ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · a complete bibliography of...

521
A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 27 July 2020 Version 1.02 Title word cross-reference $1.6 [1468]. $107 [1192]. 128 [790]. $19m [2417]. $1bn [3899]. 2 [1981]. $24.95 [149]. $24.99 [881]. $3 [274]. $30m [2325]. $33 [1609]. $39.95 [4065]. 40 [674]. 56 [1029]. $66 [374]. $69.95 [3334]. $8 [1232]. -bit [674, 790, 1029]. -oR [323]. -peer [1981]. .HTR [1229]. .info [2025]. .NET [2247, 4319]. /bin/mail [152]. 0 [149, 3305, 3344, 3345, 3794, 3814, 3901, 3956]. 0-471-05318-X [149]. 0-471-16378-3 [1178]. 1 [146, 184, 268, 315, 476, 604, 648, 650, 838, 1010, 1024, 1132, 1141, 1212, 1225, 1328, 1381, 1725, 1892, 1931, 2538, 3197, 3232, 3277, 3304, 3435, 3668, 3742, 3813, 3844, 3933]. 1-57870-185-6 [1482]. 1-78022-784-1 [3977]. 1-84969-412-5 [3435]. 1.9bn [3879]. 10 [527, 836]. 100 [103]. 1000 [991]. 10Gbps [2974]. 11 [549, 860]. 12a [566]. 13 [602, 879]. 14 [902]. 15 [921]. 17799 [2542]. 19 [4348, 4361]. 1997 [799, 819]. 1998 [1178]. 2 [168, 208, 294, 346, 386, 520, 628, 669, 670, 859, 1025, 1042, 1149, 1241, 1242, 1346, 1765, 1942, 2554, 3210, 3295, 3326, 3327, 3679, 3700, 3784, 3845, 3955, 4029]. 2.0 [2660, 2870]. 2.2 1

Upload: others

Post on 05-Oct-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

A Complete Bibliography of Publications in Network

Security

Nelson H. F. BeebeUniversity of Utah

Department of Mathematics, 110 LCB155 S 1400 E RM 233

Salt Lake City, UT 84112-0090USA

Tel: +1 801 581 5254FAX: +1 801 581 4148

E-mail: [email protected], [email protected],[email protected] (Internet)

WWW URL: http://www.math.utah.edu/~beebe/

27 July 2020Version 1.02

Title word cross-reference

$1.6 [1468]. $107 [1192]. 128 [790]. $19m[2417]. $1bn [3899]. 2 [1981]. $24.95 [149].$24.99 [881]. $3 [274]. $30m [2325]. $33[1609]. $39.95 [4065]. 40 [674]. 56 [1029].$66 [374]. $69.95 [3334]. $8 [1232].

-bit [674, 790, 1029]. -oR [323]. -peer [1981].

.HTR [1229]. .info [2025]. .NET[2247, 4319].

/bin/mail [152].

0[149, 3305, 3344,3345, 3794, 3814, 3901, 3956].

0-471-05318-X [149]. 0-471-16378-3[1178].

1 [146, 184, 268, 315, 476, 604, 648, 650, 838,1010,1024, 1132, 1141, 1212, 1225, 1328, 1381,1725,1892, 1931, 2538, 3197, 3232, 3277, 3304,3435,3668, 3742, 3813, 3844, 3933].1-57870-185-6 [1482]. 1-78022-784-1[3977]. 1-84969-412-5 [3435]. 1.9bn [3879].10 [527, 836]. 100 [103]. 1000 [991].10Gbps [2974]. 11 [549, 860]. 12a [566]. 13[602, 879]. 14 [902]. 15 [921]. 17799 [2542].19 [4348, 4361]. 1997 [799, 819]. 1998 [1178].

2 [168, 208, 294, 346, 386, 520, 628, 669, 670,859, 1025, 1042, 1149, 1241, 1242, 1346, 1765,1942,2554, 3210, 3295, 3326, 3327, 3679, 3700,3784,3845, 3955, 4029]. 2.0 [2660, 2870]. 2.2

1

Page 2: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

2

[1287]. 2.x [759]. 2000[1473, 1931, 1942, 2205]. 2001 [1723]. 2003[2095]. 2006 [2605, 2652]. 2018[4087, 4099, 4132]. 2019[4146, 4197, 4210, 4222, 4281, 4293, 4338].2020 [4304, 4378]. 20m [4016]. 26.5m[2575]. 2600 [473, 530]. 29.95 [1617]. 2FA[2984, 3725, 4260]. 2nd [3295].

3 [234, 369, 689, 792, 880, 893, 3243,3413, 3414,3509, 3833, 3911]. 3.0 [1668]. 300PL [1272].31.99 [1763]. 32-bit [1483]. 3Com [1000].

4 [390, 705, 866, 1045, 3252, 3363, 3374, 3383,3384, 3402, 3466, 3476, 3477, 3519, 3555, 3751,3823, 3873, 3891, 3998]. 4.0[1230, 1282, 1725, 1765, 4216, 4273]. 4.01[1079]. 4.1x [349].

5 [727, 3045, 3253, 3266, 3403, 3435, 3699,3710, 3863, 4009]. 5.0 [956]. 5.2.1 [13]. 50[2230]. 5a [407]. 5b [430]. 5G [4122, 4344].

6 [228, 452, 754, 2965, 3221, 3222, 3392, 3454,3720, 3772, 3834, 3891, 3922, 3988].

7 [471, 774, 3185, 3209, 3657, 3658, 3689, 3783,3881, 3892, 4008]. 7xx [1181].

8 [492, 798, 3276, 3373, 3393, 3741, 3966].802.11 [2940]. 8e6 [2877].

9 [506, 817, 1549, 3287, 3678, 3752, 3761, 3771,3824, 3864, 3976]. 9/11 [1803]. 9000 [630].95 [337, 401, 876]. 97 [683]. 978[3197, 3209, 3210, 3221, 3222, 3232, 3243, 3252,3253, 3266, 3276, 3277, 3287, 3295, 3304, 3305,3326, 3327, 3344, 3345, 3363, 3373, 3374, 3383,3384, 3392, 3393, 3402, 3403, 3413, 3414, 3454,3466, 3476, 3477, 3509, 3519, 3555, 3657, 3658,3668, 3678, 3679, 3689, 3699, 3700, 3710, 3720,3741, 3742, 3751, 3752, 3761, 3771, 3772, 3783,3784, 3794, 3813, 3814, 3823, 3824, 3833, 3834,3844, 3845, 3863, 3864, 3873, 3881, 3891, 3892,

3901,3911, 3922, 3933, 3955, 3956, 3966, 3976,3988,3998, 4008, 4009]. 978-0-12-385059-1[3197]. 978-0-12-397181-4 [3751].978-0-12-411630-6 [3988].978-0-12-415933-4 [3402].978-0-12-416600-4 [3476, 3477].978-0-12-418676-7 [3614].978-0-12-418683-5 [3614].978-0-12-419967-5 [3699].978-0-12-420114-9 [3678].978-0-12-800006-9 [3976].978-0-12-800216-2 [3679].978-0-12-800353-4 [3998].978-0-12-801275-8 [3741].978-0-12-801867-5 [3730].978-0-12-802437-9 [3824].978-0-12-802714-1 [3844].978-0-12-802754-7 [3783].978-0-12-802864-3 [3833].978-0-12-802916-9 [3803].978-0-12-803306-7 [3881].978-0-12-803340-1 [3933].978-0-12-803451-4 [3873].978-0-12-803843-7 [4008].978-0-12-804171-0 [3814].978-0-12-804172-7 [3804].978-0-12-804180-2 [3784].978-0-12-804755-2 [3845].978-0-12-805105-4 [3823].978-0-12-805197-9 [3864].978-0-13-407695-9 [3771].978-0-13-417145-6 [3772].978-0-19-877957-5 [4009].978-0-691-14175-6 [3922].978-0-691-17654-3 [3911].978-0-7356-6337-4 [3425].978-0-7356-6339-8 [3425].978-1-107-02443-4 [3444].978-1-107-61377-5 [3444].978-1-118-01474-5 [3266].978-1-118-02647-2 [3295].978-1-118-95850-6 [3720].978-1-4493-0500-0 [3344, 3345].978-1-4493-0538-3 [3352, 3353].

Page 3: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

3

978-1-4493-0539-0 [3352, 3353].978-1-4493-1943-4 [3383].978-1-4493-3389-8 [3393].978-1-4919-4946-7 [3658].978-1-4939-6455-0 [3901].978-1-5107-2332-0 [3956].978-1-58705-916-2 [3210].978-1-58714-109-6 [3221, 3222].978-1-58714-227-7 [3209].978-1-59327-266-1 [3232].978-1-59327-288-3 [3243].978-1-59327-290-6 [3392].978-1-59327-294-4 [3252].978-1-59327-385-9 [3287].978-1-59327-424-5 [3403].978-1-59327-554-9 [3731].978-1-59327-581-5 [3710].978-1-59327-590-7 [3689].978-1-59327-601-0 [3794].978-1-59327-602-7 [3892].978-1-59327-640-9 [3752].978-1-59327-649-2 [3700].978-1-59327-651-5 [3863].978-1-59327-666-9 [3761].978-1-59327-703-1 [3813].978-1-59327-757-4 [3891].978-1-59327-759-8 [3966].978-1-59327-793-2 [3955].978-1-59749-472-4 [3519].978-1-59749-572-1 [3304].978-1-59749-594-3 [3184].978-1-59749-595-0 [3184].978-1-59749-615-5 [3253].978-1-59749-627-8 [3276].978-1-59749-635-3 [3413].978-1-59749-655-1 [3277].978-1-59749-661-2 [3326, 3327].978-1-59749-665-0 [3305].978-1-59749-727-5 [3334].978-1-59749-948-4 [3374].978-1-59749-951-4 [3384, 3466].978-1-59749-957-6 [3454].978-1-59749-961-3 [3414].978-1-59749-993-4 [3555].

978-1-68050-288-6 [4065].978-1-78398-214-1 [3668].978-1-78548-004-1 [3742].978-1-78548-012-6 [3834].978-1-84928-390-8 [3373].978-1-84928-398-4 [3363].978-1-84951-742-3 [3509].978-1-84969-510-7 [3657].

= [2734].

A-V [2412]. Aaron [3771]. abandons[1774]. Abhinav [3509]. Abilities [1593].About.com [1515]. Abraham [3823].Abstracts [1792]. abuse[86, 792, 1177, 2781, 4101]. Abusing[3395, 4126]. Academia [1947]. Academic[3751, 3988]. accelerate [3746].Accelerated [2321]. accelerator [1049].accelerators [875, 931]. Accenture [4185].Accenture/Ponemon [4185]. Access [21,46, 47, 162, 210, 431, 446, 524, 618, 630, 664,700, 747, 812, 873, 890, 895, 913, 1030,1048,1215,1253, 1472, 1488, 1597, 2083, 2253, 2337,2355,2747, 3202, 3267, 3337, 3470, 3967, 3969].accessing [3638]. accidentally [3064].account [2755]. accountable [174].Accounting [3963]. accounts[300, 3447, 4107]. accused [2052]. accuses[3871]. ACD [4245]. ACE [178, 561, 700].ACE/Client [178]. ACE/Server [561, 700].a’changing [2558]. Achieving [4248].Achilles [2397]. acquire [1953]. acquires[662, 1610]. acquisition [118, 965, 1061].Acrobat [1161]. across[424, 2654, 2986, 3713]. Act[473, 530, 604, 628, 706, 828, 1529, 2009, 2280,2382,2652, 4372]. Action[910, 933, 2085, 2554, 3963, 4159]. Active[1366, 1463,2144, 3318, 4179, 4245]. Actively[3829]. ActiveX [699, 896, 903, 1266, 1612].activists [1936]. activity [2673, 3134].actors [4371]. Adam [3771]. adapter [179].Adapters [1339]. Adapting [3982].

Page 4: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

4

adaptive [1160, 2073, 3267]. ADCs [3489].add [2124, 2411]. add-on [2124]. add-ons[2411]. Added [1018, 1410, 1891]. Addison[1763]. Address [506, 846, 1138, 1419].addressed [221]. addresses [225].Addressing[2430, 2784, 2797, 3166, 3753, 3893]. adds[2330]. Adhering [4380]. ADKs [1491].admin [3786]. administration [1251].Administrator [77, 2218, 3185].administrators [1618, 2023, 2328, 3184].admins [3035]. AdminSuite [779].Admission [1728]. admits [1866]. Adobe[1161, 3003]. adopt [538, 1565]. adopts[3611]. ads [26, 2303, 3538]. ADSL [1253].Advanced [912, 1001, 1210, 1293, 1508, 1523,1788, 1956, 2795, 3018, 3070, 3127, 3156, 3236,3567, 3692, 3989, 4329]. advances [548].advantage [31, 1526]. Adventures [1971].adversaries [3989]. Advertising[3000, 3762]. advice [4137]. advocate [233].advocates [595]. Adware [1984, 2155, 2791].AdWords [2810]. AES [1501, 3018]. affair[3744]. affect [3579]. affects [4006].affordable [1106]. Africa [245]. After[1670, 1967, 2141, 2386, 2957, 3460, 3582, 4061,4159]. aftermath [4061]. Again [20, 90, 994,1581, 1821, 2070, 2704, 2800, 3441, 3654].Against [114, 218, 503, 655, 901, 914, 933, 975,988, 1157, 1218, 1321, 1453, 1515, 1625, 1641,1757, 1768, 2233, 2275, 2715, 2982, 2995, 3077,3451, 3570, 3607, 3611, 3616, 3675, 3841, 3989,4013, 4030, 4068, 4239, 4367]. age[268, 294, 1277, 2327, 3929, 3988, 4200].agencies [377, 2268, 3723,3860]. agency[278, 1208, 3841]. agenda [1022]. agent[925, 4162]. agile [3721, 3774, 4056]. agility[4330]. Agreement [247, 459, 575, 724].AgTech [4249]. aha [1279]. Aharoni [3243].Ahead [1599, 1676, 2078, 2380, 3587, 3671].AI [1738, 1800, 4127, 4250, 4329]. aid [468].aim [623, 2316]. aims [3323]. aircraft[4267]. airforce [1039]. airport [1881].airwaves [2654]. Airways [3687]. AIX

