaihu, and Lu, Stephen CTeng, Henry S., Chen, Kaihu, and Lu, Stephen C-
Y, May 1990, "Adaptive RealAdaptive Real-time Anomaly
17. Robert C. Newman., 19 February 2009, February 2009,
Detection Using Inductively Generated Sequential etection Using Inductively Generated Sequential
D
“Computer “Computer Security: Security: Protecting Protecting Digital Digital
Patterns," IEEE Symposium on Security and IEEE Symposium on Security and
Resources” Jones & Bartlett Learning” Jones & Bartlett Learning, ,pno 35.
Privacy, pno 102
@ IJTSRD | Available Online @ www.ijtsrd.comwww.ijtsrd.com | Conference Issue: ICDEBI-2018 | | Oct 2018 Page: 162