Thursday 25 October 2012

[1] Sandra Ring and Eric Cole, Detecting and Dealing with New Rootkits. Sys Admin Magazine. September 2003.
[2] T0rn. User space rootkit. j0hnny7/zho-d0h.
http://www.packetstormsecurity.org/UNIX/penetration
/rootkits/tk.tgz
[3] Linux Rootkit 5. User space rootkit. Lord Somer. http://www.packetstormsecurity.org/UNIX
/penetration/rootkits/lrk5.src.tar.gz
[4] SuckIT. Kernel rootkit. Sd. http://sd.q-art.nl/sk
[5] Adore. Kernel rootkit. Stealth
http://www.team-teso.net/releases/adore-0.42.tgz
[6] ddb-ste. A callback TCP shell backdoor channel initialized by an ICMP trigger packet. Recidjvo.
http://www.packetstormsecurity.org/UNIX/penetration
/rootkits/ddb-ste.tar.gz
[7] Anil Somayaji, Steven Hofmeyr, and Stephanie Forrest, Principles of a Computer Immune System, ACM New Security Paradigms Workshop, Charlottesville, VA, 1998, 75-82.
[8] Fernando Esponda, Stephanie Forrest, and Paul Helman, A Formal Framework for Positive and Negative
Detection Schemes. IEEE Transactions on System, Man, and Cybernetics, 34(1), 2004, 357-373.
[9] Chkrootkit. Software to check for signs of a rootkit. http://www.chkrootkit.org
[10] Tripwire. Change identification software. http://www.tripwire.com
[11] Anil Somayaji and Stephanie Forrest, Automated Response Using System-Call Delays, In Proceedings of the 9th USENIX Security Symposium, Denver, CO, 2000, 185-198.
[12] M. Beck, H. Böhme, M. Dziadzka, U. Kunitz, R. Magnus, C. Schröter, and D. Verworner, Linux kernel programming, third edition (Addison-Wesley, 2002).
[1] Polemi, D. Biometric techniques: review and evaluation of biometric techniques for identification and authentication, including an appraisal of the areas where they are most applicable. Report prepared for the European Commission DG XIII-C.4 on the Information Society Technologies (IST) (Key action 2: New Methods of Work and Electronic Commerce). 2000. http://www.cordis.lu/infosec/src/stud5fr.htm.
[2] R. Gaines, W. Lisowski, S. Press, and N. Shapiro, Authentication by Keystroke Timing: Some Preliminary Results, Rand Report R-256-NSF, Rand Corporation, Santa Monica, CA, 1980.
[3] Leggett, J. and Williams G. Verifying identity via keyboard characteristics. Int. J. Man-Machine Studies 23, 1 (Jan. 1988), 67-76.
[4] Leggett, J., Williams, G., and Umphress, D. Verification of user identity via keyboard characteristics. Human Factors in Management Information Systems, J.M. Carey, Ed., Ablex Publishing, Norwood, NJ.
[5] Umphress, D., and Williams, G. Identify Verification Through Keyboard Characteristics. Int. J. Man-Machine Studies 23, 3 (Sept 1985), 263-273.
[6] Garcia, J. Personal identification apparatus. Patent Number 4,621,334. U.S. Patent and Trademark Office, Washington, D.C. 1986.
[7] James R. Young and Robert W. Hammon. Method and apparatus for verifying an individual’s identity. Patent Number 4,805,222. U.S. Patent and Trademark Office, Washington, D.C. 1989.
[8] Rick Joyce and Gopal Gupta. Identify Authorization Based on Keystroke Latencies. Communications of the ACM, 33(2):168-176, February 1990.
[9] David Primeaux, Doraiswamy Sundar, , and Willard L. Robinson, Jr. Usage pattern based user authenticator. Patent Number 6,334,121. U.S. Patent and Trademark Office, Washington, D.C. 2001.
[10] Saleh Bleha, Bassam Hussien, and Robert McLaren. An Application of fuzzy algorithms in a computer access security system. Pattern Recognition Letters, 9:39-43, 1989.
[11] Marcus Brown and Samuel Joe Rogers. User Identification via Keystroke Characteristics of Typed Names using Neural Networks. International Journal of Man-Machine Studies, 39(6):999-1014, 1993.
[12] Thomas J. Alexandre. Biometrics on Spartcards: An approach to keyboard behavioral signature. Second Smart Card Research & Advanced Applications Conference, 1996.
[13] J. Stader. Applying Neural Networks. AIAI-IR-11, 1992.
http://www.aiai.

No comments:

Post a Comment