[216, 943, 1247, 1446]. AJAX [2660].AJAX/web [2660]. Ajin [3823]. Al [3228].Al-Qaeda [3228]. Alarm [1256, 3811].alarms [1848, 1886]. Alcatel [2868]. alert[119]. Alerts [1698, 2084, 2336]. Alexander[1972]. Alexandre [3221, 3222]. algorithm[396, 674, 762]. Algorithms [1088, 1507].alive [552]. Allan [3881]. alleged [3003].allegedly [3380]. alleviate [1996]. Alliance[250, 360, 485, 599, 752, 781, 783, 809, 830, 968,1139,1318, 1408, 1450, 1635, 2335]. alliances[623]. allies [725]. allow[535, 964, 985, 1215, 1423]. allowed[807, 1489]. Allows [583, 1633]. ally [251].almost [1731]. Along [1530]. Alphabetic[1103]. also [3417, 3676]. Alternate [2588].Alternative[123, 921, 1226, 2602, 2698, 2699, 2795].alternatives [146, 168, 2508,2873, 3116].Always [1596]. amasses [3601]. Amazon[1692, 3585]. ambushed [1260]. AMD[4323]. amendment [1243]. amendments[1262]. America[122, 177, 326, 707, 824, 1038, 1200, 3956].American [601, 795, 2333]. amidst [343].Amit [3752]. among[3119, 3687,3986, 4254, 4270]. Amongst[1723]. Amsterdam [1881]. AMTSO[3288]. analysing [3224]. Analysis[706, 727, 799, 1579, 1910, 1979, 2126, 2142,2168,2205, 2218, 2555, 2598, 2750, 2798, 2832,2973,3055, 3127, 3226, 3232, 3334, 3378, 3392,3576,3636, 3648, 3823, 3944, 4075].analysis-led [3576]. Analyst [642, 2092].analytics [3522, 4174, 4200].analytics-driven [4174]. Anatomy[1133, 2892,2929, 3017, 3692, 3885]. Andre[3210]. Andrea [3373]. Andrew[3392, 3853]. Android [3216, 3241, 3254,3324,3341, 3364, 3375, 3381, 3387, 3464, 3479,3552,3638, 3710, 3727, 3772, 3823].Animated [2667]. Anna [1758]. announce[75]. announced [811]. announces[118, 752, 965, 2377, 4017]. annoyance

Page 5: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

5

[2495, 3154]. Annual [489, 4132, 4281].Anomaly [3834]. Anonymity[3456, 3629, 3807]. Anonymous [3154].ANR [225]. ANSI [126]. answer[546, 1781, 2140,4091, 4296]. answers[366, 625]. Anti [285, 366, 526, 650, 670, 683,721, 742, 803, 969, 1103, 1201, 1434, 1449, 1454,1538, 1616, 1687, 1887, 2056, 2374, 2477, 2490,2870, 2886, 2910, 2933, 3131, 3293, 3390].anti-bug [366]. anti-forensics [2886].anti-hacker [1687]. Anti-hackers [1538].anti-malware [2933]. Anti-phishing[2477, 2910]. anti-piracy [3293].Anti-social [2870]. Anti-spam [803].anti-spyware [2374]. Anti-virus[285, 526, 650, 670, 683, 721, 742, 969, 1103,1201, 1434, 1449, 1454, 1616, 1887, 2056, 2374,2490, 3131, 3390]. antivirus [2277]. Anton[3374, 3403, 3413, 3761]. Antonio [3834]. any[2364, 4115]. anything [1731, 2085]. anyway[4112]. AOL [786, 1365, 1636]. AOL4FREE[771]. AOLGOLD [405]. Apache[1952, 2029, 4029]. Apex [3526]. API[4080, 4112, 4226]. APIs [3478]. app[3329, 4011, 4359]. Appeal [1675, 2361].appearance [3130]. appeased [595].appetite [1527]. Apple[2278, 2516, 2573, 3026, 3085, 3422, 3847].Applet [877]. applets [731, 849, 914, 1487].appliance [1389, 2333, 2413, 3355, 3405].Applicable [3444]. Application[1390, 1595, 1986, 2036, 2202, 2536, 2599, 2670,2729, 2737, 3020, 3269, 3295, 3471, 3489, 3578,3720, 3794, 3957, 4056, 4318].application-based [2202]. Applications[359, 682, 848, 897, 947, 1004, 1018, 1472, 1890,2110, 2251, 2262, 2270, 2452, 2570, 2660, 2663,2821, 2963, 3005, 3039, 3126, 3553, 3639, 3823,4019, 4046]. Applied [3498]. Appointed[2138]. Apprenticeships [4296]. approach[2405, 2642, 2678, 2772, 2773, 3094, 3197, 3267,3363, 3406, 3429, 3457, 3597, 3630, 3673, 3899,4047, 4152, 4161, 4176]. Approaches[1930, 2195, 2706, 2808, 2852, 3007]. approval

[1611]. approvals [909]. Apps[2184, 2502,3045, 3238, 3384, 3466, 3769, 3817].APT [3240]. APTs [3268, 3420, 3592, 3641].Aquilina [3519]. Aracil [3834]. arbitrary[885, 964]. Architecture[1678, 2015,2021, 2770, 2987, 3363, 3375].archive [1464]. area [147]. arena [1008].arm [2167, 2853]. armies [2072, 2524]. arms[310]. army [295, 1274, 1854, 1917, 2640].arrest [89, 185, 1626, 2308]. arrested [154].arrests [1078, 2458, 3302, 3931]. arrival[2327]. arrives [1388, 2136]. art[1378, 2540,4057]. Article [1581]. Artificial[3937, 4070,4239]. Arvind [3853]. Ascend[992]. Ashley [3744]. ask [2133]. asked[826]. asks [794, 1716, 2824]. ASN.1 [2212].ASP [1594]. aspects [599, 2409]. assault[2436]. assesses [642]. Assessing[166, 1146, 2218, 2339, 3234, 3990, 4061].Assessment [254, 425, 798, 868, 1212, 1241,1547,1911, 1917, 1987, 2059, 2132, 2202, 2366,2405,2431, 4120]. asset [2769, 3895]. assets[564, 3866, 4366]. assigner [325]. Associates[970, 1144, 1337]. assuming [3948].assurance [1261, 3321]. assurances [4207].AssureNet [662]. Assuring [3604]. Asus[4196]. AT&T[137, 182, 305, 335, 716, 824, 3085, 4352].AT&T/Mondex [716]. Atlantic [50].ATM [207, 302, 403, 432, 1145, 1234, 3082].atsar [1377]. attached [2248]. Attachment[2713]. Attachment-based [2713]. Attack[407, 430, 437, 452, 508, 614, 654, 905, 1133,1224,1334, 1352, 1380, 1441, 1443, 1654, 1720,1741,2014, 2079, 2184, 2245, 2481, 2510, 2578,2648,2676, 2720, 2829, 2832, 2890, 2892, 2926,2929,2934, 2940, 2982, 3035, 3053, 3063, 3146,3260,3264, 3284, 3432, 3445, 3448, 3461, 3469,3563,3588, 3591, 3654, 3705, 3783, 3820, 3846,3868,3871, 3885, 3899, 3926, 3952, 4074, 4155,4204,4218, 4278, 4371]. attacked[656, 2025, 2077, 3238, 3241, 3400, 3473, 3964].Attacker [885]. Attackers [959, 1267, 2790,2800,3482, 3643, 3994, 4096, 4334, 4358].

Page 6: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

6

Attacking [344, 1131, 3375, 4348]. Attacks[128, 346, 565, 589, 655, 711, 833, 933, 1353,1373, 1399, 1401, 1402, 1444, 1633, 1731, 1753,1834, 1853, 1895, 1922, 1927, 2107, 2142, 2207,2271, 2274, 2383, 2527, 2536, 2582, 2634, 2685,2715, 2716, 2796, 2957, 2968, 2995, 3051, 3117,3155, 3218, 3257, 3342, 3361, 3459, 3516, 3542,3560, 3584, 3611, 3612, 3634, 3671, 3686, 3697,3738, 3799, 3801, 3805, 3865, 3883, 3888, 3931,3935, 3949, 3953, 3989, 3996, 3999, 4000, 4005,4013, 4025, 4032, 4035, 4049, 4052, 4058, 4073,4093, 4138, 4143, 4178, 4214, 4232, 4275, 4309,4331, 4359]. attacks[625, 686, 2729, 2737, 3395, 4175]. Attempt[1453]. attempts [1376, 4214]. attitude[2022, 2589, 3124, 3579]. attracts [1798].attribution [3949]. Attrition [1685, 1710].auctioned [2854]. Audit[1023, 1725, 1765, 2347, 2661, 3167, 3587].audited [2342]. Auditing [649, 1225, 1242,1279, 1369, 1457, 1725, 1765, 3039]. auditors[3427]. audits [2917, 3219]. August [2165].Aurora [3022]. Aussies [1358]. Australia[1303, 3336]. Australian [68, 810, 878, 4371].Authenticated [1660]. Authenticating[818, 2395]. Authentication[202, 385, 392, 463, 525, 536, 577, 722, 732, 768,813, 832, 989, 1312, 1406, 1410, 1431, 1502,1525, 2113, 2498, 2543, 2654, 2699, 2701, 2731,3019, 3188, 3330, 3609, 3714, 3777, 4152].authenticity [1125]. Author[1171, 1178, 1758, 2309]. Authorities[3801, 3841, 4167]. authority [1436].authorization [520]. authorizer [306, 597].authors [2162, 2223]. Auto [367].Automated [452, 920, 3823, 4259].Automatic [974, 1306, 2285]. Automating[2882, 3803, 3959]. automation[2719, 3934, 4174, 4318]. Automotive[3745, 4304]. automountd [1215]. AV[2487]. availability [1128, 2262, 3378, 4067].available [30, 665, 714, 875, 888, 2396]. Avast[4157]. avenues [2184, 2619]. Avoid[1421, 2446, 2590, 3125, 3370, 4175].

Avoiding [3133, 3447, 3786, 3826, 4379].avoids [2980]. awake [1886]. Award[140, 1542]. aware [3182]. Awareness[1209, 2306,2520, 3155, 3458, 3699, 4020, 4071].away [95]. AWS [4047]. AX [2144]. Axent[118, 662, 899]. axes [2876]. Azlan [360].

b [586, 1869, 2390]. BA [4109]. Baby [73].Bace [1482]. Back[1403, 1459,1757, 1772, 1832, 1919, 2031, 2063,2160,2171, 2278, 2428, 2629, 2713, 2940, 3025,3056,3389, 3694, 3734, 3780, 3805]. back-up[3694]. Backdoor [1877]. backdoors [3528].backed [256, 3111, 3985]. Background[2119, 2130]. backing [1651]. BackOffice[1153]. backs [1584, 1819]. Backup[258, 501, 1432, 1877]. Bad [494, 585, 1790,1982,2044, 2164, 2864, 3289, 3786, 4005, 4201].badder [2149]. Badman [1442]. badware[2944]. BAE [2292]. bail [1732]. Bair[3933]. Baker [453]. balance[1610, 3147,4123, 4173, 4330]. balanced[4067]. Balancing [1114, 1622, 3663, 4382].Balkanizes [1188]. ball [1543]. Baltimore[1105, 1161,1384, 1851]. ban [1326]. Bank[122, 300, 399, 808, 1078, 1572, 1796, 1809,2392,2438, 2471, 2564, 3974]. Banking[159, 264, 417, 445, 573, 891, 947, 1085, 1104,1494,2755, 3171]. Banks[855, 881, 2712, 3400]. banned [2979, 3857].bans [3433]. bar [626, 1254, 2390].Barbarians [2430]. barbecues [844].Barclays [541, 1809]. bare [4177]. Baron[239]. Barr [1243]. barrage [4194]. barred[2606]. barrier [1301]. Based[769, 833, 897, 898, 947, 1018, 1068, 1073, 1127,1201,1390, 1418, 1461, 1547, 1678, 1891, 2117,2175,2202, 2713, 2871, 2954, 2995, 3226, 3246,3486,3502, 3560, 3866, 3901, 3957, 3981, 4012].baseline [2689]. Bash [3657]. Basic [2328].Basics [1212, 1494, 2171, 3277, 3326, 3327,3476,3477, 3615, 3734]. bates [1845]. Battle[299, 406, 498, 837, 3033, 3041, 3066, 3837,3841,3847]. battles [3758, 3775, 3781, 4184].

Page 7: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

7

bay [284, 2611]. BayRS [463]. Baysecure[561]. BBC [2253, 2909]. Be[399, 444, 477, 648, 1392, 1437, 1538, 1559,1702, 1726, 1811, 1838, 1858, 1935, 2199, 2342,2348, 2357, 2384, 2549, 3026, 3111, 3204, 3279,3337, 3417, 3505, 3682, 3815, 3855, 3857, 4010,4122, 4254, 4331, 4364]. beaconing [4329].beams [123, 1921]. Beat [537, 3427].beating [4247]. beats [2256]. BEC [4105].become [1272, 1937, 2274, 3810, 3919].becomes [62, 398, 504, 593, 3899, 3909].becoming [3633, 4114]. bed [72]. beef[1341]. Been [1530, 1982]. before[382, 868, 1413, 3712]. beginners [2761].Begins [1791]. behaving [4288].Behaviour [1283, 1894, 3226, 3640].Behavioural [2973]. Behind[1459, 2365, 2543, 2627, 2862, 3641, 3933].Being [1447, 1677, 2313, 2680, 3451,3738].beleagured [2281]. Bell [50, 200, 951]. bells[73, 2421]. Benchmark [1956].benchmarks [1962, 2035]. benefit [1185].benefits [2326, 2475, 2985, 3269, 3609].BERR [2802]. Best [1162, 1451, 1559, 1671,1767, 2115, 2117, 2289, 2416, 2494, 2573, 2600,2863, 3279, 3306, 3501, 4137, 4251, 4261]. beta[3179]. better [78, 130, 660, 1145,1641, 2520,2537, 2539, 2685, 2813, 3430, 4250]. betting[2256]. between [575, 903, 1925, 2199,2409,4031, 4173, 4230, 4330, 4352]. Beware [2918].Beyond [1054, 2028, 2454, 2496, 2622, 3224,3267, 3774, 4308]. Bible [3304]. Bid [1844].Bidding [2448]. Big [1187, 1530,1666, 1982,2144, 2158, 2169, 2179, 2188, 2192, 2196, 2210,2220, 2238, 2265, 2290, 2304, 2317, 2351, 2367,2643, 2814, 3282, 3342, 3344–3346,3522, 3537,3589, 3661, 3771, 3772, 3913, 3923, 4009].bigger [2149, 2751]. biggest[1704, 2185, 2228, 3601, 3821, 3883, 4174, 4328].biggest-ever [3601]. Bill[797, 1188, 1193,1260, 1262, 1505, 1528, 1832,1966, 3699, 3772, 3791]. Billion[274, 887, 1232, 1235]. bin [152, 510]. bind[11, 435, 983, 1549, 1627, 1976]. Binding

[1437]. Bio [1480]. Bio-logically [1480].Biometric [1431, 1573, 1881]. Biometrics[1825, 1849,1928, 2407, 2483, 2633, 2641].birth [212]. Bit [674, 790, 1029, 1483, 4055].Bit9 [3410]. Bitcoin [3853, 4025].Bitdefender [4271, 4293]. bite [2383]. bites[2160]. BitLocker [2777]. Bits[387, 695, 837, 1235, 2456]. bitten[3026, 3410]. Biz [1662]. Black[239, 427, 2016, 2152, 2297, 2845, 3101, 3230,3350,3448, 3689]. Blackberry [2433].blackhat [2727, 2738]. Blackhats[2106, 2316]. blackmail [840, 2256]. Blame[2160, 2178]. blamed [1098, 2389, 4025, 4130].blames [3441, 4143]. blanket [1608].Blaster [2148, 2161]. blasts [1601, 2447].Blg [2196]. blindness [3104]. Bliss[1769, 2381]. Blitz [1662, 2953]. Blizzard[1007]. block [2292, 2517, 3267, 4014].blockchain [4030]. Blockers [1894].Bloomberg [4117]. blows [2930, 3263].Blue [1094, 1757]. Bluejacking [2204].blues [258, 1094]. Bluetooth[1913, 2098,2231, 2383, 2531, 2817, 3223].blunder [3399]. Blurring [4031]. BNP[2879]. Board[60, 330, 904, 1117, 1316, 1614, 2708].boardrooms [3506]. boards [494]. boat[953]. Body [2180]. Bolero.net [1497].bolstered [1719]. bomb [858]. bombard[1554]. bomber [2292]. bombs [126]. Bonn[2959]. Bonneau [3853]. Book[3184, 3197,3209, 3210, 3221, 3222, 3232, 3243,3252,3253, 3266, 3276, 3277, 3287, 3295, 3304,3305,3326, 3327, 3344, 3345, 3373, 3374, 3383,3384,3413, 3414, 3425, 3435, 3444, 3454, 3466,3476,3477, 3519, 3555, 3614, 3657, 3658, 3668,3678,3679, 3689, 3699, 3700, 3710, 3720, 3741,3742,3751, 3752, 3761, 3771, 3772, 3783, 3784,3794,3813, 3814, 3823, 3824, 3833, 3834, 3844,3845,3853, 3863, 3864, 3873, 3881, 3891, 3892,3901,3911, 3922, 3955, 3956, 3966, 3976, 3977,3988,3998, 4008, 4009, 4065, 4089]. Book[149, 479, 799, 819, 881, 1178, 1482, 1617, 1673,

Page 8: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

8

1763, 1767, 3334, 3352, 3353, 3363, 3392, 3393,3402, 3403, 3509, 3700, 3730, 3731, 3803, 3804,3933, 3944, 3945]. Books [881]. Bookshelf[4065]. Boom [131, 176, 1849]. booming[2140]. Boost [192, 1559, 2615, 3282].boosting [3829]. boot [426, 2591].Bootable [1748]. Border [3905]. Borders[1639, 2259, 2664]. BorderWare [415].borne [610, 2993]. boss [2351, 2367]. Bot[2422, 2801, 3056]. both [2805, 3020].Botherders [3041]. botmaster [2562].Botnet [2524, 2640, 2672, 2909, 2946, 3112,3129, 3194, 3341, 3411, 3888, 4167, 4190, 4325].Botnets [2545, 2571, 2627, 2889, 3033, 3066,3073, 3201, 3227, 3356, 3806, 4162]. Bots[1581, 2594, 2935]. Bottom [2195].Bottom-up [2195]. bounce [907].boundaries [2428, 2496, 3163, 4031]. bounty[2255]. Bouzefrane [3742]. Bovine [900].Box [427, 1500, 2016, 2401,4010]. boycott[1536]. BR [155]. brain [3030]. branch[1536]. Branden [3374]. Branding [1544].Brandon [3892, 3966]. brawn [3030].Brazil [244]. Brazilians [1252]. Breach[2065, 2673, 2743, 3219, 3373, 3499, 3643, 3659,3691, 3808, 3873, 3874, 3974, 4029, 4096, 4182,4378]. breached [300, 3842, 3855, 4109].Breaches [388, 974, 1420, 1918, 2228, 2553,2779, 2825, 2900, 3573, 3687, 3738, 3768, 3848,4043, 4063, 4135, 4181, 4197, 4242, 4254].break [160, 440, 498, 991, 1037, 3861].break-in [440]. Breaking[232, 748, 1621, 2018, 2428, 2817, 3786].breaks [615, 4230]. Breakthrough[765, 951, 1855]. Bredolab [3129]. breeding[3533]. Brett [3933]. Brexit [3913]. Brian[3772, 3911]. bridged [872]. Bridges [1682].Bridging [3785]. bridles [2456]. Brief[1541, 1588, 1605, 1628, 1646, 1658, 1669, 1690,1713, 1735, 1756, 1776, 1799, 1823, 1847, 1868,1968, 2026, 2038, 2055, 2064, 2080, 2094, 2109,2123, 2137, 2150, 2163, 2173, 2186, 2200, 2215,2227, 2244, 2258, 2269, 2282, 2295, 2310, 2323,2334, 2349, 2362, 2378, 2391, 2403, 2415, 2427,

2439,2449, 2461, 2470, 2482, 2493, 2503, 2515,2525,2535, 2552, 2565, 2576, 2586, 2596, 2607,2618,2628, 2638, 2650, 2659, 2669, 2677, 2686,2696,2705, 2714, 2726, 2735, 2745, 2757, 2768,2780,2792, 2803, 2816, 2827, 2837, 3186, 3196,3198,3220, 3242, 3565]. brief[2847, 2859,2869, 2880, 2891, 2901, 2911, 2923,2937,2947, 2960, 2971, 2983, 2994, 3006, 3016,3024,3034, 3044, 3054, 3065, 3079, 3090, 3102,3113,3123, 3132, 3143, 3153, 3162, 3173, 3183,3208,3231, 3251, 3265, 3275, 3286, 3294, 3303,3314,3325, 3333, 3343, 3351, 3362, 3372, 3382,3391,3401, 3412, 3424, 3434, 3443, 3453, 3465,3475,3485, 3496, 3507, 3518, 3529, 3543, 3554,3574,3583, 3593, 3603, 3613, 3625, 3635, 3645,3656,3667, 3677, 3688, 3698, 3709, 3719, 3729,3740,3750, 3760, 3770, 3782, 3793, 3802, 3812,3822,3832, 3843, 3852]. brief [368, 1196, 3862,3872,3880, 3890, 3900, 3910, 3921, 3932, 3943,3954,3965, 3975, 3987, 3997, 4007, 4018, 4026,4036,4045, 4053, 4064, 4076, 4088, 4100, 4111,4121,4133, 4147, 4160, 4172, 4186, 4198, 4211,4223,4234, 4246, 4258, 4272, 4282, 4294, 4305,4317,4327, 4339, 4353, 4363, 4376]. Briefing[423, 894]. brigade [3556]. brightening[2996]. Bring [79, 2315, 3558, 3663].Bringing [302, 3436,3471, 3521]. brings[968, 2335, 2603]. British [482, 2370, 3687].Broad [250]. broadband [1343].Broadcom [4323]. broaden [2361].broader [3281]. Brokat [1104]. brokering[1386]. brother [1187, 1530, 2814]. Browser[866, 1731, 2948, 2953, 2954, 3058, 3200].browser-based [2954]. Browsers[1034, 2611,2698, 2995, 3053, 3071].Browsezilla [2611]. Bruce[149, 2083, 3197, 3955]. Bruised [2278].Brussel [979]. BT[85, 180, 191, 193, 1449, 1629, 2615].Buchanan [1608]. buck [95, 1915].Budapest [1816]. budget [2252, 3011].budgeting [2540]. Budgets [1138]. budgie[2408]. Buffer [631, 633, 673, 759, 841, 908,964, 1013, 1081, 1097, 1151, 1154, 1180, 1378].

Page 9: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

9

Bug[366, 692, 805, 1366, 1397, 1775, 1995, 2270,2371, 2448, 3032, 3287, 3572, 3623, 4218, 4315].Bug-fixed [2270]. bugged [1435]. BugNet[1366]. Bugs [804, 854, 1423, 2267]. Bugtraq[2077]. Build [1827, 2954, 4080]. Building[529, 1531, 1682,2394, 2644, 3211, 3290, 3291,3317, 3598, 3680, 3699, 3797, 4056]. buildings[194, 1760, 3877]. builds [4056]. built [3732].Bull [247]. bullet [3358]. bulletin[60, 330, 494]. bulletproof [3586]. Bullish[2370]. Bulter [242]. Bunni [1845]. Bunny[242]. buoyant [2320]. Bureau [2685]. burn[4020]. bury [3981]. bus [3290]. Bush[1774, 1783, 2389]. Business[134, 219, 460, 485, 623, 638, 645, 848, 971,1016, 1017, 1302, 1328, 1346, 1408, 1451, 1471,1531, 1641, 1657, 1660, 1880, 1905, 1929, 1944,2028, 2045, 2416, 2451, 2452, 2528, 2533, 2534,2557, 2685, 2747, 2766, 2896, 2898, 2988, 3114,3452, 3471, 3579, 3607, 3721, 3765, 3838, 3991,3998, 4066, 4137, 4352]. Businesses [180, 482,537, 840, 1455, 1468, 1603, 2155, 3588, 3605,3835, 3849, 3875, 4078, 4236, 4247, 4283, 4328].busted [2148, 2344]. Butterworth [3998].Butterworth-Heinemann [3998]. buy[1729]. Buyer [1988]. buys[617, 1384, 1406,1800, 2361, 2615, 3100].BYOD [3296, 3394, 3437, 3478, 3617].BYOE [4014]. bytecode [475].

C [209, 1867, 3373, 3891]. C# [3966]. C/S[209]. C2Net [930]. CA[1202, 1233, 1545, 2388, 3399]. Cable[418, 421]. cables [220, 2681]. Cache [25].cached [681]. cafes [1818]. cage[849, 1019, 2408]. Cahoot [2332]. Caibua[273]. Caja [2759]. Calendar[1600, 1623, 1642, 1664, 1730, 1750, 1770, 1793,1815, 1840, 1864, 1885, 1899, 1916, 1933, 1948,1961, 1977, 1991, 2007, 2020, 2032, 2047, 2062,2075, 2120, 2134, 2145, 2159, 2170, 2182, 2211,2742, 2823, 2843, 2908, 2920, 2932, 2955, 2978,2990, 3012, 3031, 3040, 3050, 3099, 3110, 3128,

3150,3170, 3180, 3193, 3217, 3229, 3239, 3249,3261,3272, 3283, 3292, 3311, 3322, 3331, 3340,3349,3359, 3369, 3379, 3398, 3409, 3421, 3431,3440,3450, 3462, 3483, 3493, 3504, 3515, 3527,3540,3551, 3571, 3610, 3622, 3652, 3664, 3706].Calendar[1333, 1562,2090, 2105, 2197, 2224, 2240, 2254,2266,2279, 2291, 2305, 2318, 2331, 2345, 2358,2372,2387, 2399, 2423, 2434, 2445, 2457, 2467,2478,2489, 2501, 2511, 2522, 2532, 2546, 2560,2572,2585, 2593, 2604, 2614, 2625, 2635, 2645,2656,2665, 2675, 2683, 2693, 2702, 2711, 2722,2732,2753, 2764, 2775, 2787, 2799, 2812, 2833,2856,2865, 2875, 2887, 2897, 2943, 2967, 3002,3021,3062, 3075, 3087, 3120, 3139, 3159, 3205,3301,3388, 3472, 3562, 3580, 3590, 3886, 3951,3962,4140, 4166, 4241, 4265, 4277, 4299, 4370].calendar [3600, 3632, 3642, 3674, 3685, 3695,3716,3726, 3737, 3747, 3757, 3767, 3779, 3790,3800,3809, 3819, 3830, 3840, 3859, 3870, 3878,3898,3908, 3918, 3930, 3940, 3972, 3984, 3995,4004,4015, 4024, 4034, 4042, 4051, 4060, 4072,4084,4095, 4106, 4116, 4128, 4153, 4180, 4193,4206,4217, 4229, 4253, 4289, 4311, 4322, 4333,4347,4357, 4383]. Calender [1707].California [1741]. Californian[503, 1794, 2562]. Call[895, 986, 1247, 2280, 2537, 2539, 3556, 4372].Callas [3492]. Called [1157, 1834]. Calling[59, 3491,3611]. calling-card [59]. calls[246, 400, 748, 1251, 2040, 2146, 2826, 3114,3763]. Cambridge [3444]. Cameron [3988].Campaign [274]. Can[105, 371, 495, 1571, 1572, 1653, 1731, 1787,1811,1863, 1889, 1939, 2073, 2085, 2212, 2275,2285,2287, 3336, 3559, 3588, 3723, 3866, 3959,3978,4047, 4082, 4090, 4203, 4247, 4283, 4364].Canada [189]. Canadian [1586]. Canal[1912]. cancelled [3581]. Can’t[1439, 1624,2287, 2472, 3026, 3691, 3724, 4332].capabilities [829, 912, 915]. capability[1490]. capable [557]. capital [483].Cappuccino [2612]. Captcha [2734]. Car[3811, 3813]. Card [59, 179, 540, 916, 1050,

Page 10: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

10

1248, 1320, 1406, 1418, 1431, 1467, 1502, 1504,1522, 1525, 1830, 1946, 2437, 2743, 2840, 3084].Card-Based [1418]. cardholder [2689].cards [1304, 1374, 1567,1583, 1660].CardSystems [2435]. Cardwell [3845].Care [1280, 1575, 2070, 2425, 2898, 3439].careers [2805]. careless [2533]. Carnivore[1527, 1553, 1593]. Carnivores [1511].Carpe [2989]. Carraig [1327]. carry[1564, 1753]. carrying [2592]. Cars[3745, 3764]. Carvey [3334]. Case[355, 453, 922, 1094, 1912, 2466, 2613, 3838].cash [12, 464, 1069, 1165, 2936]. castle [3457].casts [2743]. casual [1191]. cat [3038].catapult [626]. catastrophic [763]. catch[753, 1738]. catchers [3912]. Catching[2848, 3010, 3058, 3339]. Cats [1723]. CATT[1806]. Caught[889, 1171, 1706,2264, 2321, 3328]. cause[959, 1324, 3015,3108]. caused [4029].causes [1237, 1334, 2469, 2755, 2909,3078].Caution [1616]. CCTV [1826, 2523, 4038].cdmount [1446]. CDs [456, 1748]. Cell[412, 985]. cell-phone [412]. Cellular[53, 63, 89, 117, 241, 353, 737, 898, 3244, 3357,3481, 4248]. Censoring [1781]. censorship[1667, 2077, 3199]. central [3478].centralizes [1142]. Centrally [2234].Centre [115, 263, 1554, 1746, 2054, 4132].centres [1476, 2100, 3828, 4283]. Centric[1958]. Cenzic [3005]. CEO [1907]. CERT[1698, 1720, 1828, 2052, 2081]. certain [347].certainties [3420]. Certificate[1436, 1445, 3263, 3399]. Certificates[938, 1248, 1385,1437, 1643, 3213].certification [143, 607, 796, 810].certifications [2647]. Certified [1031].certifies [584]. CGI [510, 694]. chain[3978, 4191, 4298]. Chaining [2274].Chairman [1972]. challenge[210, 490, 935, 2169, 2794, 2977, 3268, 3661].challenged [3023]. Challenger [13].Challenges[231, 1330, 2261,3141, 3166, 3258, 3394, 3585,

3587,3893, 4012, 4091, 4164, 4273, 4345].Challenging [1393]. Champagne [1602].champion [1542]. Chandler [3771].Change [576, 836, 987, 1420,2069, 2643, 3608,3627,3721, 3939]. Changes[27, 1342,1421, 1860, 2040, 4295]. Changing[1950, 2455,2487, 2623, 2664, 2763]. channel[2634]. Channels [2088]. chaos [604, 3296].Characterising [2850, 2861]. charge [88].charged [189, 2309]. charges [114].charitable [2359]. Charles [3393]. chart[2187, 2201]. charts [2791]. Chauhan [3730].cheap [3763]. cheaper [1797]. Check[379, 752, 1207, 1343, 2203, 2321, 2414, 4105].Checkfree [314]. checking [3049].checklist [3968]. Checks [97, 1162, 2119].Chell [3720]. chemical [3264]. cheques[332]. Cherry [3741]. Chet [3614]. chicks[1814]. Child [190, 327, 1047, 2165, 4279].child-safe [1047]. Children [1508, 4332].China [353, 442, 1078, 1382, 1539, 1665, 1818,1951,3072, 3423, 3441, 3582, 4117, 4129, 4232].Chinese[1233, 1383,2926, 2944, 3070, 3370, 3433, 4348].Chip [1107, 1958]. Chipping [1510]. chips[1255, 1747,4117, 4323]. chkey [782].Chooses [892, 1854]. Choosing [381].Chris [3232, 3772, 3944]. Christine [3751].Christmas [1842]. Christopher [3413].Church [261]. Chuvakin [3374, 3413]. CIA[39, 1038]. CIO [1697, 4087]. Circle [3492].Cisco [236, 505, 621, 725, 809, 936, 1046, 1080,1119,1181, 1199, 1555, 1657, 1924, 1937, 2085,2108,2214, 2229, 2271, 2376, 2413, 2447, 2476,2815,2968, 3209, 3210, 3221, 3222, 4043].CISO [4369]. CISOs [4259]. CISSP[1701, 3414,3824]. Citicorp [300]. Citizen[1958, 2680]. Citizens [1726]. Citrix[4301, 4313]. City [2835]. Civil [1511].civilian [377]. CKS [546]. claim [763, 2777].claims [331, 399, 3601, 3889, 4117, 4371].clamp [1504]. clarity [3547]. class[460, 2402, 3049]. Classic [3457].classification [3702, 3895]. clean

Page 11: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

11

[550, 1715, 2230]. Cleaning [3376]. clear[2437]. clearances [2226]. cleared [1692].clears [1262]. Click [535, 1632, 3136].clickjacking [3086]. Client[33, 178, 223, 424, 2117, 2699, 2716, 3166, 3215].client-side [2716]. Client/server [223, 424].clients [583, 3060]. Climate [3721]. Clinton[1251, 1505]. Clip [1378]. Clipper[3, 109, 292]. cloaking [1739]. clock [3524].Close [2392]. closed [1873, 2263]. closer[2335]. closes [736, 1921]. closing[2569, 4296]. closure [2065]. Cloud[2984, 2996, 3070, 3146, 3174, 3190, 3215, 3258,3363, 3376, 3415, 3426, 3488, 3514, 3549, 3628,3722, 3723, 3746, 3789, 3818, 3957, 4012, 4139,4187, 4252, 4263, 4330, 4343, 4368].cloud-based [3957, 4012]. clouds[2883, 3386]. Club [473, 530]. CMA [2280].CMS [3533]. CNN [826]. Co[105, 1972, 2611,3524]. Co-Chairman[1972]. co-exist [105]. co-operation [3524].Co. [2235]. Cocoa [3771]. Code[297, 352, 793, 1254, 1288, 1451, 1488, 1733,1746, 1757, 1787, 1915, 2002, 2039, 2213, 2344,2682, 3042, 3093, 3827, 4044]. codes[1396, 2207]. coding [619, 2140]. Cohen[970, 2089]. Cold [4138]. Colin [3458, 3514].collaborate [29]. collaboration[1285, 2271]. Collaborative [1371]. collect[2844, 4090]. collection [40, 2189, 3959].Collective [2808, 3611]. college [240].Colley [3720]. collide [3212, 3913].Collingbourne [3252]. colours [4059].Columbia [1543]. Column [1704].Combatants [612]. combated [1066].Combating [2222]. Combatting [63].Combination [2322, 2999, 3609]. combine[461, 871]. combined [976]. combines[2243]. COMDEX [1101, 1109]. come[20, 27, 102, 1032, 1704, 2648, 3591, 3871, 4041,4321]. comeback [3169]. comes[2153, 2327, 2676, 2899, 3791, 3846, 3929, 4078].Coming [1102, 1581, 2500, 3927]. command[862, 2672]. commandeered [69].

commands [885, 964, 3073]. Commerce[37, 249, 538, 541, 613, 640, 677, 735, 939, 972,973, 977, 986, 990, 995, 1024, 1042, 1050, 1102,1107,1159, 1165, 1193, 1219, 1258, 1299, 1301,1307,1338, 1348, 1358, 1360, 1361, 1370, 1391,1392,1409, 1427, 1429, 1486, 1567, 1607, 1658,1678,1873, 1915]. Commercial [112, 1108].commercialisation [2666].Commissioners [1577]. commit [73, 2514].committee [647, 1773, 4155]. common[924, 1336, 2825, 2910, 4379]. comms [6].communicating [2496]. communication[3926, 4039]. Communications[30, 156, 287, 507, 604, 628, 645, 706, 766, 845,1983,3675, 3912]. community [2].Compact [1203]. Companies[36, 374, 378, 538, 679, 696, 829, 928, 969, 991,1017,1062, 1084, 1085, 1112, 1185, 1205, 1219,1233,1271, 1299, 1302, 1325, 1356, 1386, 1387,1402,1408, 1420, 1428, 1953, 2261, 2972, 3586].Company [490, 504, 540, 617, 622, 965, 1033,1061,1343, 1369, 1404, 1406, 2065, 2348, 3095].Compaq [1214]. comparison [903].comparisons [3107]. compete [2647].competition [417, 4173]. competitive[1526, 3662]. competitor [398]. complacent[4078]. complains [155]. complement[3019]. completed [869]. Completely [847].Complex [3844, 4069, 4187]. complexity[3147, 3755,4235]. Compliance[927, 1271, 2401, 2797, 2818, 2988, 3137, 3374,3491,3958, 4081, 4176, 4251, 4270].compliant [1205, 1716]. compliants [1798].complies [636]. Components [3393].comprehensive [1558]. Compress [441].compromise[658, 821, 1379, 1489, 2577, 4242].compromised [1583, 2274, 2931,4021].compromises [2144]. compromising[680, 1423, 3660, 3935]. Compsec [2000].CompTIA [3266]. CompuServe [458, 844].Computer [86, 167, 634, 655, 731, 754, 777,799, 1039, 1178, 1420, 1475, 1614, 1785, 1950,2003,2217, 2280, 2327, 2479, 2830, 2958, 3197,

Page 12: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

12

3508, 3545, 4008, 4372]. Computerized[2172]. Computers[115, 240, 1090, 1498, 3977]. Computing[815, 948, 1509, 1580, 1635, 1902, 2087, 2301,2538, 2554, 2569, 2857, 3166, 3174, 3258, 4114].concentrate [669]. concept [2741, 2890].concern [1348, 2014,3022, 3821]. concerned[1846]. concerns[125, 634, 992, 2078, 2286, 2303, 2694, 4184].Concert [133]. concerted [3591].Conference [263, 1723, 2152]. conferencing[1137]. Conficker [2935, 2959]. confidence[3882, 4270]. confident [440, 3919].confidential [1695]. Confidentiality[945, 1659, 2228,3049, 4067]. configuration[1142, 3061]. confirms [1366]. conflicts[1401]. confront [2435]. confronted [4194].Confusion [2017, 3514]. Congress[797, 837, 3370]. Congressional [647, 1243].Conjunction [1987]. Connect [824].Connected [3596, 3764, 4149, 4225].Connection [282, 847, 868, 1347, 3931].connections [919, 1414]. connectivity[123, 139, 618, 1362]. conquer [2341, 3045].Conrad [3414, 3824]. Cons [1278, 3020].Consensus [1768]. consequences [3104].Conservative [2436]. Considerations[389, 1507, 1744,2099]. considered [1314].considers [2257]. consigned [4010].consolidation [3297]. Consortium[292, 341, 760, 788, 1336]. constitution [917].constraints [946]. consultancy [521].Consultant [2084, 2085]. Consulting[2086]. Consumers [1223, 1546, 1554,3768].contact [1567, 4283]. contain [456, 3780].containers [3893]. contains [329].contemporary [2405]. Content[611, 775, 949, 1191, 1305, 1456, 1596, 4365].contest [366]. context [3537, 3670].continents [872]. continue[1217, 2685, 2926]. continues[327, 886, 1166, 2199, 2922, 3033]. Continuity[1929, 2045, 2451, 2452, 2557, 3721, 4137].Continuous [1271, 3672, 4081]. contract

[1125, 1144,1449]. Control[81, 268, 294, 315, 689, 1048, 1166, 1267, 1485,1744,2122, 2672, 2997, 3267, 3271, 3307, 3394,3471,3798, 3916, 3967, 3969]. controlled[2234]. Controller [2624, 3905].Controlling [2759]. controls[939, 1266, 1761]. Controversy[109, 343, 1111, 2447, 2909]. conundrum[3320, 3536]. Convenience [1430].Convention [1676]. Conventional[1393, 2069]. converge [4273]. converged[2443, 2505,3211, 3212]. Convergence[2214, 2335,2678, 3958]. Converging [2731].conversion [673]. convicted [239]. Cook[3402]. Cookbook [3383, 3509, 3668]. cookie[1425]. Cookies [723, 958, 1984]. Cooking[4071]. Cool [1898, 3892]. cooperate [1704].cooperates [74]. cope [3516]. copiers[1191]. coping [3608]. copyright[637, 1305, 3052]. copyrights [100].Coreflood [3194]. Corera [3977]. Corey[3535]. Coriolis [881]. Cornerstone[1369, 3923]. Corp. [781, 2084]. Corporate[116, 157, 293, 748, 813, 1177, 1640, 2121, 2797,2975,3117, 3247, 3712]. Corporates[1594, 2097,2110, 3686]. Corporation[1557, 1596]. Corporations [592, 1706].Correction [3233]. Corrupt [455]. Cost[1204, 1468,1552, 1896, 2110, 2228, 2385, 2779,2900,3095, 3560, 3749, 3763, 4185, 4316].Cost-cutting [1552]. costly [2495]. costs[188, 3076, 3218, 4073]. COTS [678]. Could[535, 840, 1397, 1441, 1920, 2273, 2956, 3279,3579,3883]. Council [1221, 1656].councillors [47]. count [36]. countdown[2236]. Counter [1837]. counterfeit [155].Countering [1394, 3106].counterintelligence [2639].Countermeasures [3833]. Counterpane[2615]. countersurveillance [3419].Counting [3763]. countries [30]. courier[1559]. couriers [1559]. course [2112, 2277].Court [608, 1772, 1785, 1794, 2962].courting [1477]. covered [4312]. Covering

Page 13: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

13

[1809, 2088, 3907]. Covert [2088]. Covid[4348, 4361]. Covid-19 [4348, 4361]. CPRM[1604]. Crack[378, 1834, 1965,2135, 2658, 2801, 2828].cracked [469, 674, 695, 2053, 3152,3484].Cracker [1785]. Crackers [1395, 2751].Cracking [18, 1029, 1915, 3013, 3043, 3103,3189, 3244, 3270, 3329]. cracks [297, 1607].Craig [3344, 3345, 3813]. crash[1046, 1693, 1760, 3108]. crashes [2359].crater [2472]. crawlers [2206]. crawling[2121]. Crayon [1462]. craze [870]. create[367, 3978, 4016]. created [1390, 4343].Creates [572, 596, 1343, 1783, 3332,3624].Creating [1768, 2916, 3828]. Creation[1433]. credentials [3601, 3831]. credibility[2394, 3797]. Credit [540, 916, 1374, 1504,1522, 1583, 1946, 2437, 3084]. Credit-card[540]. Crime [18, 38, 98, 537, 677, 1039, 1178,1239, 1420, 1478, 1481, 1521, 1557, 1571, 2208,2474, 2551, 2836, 2939, 3841, 4120]. Crimes[453, 1331, 3531]. criminals[2432, 3030, 3213, 3542, 3607]. cripple[3213, 3411]. crippling [1641]. criteria[3789]. Critical[1, 1261, 1471, 2386, 2452, 2544, 2758, 2977,3307, 3342, 3523, 4013, 4155, 4263, 4313, 4366].criticised [2723, 3860]. Criticized[292, 331, 697, 843, 929, 1614]. criticizes[668]. cron [173]. Cross [483, 679, 1873,2002, 2578, 2602, 2940, 3328, 3651, 3679].cross-layer [2940]. cross-platform [679].Cross-site [1873, 2002, 2578, 2602, 3328].Crossfire [1706]. crossroads [2807, 2819].crumbling [3825]. Crume [1617]. cry[1824, 3971]. Crying [1766]. Cryptic [2082].Crypto [794, 954, 1020, 1022, 1036, 1166,1188, 1367, 1478, 1723, 1781, 1782, 1805, 1817,1855, 2153, 2406, 2424, 2440, 2559, 3464, 4035].Crypto-currencies [4035].Cryptocurrency [3853]. Cryptographic[368, 704, 875, 931, 967, 990, 1049, 1115, 1196,1723, 1956, 2632]. Cryptography[231, 507, 917, 1206, 1292, 1364, 1509, 1658,

1891,1974, 1985, 4164]. CryptoLocker[3517, 3539]. cryptosystem [563, 1051, 1074].crystal [1543]. CSAPP [715]. CSI[1960, 2867]. CSO [4378]. CSOs [2225].CSS [3658]. CTO [2153, 2447, 2524].Cuadra [3834]. Cuadra-Sanchez [3834].CUDA [3402]. CueCat [1537]. Cultural[3107, 3385]. Culture[268, 294, 2034, 2045, 2736, 4079]. Cumming[3700]. Cup [2574]. Cupboard [1860].curbs [1269]. cure [2382, 3865]. Curiosity[1537]. Curmudgeon [493]. currencies[4035]. Current [711, 2082]. cursor [2667].curve [1074]. Custom [1890, 2251].Customer[1467, 1692,1863, 2471, 2854, 2979].customer-targeted [2471]. customers[345, 1671, 2477, 2534, 3085]. cutting[1552, 2972]. cutting-edge [2972]. Cyber[95, 135, 622, 624, 887, 1264, 1399, 1478, 1481,1542,1571, 1625, 1641, 1681, 1773, 1818, 1837,1895,1927, 2096, 2339, 2436, 2474, 2921, 2926,2936,2939, 2968, 2982, 3149, 3155, 3161, 3262,3282,3316, 3317, 3444, 3459, 3497, 3498, 3530,3576,3582, 3584, 3591, 3607, 3611, 3659, 3671,3686,3701, 3732, 3788, 3807, 3836, 3864, 3879,3896,3919, 3926, 3958, 3959, 3996, 4001, 4043,4049,4052, 4058, 4063, 4066, 4077, 4085, 4114,4125,4132, 4143, 4159, 4179, 4197, 4204, 4210,4216,4240, 4245, 4257, 4275, 4286, 4296, 4304,4309,4320, 4345, 4375]. cyber-attack[2926, 3591,3926]. Cyber-attacks[1927, 3459,3584, 3611, 3671, 3686, 3996, 4049,4052,4058]. Cyber-breaches [4043].cyber-buck [95]. cyber-cafes [1818].cyber-crime [1478, 2939]. cyber-criminals[3607]. cyber-distributor [135].Cyber-espionage [2921]. cyber-resilience[3317]. cyber-risk [4125]. Cyber-Sabotage[1641]. cyber-safe [622]. Cyber-security[1773, 3149,3161, 3262, 3282, 3498, 3530, 3576,3659,3732, 3836, 3879, 3896, 3919, 3958, 3959,4063,4066, 4085, 4114]. cyber-squatters[1264]. Cyber-swine [2936].

Page 14: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

14

Cyber-terrorism [1895]. Cyber-terrorist[2436]. Cyber-terrorists [1625, 1837].cyber-threats [2339]. Cyber-Warfare[3497]. CyberAngels [316]. cyberattack[2899]. CyberCash [314, 354]. cybercops[324]. Cybercrime[988, 1587, 1629,1676, 1768, 1816, 2617, 2839,3038, 3091, 3247, 3313, 3451, 3513, 3599, 3749,3841, 3854, 3998, 4185, 4189, 4256, 4283, 4336].Cyberflex [1110]. cyberfraud [503].CyberGuard[204, 443, 466, 539, 558, 810, 830].CyberSAFE [13]. Cybersecurity [1994,2022, 2040, 2174, 2858, 2898, 3566, 4054, 4352].CyberSource [135]. Cyberspace[129, 272, 548, 775, 881, 1295, 1557, 1932, 1993,2919, 4230]. cyberspying [3072].Cybersquatting [1218, 1415].cyberterrorism [1276]. cyberthreat[3915]. cyberthreats [3160, 4266].Cyberwar [2924, 3423, 3566]. cycles [731].Cylink [1234]. Cypress [4323]. czar [794].Czech [1516].

D [3017]. daemon [351, 606, 1118]. Dafydd[3295]. Dalziel[3783, 3784, 3804, 3814, 3823, 3845]. damage[1129, 3234, 3567, 4073, 4188]. damages[1192]. damaging [3799]. Danger[1879, 2883, 2886, 3897, 4178]. Dangerous[126, 1672, 1910,2393, 3856]. Dangers[1395, 3704, 4303]. Dario [2088, 2100]. Dark[1915, 2582, 2986, 3569, 3682, 3831, 3973].Darkness [1534]. darknet [2954, 3707].darknets [3289]. Data [5, 6, 66, 103, 134, 199,248, 255, 256, 318, 386, 441, 619, 747, 766, 767,850, 883, 948, 969, 1217, 1235, 1249, 1255, 1476,1577, 1630, 1695, 1820, 1829, 1877, 1921, 1980,2142, 2533, 2583, 2588, 2673, 2743, 2754, 2766,2979, 3015, 3064, 3085, 3138, 3158, 3178, 3204,3219, 3344, 3345, 3446, 3460, 3470, 3487, 3490,3512, 3537, 3579, 3589, 3605, 3643, 3659, 3665,3694, 3702, 3768, 3833, 3848, 3861, 3895, 3902,3913, 3959, 3992, 3993, 4009, 4090, 4168, 4170,

4176,4181, 4242, 4254, 4263, 4307, 4334, 4378].data [19, 432, 1195, 1929,2199, 2302, 2396,2472,2529, 2566, 2568, 2592, 2601, 2610, 2820,2975,3175, 3202, 3246, 3346, 3394, 3428, 3499,3522,3536, 3547, 3585, 3618, 3631, 3638, 3649,3661,3712, 3715, 3734, 3746, 3808, 3873, 3923,3980,4079, 4083, 4103, 4135, 4364, 4365].data-security [1255]. Database[431, 1284, 1655, 1700, 2116, 2128, 2472, 2636,2700,2814, 2832, 3007]. datacentre[3106, 3134,3248, 4199, 4290]. datamedia[118]. DataVault [3202]. date [3694].dating [3739]. Dave [3892]. David[3243, 3794,3976]. Davie [3197]. Davies[3863]. Davison [3976]. Dawn [4009]. Day[1616, 1720,1898, 1969, 2514, 3612]. days[1709, 2473,3920]. DCAs [1394]. DCE [867].DCIM [3416]. DCMS [4197]. DCOM[2158]. DCS [27]. DDOS[1925, 1982,2010, 2025, 2101, 2256, 2400, 2829,3273,3278, 3358, 3432, 3445, 3542, 3634, 3697,3738,3756, 3883, 4078, 4093, 4178, 4306, 4340].De-perimeterisation [2404, 2903]. dead[2373, 2463,3355]. deadlock [1037]. deadly[2307]. Deal [716, 1970]. Dealing[2730, 2886,3511]. Death[1657, 2177,2907, 3420, 3725]. Debate[327, 704, 795, 967, 994, 1575, 2332, 2388, 3078,3332]. debates [478]. Debian [1154]. debit[1467]. debunks [2174]. debut [764]. DEC[532]. decade [4199, 4337]. decade-old[4199]. deceit [2359]. December [2201].Decency [604, 628, 706]. Deception[1813, 1990,3988]. Deciding [1436].Decisions [269, 1634]. declared [1751].Decrypting [4251]. decryption [2824].DeCSS [1624, 1675, 1794]. dedicated[812, 3981]. Deep [1313, 2453]. deepens[2160]. deeper [3281]. defaced [1709, 1795].Defacing [2760]. Defamatory [1648].DefCon [2297, 3101, 3230]. defeat[902, 2325, 2400]. defeated [3759].defeating [4214]. defectors [4158].Defence [452, 980, 1224, 1371, 1621, 1813,

Page 15: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

15

2118, 2190, 2454, 2599, 2730, 2982, 3255, 3306,3468, 3611, 3916, 4245, 4340].defence-in-depth [2454, 2599]. defences[960, 2832, 3395,3586, 3989]. Defend[1917, 3783]. Defender [202, 1106, 1440].Defending[2115, 2700, 2860, 3256, 3607, 4068]. defense[2206]. define [1336]. defines [313].defining [3866]. definitive [1618]. defraud[1822]. delay [2077, 4182]. Delayed[50, 1722]. Delays [1699]. deliberate [3780].Delivering [3684]. delivers [1201, 1902].delivery [1062, 3020, 3489]. Dell [1063].Deluxe [3266]. demand [42, 420, 2343].demands [1404, 3753, 3963]. demo [456].democracy [4126]. demonstrate[1920, 1949]. demonstrates [2815].Demystifying [2017, 4250]. Denial[437, 654, 867, 905, 943, 959, 1119, 1198, 1230,1334, 1350, 1443, 1477, 1720, 1834, 1925, 2101,2957, 3068, 3257, 3805, 3992].Denial-of-service[437, 867, 905, 943, 959, 1119, 1230, 1334, 1350,1443, 1477, 1720, 1834, 1925]. denies [1373].Denning [2426]. Denny [3741].Department [953, 1261]. departments[2444, 4085]. Deploy [1004]. Deploying[2130, 2353]. Deployment[447, 1203, 1833,2421, 3500, 4150]. deploys[2333]. depth [2118, 2454, 2599, 2942].DERA [1696]. derived [963]. Derrick[3184]. DeSanto [3976]. descriptions[1964]. deserves [262]. Design[82, 2099, 2599, 2940, 2998, 3003, 3200, 4380].Designing [2028]. designs [515]. Desktop[512, 666, 924, 2881]. Desperados [1989].despite [440]. Dessart [3210]. destined[2181]. destroy [3366, 3643]. destroying[3806]. destruction [3428]. destructive[4224]. Detail [2131]. details[1156, 1467, 2437, 2564, 2575, 2778]. detect[774]. detected [488]. Detecting[3226, 3713, 3806]. Detection[745, 746, 902, 920, 934, 974, 1032, 1127, 1256,

1270,1345, 1421, 1482, 1523, 1789, 1833, 1834,1938,1955, 1987, 2017, 2073, 2074, 2093, 2246,2730,2850, 2861, 2894, 2940, 2951, 2980, 3269,3486,3534, 3701, 3834, 3865, 4329, 4355].detections [2952]. detects [1524]. deter[3236]. determining [3903]. deterred [607].detox [3649]. develop [470, 542, 1085, 1233].developer [188, 3418]. developers[3077, 3581,3978]. Developing [293, 2804].development [3479, 3774, 4011, 4029,4377].Developments [213, 499, 2153]. develops[8, 2982]. Device [259, 285, 615, 643, 789,1202,2139, 2216, 2521, 3548, 4268, 4300].Devices[199, 295, 1906, 1973, 2529, 2579, 2584, 2589,3298,3308, 3509, 3544, 3596, 3602, 3638, 3646,3672,3727, 3778, 3969, 4006, 4021, 4057, 4225].devil [233, 2425]. devil-may-care [2425].devious [2198]. Devon [3243]. DevOps[4094]. DHCP [1923, 2115]. DHS[2723, 2992]. diagnostic [521]. dial[524, 1903]. dial-up [1903]. Diary [3287].Did [3108, 3874]. DIDS [2073]. dies [2424].difference [1925]. Different [1274, 2195].Difficult [1702]. Diffie [888]. Diffusion[3844]. Dig [2453, 2472]. Digital [355, 476,576, 578, 1049, 1086, 1155, 1158, 1214, 1231,1248,1332, 1355, 1385, 1405, 1437, 1440, 1505,1557,1575, 1989, 2125, 2189, 2250, 2820, 3127,3213,3326, 3327, 3514, 3525, 3556, 3575, 3587,3733,3742, 3911, 3979, 3988, 4134, 4136, 4170].dilemma [148, 3669]. Dimension [1894].dimensions [4150]. dip [533]. dire [2280].direct [252, 1195]. Director [2241].directories [510]. directors [1571].Directory [1366, 3318]. dirty [3376].disappear [2292]. disappearing [3982].disappointed [1325]. disarray [1964].Disaster[34, 94, 948, 1477, 2000, 2363, 3488, 3561, 4137].discipline [599, 3178]. disclose [4142].Disclosure [794, 1967, 2024,2185, 2388, 2555,2653,3078, 3096]. discontinues [1685].discovered [751, 1135, 1516, 1883, 2921].

Page 16: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

16

Discovering [1005]. discovers [2959].Discovery [2139, 2300, 2330, 2555,2655, 2663,3788, 4083, 4103]. discredits [2890].disgruntled [2956]. dish [1644]. disinfect[3869]. disks [3376]. dismantles [2547].dismissed [114]. disorganized [2008].dispute [1217]. Disputes [1392]. disrupt[1041, 3273]. disruption [3624]. Dissecting[3200, 3947, 4319]. disseminating [1192].disservices [1164]. distance [400].distraction [3240]. distribute [1140].Distributed[1925, 2073, 2101, 2709, 3805, 3992].Distributed-Denial-of-Service [1925].distributes [415]. Distributing [835].Distribution [174, 2699, 4039, 4233].Distributor [135, 1304]. Divide[1337, 2341, 3045]. divided [739]. DIY[3073]. DMCA [1762, 1790]. DNC[3871, 3874]. DNS [1439, 1549, 1633, 2107,2115, 2640, 2834, 3014, 3557, 3588, 3595, 3754,3829, 3846, 3881, 3970, 4073, 4297].DNS-related [4073]. DNSSEC[1576, 3080, 3577]. Do[106, 371, 648, 1439, 1459, 1460, 1814, 2069,2070, 2140, 2212, 2219, 2326, 2802, 2828, 2844,2853, 3618, 3914, 3939, 4203, 4247, 4262].Doctrine [2919]. Document[329, 423, 1559, 2697, 2851, 3947].Documenting [2089]. Documents[1087, 1553, 1593, 2144]. DoD[678, 1726, 2723]. dodge [1936, 3358].dodging [2506]. dodgy [4374]. Does[230, 1023, 1459,1679, 1884, 2338, 3874].Doesn’t [1824, 1838, 3348]. doing[2385, 3037, 3752]. dollar [887]. Dollars[2893]. domain[325, 422, 1218, 2025, 2624, 3418, 3651].domains [3442, 4285]. domestic [1726].dominant [416]. Dominic [3720]. Domino[721]. done [1311]. Donn [1178]. Don’t[1462, 1617, 1729, 1890, 2273, 3337, 3579, 4175].Doom [1462]. door[3001, 3091, 3686, 3780, 4038]. doors [4202].

Dorothy [2426]. Dot [1832]. Dot-NET[1832]. dots [2941, 4176]. double[1778, 1821,3097]. doubled [1631]. doubt[243, 2569]. Doubts [594, 3653]. down[18, 378, 734, 1397, 1403, 1504, 1709, 1711,1818,1965, 2113, 2195, 2568, 3109, 3129, 3201,3219,3338, 3432, 3442, 3494, 3973, 4086, 4119,4279,4325, 4349]. Downadup [2888].download [382, 1220,1283, 1463, 1874, 2778].Downloader [2013]. downloading [2893].downplays [2777]. dozens [750, 4312]. Dr[2153]. Draft [160, 1325, 1367]. Dramatic[393, 4254]. dream [4201]. drive[197, 2343, 2375, 2778]. drive-by [2778].driven [832, 3735, 4174, 4341]. driver [285].drivers [2365]. drives[1867, 2355,3643, 3676]. drops [2636, 3517].drug [3494]. DTI [763, 1420]. dtmail [1122].dual [467]. Dulaney [3266]. dumb [4259].duped [1643]. during [3926]. Dutch [1796].DVD [1310]. dxconsole [476]. dying[3796]. dynamic [2640]. DynaSoft [74].

E-Biz [1662]. e-book [3352, 3353, 3614].E-Business[1408, 1451,1471, 1641, 1657, 1660, 1880, 2028].E-Commerce[735, 972, 977, 986, 990, 995, 1050, 1102, 1107,1165,1193, 1219, 1258, 1299, 1301, 1307, 1338,1348,1358, 1360, 1361, 1370, 1392, 1409, 1427,1429,1486, 1658, 1678, 1873, 1915]. e-crime[2551]. e-discovery [2655]. E-government[1286]. e-ISBN [3184]. e-learning[3176, 3291]. E-mail[79, 120, 126, 148, 149, 232, 288, 310, 394, 402,528, 567, 581, 720, 736, 741, 834, 846, 851, 865,874, 932, 945, 949, 1099, 1157, 1164, 1177, 1388,1416,1499, 1524, 1545, 1636]. E-merchants[1300]. E-money [1584]. E-payment [1319].E-voting [2739]. E-warehouse [1852].E-word [1329]. E3 [810]. E security [1674].Eagle [580, 659]. Early [2084]. Earth[3679]. eased [477]. easier [3934]. East[2924, 3285,3361, 4278]. Easy

Page 17: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

17

[427, 722, 2441, 3164, 3482, 3727]. eating[723]. eats [1652]. eBay [2308]. ebook[3425]. EBPP [1428]. Ebsworth [3480]. EC[1716, 1994]. ECB [4254]. ECHELON[1243, 1693, 1726]. ECHR [1716].ECMAScript [3891]. economy [1641].ecosystem [3263, 3807]. Ed [3425]. edge[2312, 2972, 3662]. Edgescan [4326]. EDI[91, 450, 898]. EDI-based [898]. Edinburgh[1723]. Edited [3444, 3751, 3803, 3901, 4008].Edition[3197, 3232, 3266, 3276, 3295, 3334, 3374, 3383,3555, 3658, 3751, 3771, 3772, 3824, 3892, 4008].Editor [2138]. Editorial [904, 1117, 1316].EDS [558]. educate [1376]. Education[1, 1277, 1617, 2541, 2852, 4020]. Edward[3853]. Effect [1680]. Effective[1, 1945, 2421, 2462, 3247, 4103, 4227].Effectiveness [56]. effects [1641, 2655].effort [307, 900, 1344, 2933]. efforts [2797].eID [2840]. eight [1754]. election[2389, 3871]. election-voting [2389].elections [3273]. electoral [3952]. electric[283]. electrical [2931]. electricity [4096].Electronic[12, 138, 148, 149, 249, 260, 279, 287, 318, 332,464, 483, 514, 541, 639, 643, 645, 677, 939, 1020,1024, 1042, 1086, 1087, 1391, 1457, 1559, 1570,1575, 1650, 2397, 3393, 3419, 4365].electronically [1088]. Elenkov [3710].Eliminate [162, 506]. eliminated [488].Eliminating [1419]. elliptic [1074]. else[1743]. Elsevier [3742]. elusive [2276].Email [1760, 1797, 1812, 1844, 2494, 3559,3563, 4012, 4222]. emails[2198, 3961, 4063, 4374]. embarrassment[1905]. Embassy [3992]. Embedded[1882, 2365]. embraces [364]. emerge[594, 3759, 3851]. emergence [592].emergency [2866]. Emerges[1576, 3032, 3168]. Emmett [3266]. Emotet[4224]. employee [1475, 2337]. Employees[982, 1641, 1704,2806, 2956, 3826]. Employer[1529]. EMV [1611]. enable [1161, 1339].

Enabled [501, 1637]. enablement [4352].enables [716, 1110, 1253, 1503]. Enabling[1370, 3296,3310, 3936]. encode [2826].encouraged [1060]. Encouraging [4228].Encrypt [441, 747, 1235]. Encrypted[835, 845, 911, 2584, 4212]. encrypting[4136]. Encryption[11, 151, 199, 292, 301, 303, 362, 408, 413, 414,420, 459, 477, 498, 505, 514, 540, 579, 583, 636,647, 657, 658, 666, 674, 679, 685, 695–697, 714, 717, 765, 768, 787, 790, 791, 795, 797,843, 850, 856, 876, 878, 888, 947, 968, 972, 994,1006,1021, 1037, 1052, 1058, 1082, 1173, 1210,1249,1269, 1293, 1309, 1317, 1325, 1354, 1382,1403,1411, 1508, 1659, 1719, 1732, 1788, 1956,2153,2241, 2561, 2881, 3018, 3084, 3107, 3320,3484,3487, 3511, 3541, 3628, 3758, 3781, 3857,3923,4039, 4319]. encryption[1223, 1344,3663]. encryptor[361, 1088, 1234, 1501]. Encryptors [1186].encrypts [248]. Encyclopedia [3393]. End[229, 551, 696, 1861, 2441, 2473, 3093, 3147,3670,4318]. end-to-end [4318]. end-user[3093, 3147]. end-users [2441].Endorsements [164]. Endpoint[2567, 2740,4145, 4201]. endpoints [2995].ends [99, 3564]. enemy [2914, 2964, 4165].Energy [1741, 3298, 3591, 3799, 3985].enforces [1162]. Enforcing [2770].Engebretson [3277]. engine[362, 1070, 1245, 1284, 2781, 2980]. engineer[191, 495]. Engineering [267, 1723, 1724,2033,2198, 3135, 3176, 3637, 3901, 3941].Engineering-Based [3901]. engines[2548, 2774]. Enhanced [500, 561, 664, 718,726, 784, 1089, 1450, 1593, 2987].Enhancement [1412]. Enhancements[466, 793, 1009, 1414]. enhances [1318, 1452].ENISA [4159]. enlists [1520]. enough[2766, 3541,3743]. ensnare [3941].Entegrity [1069]. enter [1872]. Enterasys[2447]. Entercept [1609]. Enterprise[522, 559, 682, 897, 948, 1032, 1228, 1886, 2078,2083,2361, 2483, 2821, 3144, 3209, 3457, 3512,

Page 18: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

18

3648, 3784, 4038, 4091]. Enterprise-grade[4091]. enterprise-wide [522]. Enterprises[783, 1680, 2995]. Entertainment [1007].Entitlement [2773]. entitlements [2762].Entrust [1125, 1183, 1220]. envelope[851, 2658]. Environment[33, 924, 1279, 1390, 1880, 2339, 2443, 2644,2841, 2870, 3059, 3211, 3308, 3597, 4047].environments[646, 2581, 2917,3561, 4069, 4187]. epidemic[2788, 3091, 4201]. epilepsy [2790]. equals[4381]. Equant [1519]. Equifax [4029, 4062].equipment [3004, 3008, 3370]. era [71, 418].erase [3605]. Erasmus [3720]. Eric[3414, 3678, 3824]. Ericsson [74]. Ernst[781]. Erratum [2725]. error [1014, 3399].ESB [3290]. Escape [1703, 2342, 2395].Escrow [478, 593, 797, 993]. eSignature[3929]. especially [3552]. Espionage[111, 2480, 2921,3599, 3616].Espionage-linked [2480]. Essential[939, 2903, 3845]. Essentials [4240, 4342].Essinger [1763]. Establish [365, 1697].Establishes [1829]. Establishing [147].Estonia [2924, 3348]. Estonian [3992].Ethernet [179]. Ethical[1839, 1889, 2465, 3225, 3354]. eToken [1551].eTrust [703]. EU [99, 1157, 1217,1631, 1656,1717, 1983, 2199, 2230, 2789, 3203, 3605, 3712].EU-US [1217]. EUNet [282]. EUR [2230].Europe [248, 303, 808, 968, 1060, 1319, 1656,2512, 3001, 3107, 3448, 4159]. European[160, 979, 1354, 1355, 1407, 2051, 2574, 2840,3161, 3665, 3985]. Europol [3718, 4120].Eurovision [2259]. evaluates [2779].evaluating [2277]. evaluation [3081].evaluations [650, 670]. Evan [3253].evasion [3156]. even [601, 1937]. Event[1960, 1961]. Eventful [2232]. Events[35, 58, 84, 107, 113, 127, 150, 171, 186, 211,235, 270, 296, 319, 348, 372, 391, 410, 434, 454,474, 496, 509, 531, 553, 568, 588, 605, 629, 651,671, 691, 708, 728, 756, 776, 820, 839, 861, 923,941, 998, 1026, 1043, 1056, 1076, 1095, 1116,

1134,1150, 1169, 1179, 1197, 1213, 1227, 1244,1265,1281, 1296, 1315, 1333, 1562, 1600, 1623,1642,1664, 1684, 1707, 1730, 1750, 1770, 1793,1815,1840, 1864, 1885, 1899, 1916, 1933, 1948,1977,1991, 2007, 2020, 2032, 2047, 2062, 2075,2090,2105]. Events[2120, 2134,2145, 2159, 2170, 2182, 2197, 2211,2224,2240, 2254, 2266, 2279, 2291, 2305, 2318,2331,2345, 2358, 2372, 2387, 2399, 2423, 2434,2445,2457, 2467, 2478, 2489, 2501, 2511, 2522,2532,2546, 2560, 2572, 2585, 2593, 2604, 2614,2625,2635, 2645, 2656, 2665, 2675, 2683, 2693,2702,2711, 2722, 2732, 2742, 2753, 2764, 2775,2787,2799, 2812, 2823, 2833, 2843, 2856, 2865,2875,2887, 2897, 2908, 2920, 2932, 2943, 2955,2967,2978, 2990, 3002, 3012, 3021, 3031, 3040,3050,3062, 3075, 3087, 3099, 3110, 3120, 3128].Events[3139, 3150,3159, 3170, 3180, 3205, 3217, 3229,3239,3249, 3261, 3272, 3283, 3292, 3301, 3311,3322,3331, 3340, 3349, 3359, 3369, 3379, 3388,3398,3409, 3421, 3431, 3440, 3450, 3462, 3472,3483,3493, 3504, 3515, 3527, 3540, 3551, 3562,3571,3580, 3590, 3600, 3610, 3622, 3632, 3642,3652,3664, 3674, 3685, 3695, 3706, 3716, 3726,3737,3747, 3757, 3767, 3779, 3790, 3800, 3809,3819,3830, 3840, 3850, 3859, 3870, 3878, 3886,3898,3908, 3918, 3930, 3940, 3951, 3962, 3972,3984,3995, 4004, 4015, 4024, 4034, 4042, 4051].Events [2882, 4060, 4072,4084, 4095, 4106,4116,4128, 4140, 4153, 4166, 4180, 4193, 4206,4217,4229, 4241, 4253, 4265, 4277, 4289, 4299,4311,4322, 4333, 4347, 4357, 4370, 4383]. Ever[1767, 2395,2710, 3564, 3601, 3909].ever-wider [3909]. Every [846, 3238].everybody [2086]. everyman [2874].everyone [2783]. everything[1009, 1560,1908, 2004]. eviction [1264].Evidence [2189, 4037]. evolution [1293,2485,2737, 2829, 3481, 3578, 3681, 3756, 3787].Evolutionary [2471]. evolve [2926].evolving [2710, 3405]. ex [1261, 1641].ex-staffers [1261]. ex-technical [1641].Exactly [838, 859, 880, 1479]. exaggerated

Page 19: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

19

[3495]. example [1679]. exceeding [986].Excel [557]. exchange [579, 1156].executes [885, 1488]. execution [2871].Executive [2708, 3882]. Exim [4358]. exist[105, 1884]. expand [1200]. expanded[1175]. expands [363, 1234, 1404, 3801].expensive [330]. experience [616, 1744].Experienced [1420]. experimental [3081].Experiments [1879]. Expert[929, 1732, 2174,2658]. Experts[763, 1425, 2858,3623]. explained [52, 2206].explicit [309]. explodes [916, 2788].Exploit [680, 1136, 2136, 3422, 4361].Exploitable [1377]. exploitation[1627, 4279]. exploited [942, 2213, 4337].Exploiting [2870, 2963, 3906]. exploits[2267, 2480, 2793, 3146, 3371, 3395, 3623].Explore [1577]. Explorer [693, 709, 866,1045, 1079, 1124, 2281, 2364, 3032].Exploring [2782]. explosion [1102].Export [368, 615, 704, 790, 807, 825, 878, 909,1166, 1188, 1196, 1269, 1309, 1317, 1367, 1478].Exportable [301, 408]. exports [292, 946].exposed [1084, 1648, 2036, 3460, 4224, 4283].exposure [2388, 2597, 2905]. expreserve[569]. Express [601, 2333, 3092].Expressions [3383]. Extended [443, 4295].Extending [637, 2622]. extensions [3200].extent [489]. exterminate [2293].External [1045, 2825]. Extinguish [1914].Extortion [1645, 3052, 4216]. extortionists[2066]. extra [2443]. extradited [2549].extranet [1357, 1519]. extranets [2353].extremely [2386]. eye [2407]. Eying [2633].

FAA [1920]. Face [260, 840, 1254, 1259, 2623,2763, 3237, 3799, 3855]. Facebook[3063, 3086, 3377, 3422, 3941, 4194]. faced[2261]. faces [4179]. facing [2155, 3993].fact [2153, 3722, 4192]. factor[1410, 2543, 2701, 3188, 3609]. Facts[3855, 3939]. Fadyushin [3435]. fail[688, 966, 1138, 1695, 3769, 4262]. Failed[2979]. failing [1560, 3516, 3573, 4142]. fails

[1228, 2300,2935, 3004, 3274, 3432, 4219].failure [1352]. failures [1198]. Faircloth[3276]. fake [3052, 4107]. Fall [1791]. fallacy[3839, 4205]. False [1848, 2884, 3905].familiar [3479]. Family[1006, 2149,2413, 2603]. fantasy [1168]. far[266, 740, 2412]. farewell [1844]. Fashion[2294]. faster [2050, 2162]. fattens [2229].Fault [139, 201, 376, 1645]. fault-tolerance[376]. Fault-tolerant [139]. Favour[1418, 1805]. FBI[343, 375, 845, 889, 1420, 1493, 1553, 1672,1746,2241, 2458, 2684, 3360, 3811, 3847].fcagent [1118]. FDA [4268]. fear[592, 677, 937, 2319, 3377]. Fears [215, 571,613, 1038, 1400, 1495, 2303, 3072, 3722].features [340, 718, 784, 2587, 2840].February [2232]. federal[278, 1208, 1512, 1697, 3723]. federated[2335, 2355,2466, 2794, 2982]. Feds[787, 2945]. feed [3579, 4175]. feeling [1718].Feldman [3414, 3824]. Felten [3853].femtocells [3244]. fence [2344]. fest [2469].Festival [2152]. feud [1006]. Few [3182].Fibre [8, 194, 220, 2681]. fibre-optic [8, 220].fiction [2153, 4192]. Field [3519]. fierce[3078]. Fifth [1704, 3197, 3768, 3771]. fight[274, 887, 1665, 1800, 2278, 2428, 3077, 3451,4122,4239]. Fighting[130, 1178, 1812, 3356, 3957, 4261]. fights[214, 218, 326, 1506, 1757]. File[717, 942, 971, 1001, 1062, 1252, 1452, 1618,2333,2963, 3052, 3490, 3546]. Fileless[3935, 4050,4261]. Files [802, 828, 911, 1351,1432,1636, 2347, 2769, 2811, 2966, 3643].filling [2670]. film [1687]. filter [290].Filtering [912, 1456, 1744]. Final[837, 2236, 3130]. finally [305, 1058, 3796].Finance [1780]. Financial[102, 256, 1015, 1096, 1211, 1544, 1704, 1723,2239,3313, 3573, 3919]. Find [1425, 2106].Finding [1211, 2058, 2371, 3597, 4067, 4094].Finds [961, 1420, 1467, 4315]. Fine[2513, 4188]. Fine-tuning [2513]. fined [60].

Page 20: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

20

Finest [1598]. Finger [2957, 3423].fingerprint [639, 789, 1906, 3525].fingerprints [3127]. finite [767]. Finjan[699]. Finland [1231]. fire [217, 438, 1148,2502, 3328, 3556, 3791, 4082, 4300]. FireEye[3641]. firestorm [979]. Firewall[49, 140, 339, 341, 357, 359, 365, 403, 415, 443,451, 467, 472, 490, 499, 523, 529, 597, 621, 626,688, 726, 769, 784, 815, 834, 886, 912, 1008,1010, 1025, 1054, 1067, 1128, 1142, 1203, 1356,1381, 1387, 1441, 1466, 1476, 1556, 2067, 2243,2508, 2985, 3083, 3105, 3165, 3167, 3195, 3929].FireWall-1 [1381]. firewalled [2581].Firewalls[54, 217, 284, 370, 526, 686, 688, 748, 785, 799,819, 1063, 1064, 1558, 1834, 1987, 2005, 2366,2464, 2599, 2670, 3221, 3222, 3397, 3500, 3780].firm [765, 1406, 1851, 2979, 3601, 3675, 3717].Firms [255, 1714, 1801, 1803, 2332, 2712, 2846,3219, 3264, 3361, 3370, 3482, 3516, 3573, 3591,3592, 3758, 3792, 3799, 3820, 3861, 3927, 3942,4090, 4107, 4142, 4182, 4232, 4301]. First[399, 451, 557, 600, 705, 808, 869, 1078, 1113,1167, 1650, 1833, 2106, 2136, 3312, 3996]. Fish[1747]. Five[704, 1419, 2348,2517, 2562, 3447, 3592, 3769].Fix [950, 952, 1779, 2267, 2544,2992]. Fixed[1838, 2270]. Fixes[216, 805, 854, 2091, 3061, 3381]. Fixing[2272, 3727]. Flame [3332]. Flaw[3, 376, 456, 687, 693, 770, 865, 1182, 1441,2136, 2185, 2544, 2834, 2866, 3003, 3042, 3078,3464, 3563, 3666, 3708, 4006, 4119, 4301, 4313].Flawed [413, 993, 1699]. Flaws[763, 952, 1700, 1952, 2097, 2158, 2169, 2242,2348, 2723, 2724, 2855, 2969, 3077, 3097, 3553].Flexible [1305, 3430]. flies [3010]. Flood[141, 602, 2940, 3805, 4068]. flooded [741].flooding [589]. flow [1380, 2750, 3902].flown [2408]. flows [1069]. flu [2936, 2989].flux [2839]. fly [749]. fm fls [570]. Focus[1017, 2566, 3117, 3151, 3915]. focused [2588].foe [2698]. foil [1761]. fold [3634].Following [3479]. font [1180]. Fool [2464].

Fool-proofing [2464]. Fooling [2056].foothold [1618]. footprint [4021].footprinting [2925]. footsteps [3479].forced [1424]. ForceField [701]. forceful[2183]. forces [314, 930, 1497, 2065]. fore[2605]. forecast [416]. Forecasting [3976].Forensic[2886, 3115,3174, 3334, 3636, 3639, 3746, 3955].Forensics [1332, 2003, 2250, 2631, 2820, 2886,3326,3327, 3519, 3545, 3575, 3587, 3614, 3679].forged [126]. Forgery [506, 1419]. Forget[1890]. forking [3572]. forks [2230]. form[679, 1033, 1408, 3899, 3909]. formats [2704].formed [156, 357, 760]. Former [2241].forms [1086, 3759]. fort [3838]. Forte[2088, 2100]. Fortezza [364, 377].forthcoming [3665]. fortress[20, 55, 295, 345]. fortresses [3732]. Fortune[991]. Forum [1657, 3228]. forums [2547].fought [265]. found [3, 25, 242, 408, 484, 684,692, 693, 865, 1001, 1512, 1752, 3464, 4323].foundation [2417, 3702]. Founder[1851, 1972,2153]. Four[872, 3634, 3769, 4328]. Four-fold [3634].Fowler [3873]. fpkg2swpkg [632]. fragile[3807]. fragment [1426]. Fragmentation[346, 1273, 1834]. Frame[198, 361, 502, 1186, 1236]. framebusting[3255]. Frametrapping [3255]. framework[547, 561, 3690, 3823, 4023, 4067, 4227].franca [4364]. Francisco [1960, 2835].Francois [3210]. Fraud[53, 63, 89, 130, 218, 412, 428, 737, 745, 898,916, 1143, 1221, 1300, 1504, 1522, 1554, 1631,1798,1800, 1946, 2385, 3522, 3848, 4035].fraudster [753]. fraudsters [3145].fraudulent [1643, 3058, 3339, 4063]. Fred[970, 2089]. Free [92, 505, 712, 772, 1164, 1220,1226,1248, 1278, 1288, 1547, 1691, 1696, 1712,1852,1903, 2110, 2303, 2456, 2878, 3219].Free-Net [92]. FreeBSD [962, 963].Freedom [261, 473, 530, 2070, 2641]. freely[888]. French [297, 696]. friend [2698].Friendly [4082]. fries [1817]. Front

Page 21: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

21

[87, 1975]. Frontier [1226, 2001, 3319, 3937].fronts [1365, 3063]. frustrate [845]. FTC[1592]. FTP[395, 907, 1027, 1057, 1136, 1151, 3067]. ftpd[863, 1268]. ftpd/rlogind [863]. FUD[3722]. fuels [2241]. Full[311, 968, 1267, 2185]. Fuller [819]. Fun[2671]. functional [4205]. functions [1035].Fund [45]. fundamentally [2069].Fundamentals [3804]. funding [3572].Further [218, 417, 581, 590, 594, 786, 825,1188, 1357, 1359, 2374, 2890, 3263]. Future[104, 228, 375, 627, 918, 1210, 1308, 1985, 2003,2100, 2234, 2707, 2996, 3025, 3165, 3502, 3505,3621, 3745, 4093, 4249, 4287]. Fuzzing[2838, 2938].

G7 [210]. gab [2033]. gags [2296]. gain[1268, 4126]. Gaining [1618, 3950]. gains[810]. Galitsky [1972]. game[879, 1836, 1857,3038, 3427, 3884]. gamer[2066]. games [265, 754]. Gang[1681, 2736, 3601]. gap [2653, 3856, 4296].gaps [3785, 4029]. Gardner [3699].Gartner [3240, 3589]. gatekeepers [3946].gates [1866, 2377, 2430, 2514]. Gateway[564, 681, 896, 3105, 3290, 4080]. gatherers[2100]. gathers [2375]. Gauntlet[915, 1752]. gazing [1543]. GCHQ [3675].GDPR [3835, 3928, 3958, 4041, 4098, 4237].GE [481]. Gear [2127]. gears [2616].Gemalto [4171]. genealogy [2674].General [871]. generate [1848].Generation [136, 308, 1010, 1025, 1297, 2151,2728, 2902, 3397, 3500, 3814, 4319]. Gentle[2019]. Geoffrey [3881]. Georgia [3380].German [1570, 2255, 2308]. Germany[458, 1649, 1819,1922, 2574]. Get[537, 1158, 1396,1611, 1780, 1897, 2149, 2198,2219, 2472, 2571, 2637, 3000, 3274, 3506, 4284].Gets [92, 469, 519, 856, 1125, 1144, 1145,1206,1481, 1651, 1754, 3312, 3523]. Getting[397, 1241, 1540,1620, 1955, 2063, 2264, 2284,2380, 2518, 2521, 2530, 2590, 2673, 2813, 3456,

3694,4078, 4151]. Gevers [3864]. Ghosts[2314]. giant [1921]. giants [290]. gift[2033]. Gigabit [1389]. Gigger [1867].Giuliani [2357]. give [95, 804, 928]. Given[394, 1946]. gives [426, 1267, 1449, 1485].Glance [2048]. GlimpseHTTP [884].glitch [777]. glitches [1098]. Global[70, 138, 156, 507, 640, 742, 814, 1068, 1183,1187,1232, 1288, 1303, 1317, 1493, 1674, 1768,1917,2363, 3080, 3091, 3536, 4001, 4304].GlobalSign [1689]. Glype [3395]. Gmail[2303, 2846]. GNS3 [3731]. GNU [3700]. go[230, 1670, 1814, 2551, 2633, 2844, 2853, 4124].goals [2506]. Godfathers [2450]. Goes[244, 304, 1187, 1570, 1796, 1893, 2044, 2203,2559,2752, 3696, 3703, 3883]. Going[117, 1419, 1771, 2164, 2896, 4013]. gold[2206, 3655]. Golden [1862]. Goldfeder[3853]. Gone [2302, 2468]. Good[187, 286, 585, 648, 755, 1811, 2680, 2822, 2927,3390,3816, 3983]. Goodbye [3714, 4276].Google [2296, 2303, 2778, 2846, 2912, 2934,3014,3023, 3064, 3207, 3495, 3679, 3941, 4119].Googling [2206]. Gordon [3977]. govern[2896]. Governance [2885, 3363, 3373, 4176].Government[64, 260, 289, 478, 583, 656, 810, 878, 892, 1082,1286,1391, 1806, 1827, 1936, 1962, 2037, 2268,2306,2343, 2636, 2754, 3194, 3641, 3758, 3820,3860,3879, 3992, 4017, 4044, 4085, 4207, 4371].Governments[210, 459, 1403, 2039, 3207, 3262, 3743].Goyvaerts [3383]. GPRS [2001]. grabbing[3883]. grade [3004, 4091]. Gradient [517].Graffiti [1569]. Gragido [3976]. Graham[3700]. Graham-Cumming [3700]. grail[3777]. Grant [3751]. granted [1317].Graphics [373]. Gray [3966]. great[95, 442]. greater [2306, 3506]. greatest[1348, 2014]. greynet [2626]. Grid[2087, 2538,2554, 2931, 2946, 3417, 3498].GridOne [3019]. grips [2521, 4151].Ground [313, 658, 1577]. Group[156, 679, 794, 796, 867, 881, 984, 1270, 1496,

Page 22: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

22

1667, 2053, 2096]. Groups[260, 1829, 2933,3293, 4256]. grow[1232, 1878, 2480, 2922, 3697]. Growing[161, 353, 1569, 3313, 3915, 4087]. grown[2223]. grown-up [2223]. grows[40, 3552, 3851, 4221]. Growth [6, 70, 159,412, 421, 450, 886, 3341, 3756, 4145, 4190].GSM [1110, 1115, 2044, 2260, 3189].guaranteed [336]. Guaranteeing [1054].guarantees [1416, 3797]. Guard[1641, 1682]. Gudaitis [3305, 3988].Guerilla [3864]. GUI [2411]. guidance[2767]. Guide [1103, 1691, 1988, 3243, 3266,3414, 3519, 3606, 3629, 3824]. Guidelines[1130, 1335, 1355, 2029, 3161, 4085]. guilty[191, 242]. Gumblar [2934, 3035]. guru[1998, 2563].

H [362, 1619, 3844]. H-P [362]. Haaster[3864]. habits [3786]. Hack[734, 1310, 1626,1814, 1831, 1856, 2249, 2274,3022, 3053, 3181, 3653, 3871, 3956, 4260, 4312].Hacked [1383, 1535, 1601, 1951, 1980, 2051,2765, 3717, 4271]. Hacker[57, 88, 153, 170, 189, 190, 212, 262, 297, 619,803, 1090, 1253, 1270, 1373, 1582, 1687, 1992,2053, 2066, 2285, 2465, 2517, 2549, 3280, 3295,3380, 3720, 3813, 3927]. Hacker-proof[619, 1090]. hacker-tracker [212]. Hackers[22, 106, 214, 237, 240, 299, 311, 324, 326, 433,607, 656, 750, 786, 804, 857, 906, 914, 975, 1002,1059, 1321, 1395, 1468, 1485, 1520, 1536, 1538,1617, 1625, 1670, 1719, 1742, 1753, 1820, 1865,1889, 1920, 1921, 1949, 2122, 2152, 2292, 2402,3111, 3204, 3225, 3284, 3285, 3354, 3410, 3579,3623, 3764, 3845, 3867, 3884, 3924, 3985, 3991,4030, 4107, 4247, 4348]. Hackers/viruses[1468]. Hacking [393, 409, 582, 777, 870, 1041,1129, 1667, 1839, 2012, 2206, 2588, 2862, 2912,3039, 3082, 3119, 3164, 3277, 3305, 3384, 3441,3466, 3476, 3477, 3619, 3646, 3675, 3717, 3730,3778, 3912, 4035, 4126, 4129, 4238]. hacks[1470, 3360, 3380]. Hacktivism [3234, 3703].Hacktivists [2079, 3293]. Hades [1898].

Hagen [3352, 3353]. half [3172]. Halifax[2468]. Hallem [3503]. halt [1424]. halves[1836, 1857]. hampered [613]. hand [4344].hand-in-hand [4344]. Handbook[3295, 3720,3813, 4008]. handheld[1498, 2584]. handhelds [1249]. handle[2, 4090]. handler [823]. Hands[11, 3092,3817]. Hands-on [3092]. hang[2338]. happen [1326, 1920, 2436].happening [1240]. happenings [1762].Happens [1460]. Happy [1858]. hard[1850, 2382,3643, 3676, 3896, 4043].hardback [3444]. hardball [2490].hardcore [3703]. harder [2050]. hardest[1077]. Hardware[636, 1501, 1891, 3896, 3981].Hardware-based [1891, 3981]. Hardy[3772]. Harlan [3334]. Harmful [2110].Harrington [3679]. Harris [643]. Harvey[4087]. Hathaway [2945]. hats [2845]. haul[3601, 4168]. Having [723]. Havoc[1766, 2755]. Hawkins [2084]. Haxor [1814].Hazards [80]. HDD [3428]. HDLC [338].HDLC/SDLC [338]. head [1158]. head$[2193]. Headline [1420, 3883].headline-grabbing [3883]. headlines[2543]. healing [65]. Health [10, 1280, 1575].Healthcare [2958, 3439, 3748, 3817, 3960,3979,4074, 4290, 4345]. heart [2559, 4011].Heartbleed [3563, 3572]. heat [3582].heated [343, 3332]. heating [1036]. heavily[697, 929]. Heinemann [3998]. held [2712].Helix [3503]. hell [3133]. Hellman[396, 888]. Hello [1863, 4276]. help [537,1339,1520, 2218, 2824, 3077, 3354, 4047, 4070].Helping [2218]. Helps[78, 255, 855, 1637, 3925]. Henry[3783, 3784,3804, 3814, 3823, 3845]. Herdict[2709]. Here [1530, 1618, 1928, 2510, 2913].heterogeneous [3755]. Hewlett[1257, 1967]. hi [2308]. hi-jacker [2308].Hidden [1893, 2985]. hide [1900, 3846, 4190].Hiding [2862, 3933]. hierarchical [3257].hierarchy [1743, 2420, 3049]. High

Page 23: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

23

[44, 59, 62, 72, 96, 667, 696, 733, 852, 1128,1579, 2142, 2262, 2929, 3218, 3573]. high-end[696]. high-level [2929]. High-profile[3573]. High-Publicity [1579]. High-rise[44]. High-speed [72]. High-tech [59].Higher [3142, 3218]. Highest [2226, 3854].highjackers [1761]. highlights[1109, 3101, 3230, 3350, 4157]. highly [4224].highway [119]. hijack [4167]. hijacker[889]. hijacking [183]. Hillegass [3771].hindered [677, 1495]. hindrance [4070].hire [433]. hires [480]. Hiring [3867].Hiscox [4210]. History [34, 388, 3977, 4010].Hit [750, 786, 1059, 1100, 1571, 1613, 1653,1982, 2245, 2694, 2845, 3293, 3361, 3422, 3592,3666, 3974, 4035, 4043, 4254]. Hit-List [1613].hits [797, 1111, 1563,1759, 3739, 3909, 4290].hitting [2050]. HMRC [4086]. hoax[187, 276, 591]. Hoaxes [661, 1875]. hold[1566, 4365]. Holden [3922]. Holding[2566, 3805, 3838]. holds [228, 2835]. Hole[513, 751, 1633, 1666, 1752, 1872, 2447, 3061,3082, 3422]. Holes [216, 315, 346, 369, 390,407, 430, 452, 471, 492, 506, 527, 549, 566, 586,602, 676, 1306, 1900, 2036, 2169, 2179, 2196,2210, 2220, 2238, 2265, 2290, 2304, 2317, 2368].holiday [1865]. holistic [2678, 3429].Hollywood [1965]. Holmes [4009].Holographic [789]. Holt [3988]. holy[3777]. Home[42, 1085, 1518, 1842, 2620, 2747, 2844].Homeland [1783, 1966,2191]. homepage[608]. homework [2140]. Honey[1957, 3010]. Honeynet [1742]. Honeynets[2142, 2316, 2639]. honeypot[1963, 2051, 2124, 2142, 3046]. Honeypots[2006, 2130, 2131]. Hong [1219]. Honig[3392]. Hooda [3209]. hook [2477]. hooked[2590]. hooks [386]. hope [2364, 2739].hopefuls [4209]. horizon [2232]. horror[1733, 1870]. horse [738, 771, 1100, 1123].Hosmer [3614]. Hospitals [3801, 3810].Host [28, 1127, 1543, 3486]. Host-based[1127, 3486]. hostage [3875]. hostile

[914, 3308]. Hosting [1835, 3059, 3586].hours [3035]. House [2257]. How-to [3435].Howling [1766]. HP[395, 436, 457, 517, 555, 574, 630, 936, 1027,1120,1172, 1198, 1340, 1615, 1907, 2267].HP-UX [395, 555, 1027, 1120,1172, 1198].HSBC [2534]. HTML[832, 1844, 2002, 3045]. HTML-driven [832].HTML5 [3658]. HTTP [1181, 2117].HTTP-Based [2117]. httpd [694].HTTPS [3743]. Huawei [4184]. Human[471, 2337, 4346]. Humans [448, 2734]. hunt[2121, 2255]. Hunter [2448, 3287]. Hunting[2441, 3948,3983, 4227]. hurt[2273, 2287,3724]. Hutchens [3668]. Huw[3252]. Hybrid [1941, 3045, 3168, 4355].Hybris [1563]. hype [1733, 2739, 3240].Hyperbole [1598, 2017]. hypervisor [2871].hypervisor-based [2871]. hyping [3927].

IAAC [1802]. Iain [3976]. IAM[3621, 4226]. IBM[9, 40, 140, 196, 386, 470, 702, 724, 943, 1051,1247,1272, 1344, 1565, 1825, 1829, 1904, 2214,2335,2603, 2733, 4316, 4375].IBM/ObserveIT [4316]. ICAF [1802].ICE T [592]. ICL [251, 1126].ICL/TimeStep [1126]. ICSPA [3524]. ID[355, 1863, 2636, 2743, 2761, 2981]. IDC [489].idea [585, 2822]. ideal [4264].Identification [1830, 1906]. identifies[639, 1324]. identify [3071]. Identifying[3510, 3795]. Identity [1644, 1958, 2335, 2337,2465,2466, 2506, 2580, 2629, 2630, 2794, 3144,3321,3438, 3532, 3662, 3733, 3742, 4380].identity-as-a-service [4380]. IDN [2393].IDS [1924, 2067, 2093, 2124, 2289,2347, 2411,2421,4048]. IDSs [1848]. IE[1488, 2114,2386, 2544, 3042]. IE5 [1283].IE7 [2587]. IEEE [2940]. If [2140, 3691].ifconfig [822]. Ignorance [1769, 2381]. II[55, 1832,1857, 2009, 2128, 2131]. III [295].IIoT [4236]. IIS [513, 1725, 1765]. IKE[1202]. Illegal [775, 2481]. illicit [3973].

Page 24: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

24

ILOVEYOU [1453]. IM [2668]. Image[639, 1254, 1715,1908]. images [25].Imaging [3955]. IMAP [710]. Imminent[4110]. Impact [432, 1509, 1548, 2558, 2958,3298, 3467, 3659, 3967, 4058, 4237].Impending [3791]. Implementation[877, 1182, 1956,2818, 3105]. Implementing[2465, 2832]. implications[1744, 2130, 2444, 2706, 3437, 3455, 3847].Importance[1677, 1678, 1891, 2250, 2966, 3512, 3670, 4285].Important [1438, 2168, 3011, 3354, 3896].impressive [886]. Improve[793, 1697, 1866,1911, 2832, 3959]. Improved[46, 257, 766]. improves [1297]. Improving[491, 1092, 3378]. IMSI [3912]. In-session[2914]. in-the-wild [3046]. Inc. [373].incarnations [3858]. Incident[566, 586, 1294, 2157, 2328, 2462, 2542, 2608,2642, 2748, 2772, 2873, 2966, 3029, 3545, 4099].Incidents [1579, 1778, 2626, 4022].incorporated [1086]. incorporates [539].Increase [393, 610, 638, 1518, 2935, 2981,3121, 3342, 3371, 3552, 3634, 4334, 4359].Increased[16, 260, 972, 1420, 1430, 1726, 3459].increases [196, 2637]. increasing[3076, 4309]. increasingly [2968].independent [600]. index [3534]. India[91, 2437, 3072]. Indian [260, 1513, 1590].Indianapolis [1482]. indicators [4295].indicted [2692]. indictments [4129].indicts [3582]. Industrial[111, 874, 3561, 3619, 3678, 3916, 4257, 4264].Industry [367, 725, 1520, 1536, 1575, 1651,1806, 2008, 2010, 2022, 2156, 3501, 3502, 3745,3953, 4216, 4273, 4340]. inevitable [2903].infected [1869, 2811]. infecting [557].infection [771, 2980]. infections[2959, 3121, 3302]. infested [3089].infiltrating [4162]. infiltration [2716].infinity [2406]. InfinityBlack [4349]. Info[205]. Info-Terrorism [205]. Infohighway[245, 278]. Information [119, 176, 210, 368,

455, 465, 473, 502, 530, 564, 813, 838, 859, 880,1020,1039, 1083, 1192, 1196, 1259, 1277, 1328,1346,1369, 1655, 1858, 1945, 1947, 2084, 2133,2152,2339, 2708, 2748, 2770, 2842, 2972, 3069,3084,3163, 3190, 3347, 3406, 3460, 3499, 3520,3537,3615, 3699, 3702, 3766, 3949, 4008, 4203].infosec [1175, 1718,1790, 1813, 2320, 2426,2563,2616, 3804]. infosecurity[1892, 2092,3505]. Infowar [1175].infrastracture [8]. Infrastructure[726, 773, 1200, 1261, 1576, 1774, 2061, 2499,2977,3080, 3342, 3523, 3924, 4012, 4013, 4038,4155,4204]. Infrastructures [1417].infringements [2, 1194]. initiative[121, 725, 1429, 3992]. initiatives [4207].Injection [2002, 2527, 2536, 2760].injections [2738]. inky [2756]. INN [806].Innovation [3936, 4200,4344]. inoculation[1517]. inquiry [458]. Ins [1789]. insecure[511, 2144, 2270, 3364, 3596]. insecurities[973, 3474]. insecurity [215, 347, 489, 3254].Insider[2784, 3633,4098, 4221, 4316, 4341, 4367].Insight [2076, 2086]. insights [1710].Instant[1871, 1934,2233, 2416, 2577, 2644, 3435, 3486].Instilling [4079]. institute [3368, 4185].institutions [1704, 3919]. insurance [1496].insurers [735]. Integralis [339, 462, 987].integrate [386]. Integrated[485, 743, 1031, 1127, 1184, 2276, 2413, 2772].integration[1003, 1030,1160, 1302, 1385, 2042, 2111, 2446].Integrity [125, 336, 705, 2975, 3546, 4067].Intel [1850, 3100, 4323]. intellectual[268, 294, 3914]. Intelligence[325, 1640, 1882, 2100, 2808, 3681, 3730, 3735,3803,3925, 3937, 3980, 4070, 4146, 4239].intelligence-driven [3735]. Intelligent[1129, 1456,1937, 3609, 3673, 4069]. intent[3158]. interaction [3046]. Intercept[3977]. interception [1545, 2679].Interchange [318]. interest [219].interface [2795]. interim [4017]. Internal

Page 25: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

25

[24, 424, 686, 1896, 2430, 2491, 2613].Internals [3710]. International[246, 799, 1514, 1563, 1691, 3444, 3524].Internationally [1639].Internationally-Minded [1639]. Internet[36, 37, 39, 62, 87, 90, 140, 157, 195, 196, 200,213, 219, 221, 222, 224, 226, 243, 244, 246, 252,257, 282, 305, 331, 334, 339, 352, 378, 379, 384,385, 400, 423, 444, 447, 457, 460, 465, 481, 486,501, 515–517,537, 538, 542, 573, 574, 610, 612,613, 618, 620, 621, 635, 637, 638, 640, 641, 646,659, 681, 682, 693, 712, 719, 738–740, 761, 783, 793, 825, 829, 833, 847, 848, 853,910, 916, 1004, 1104, 1617, 3323, 4120].Internet [19, 54, 78, 100–102,122, 142, 263,264, 291, 293, 313, 315, 346, 347, 369, 390, 407,409, 428, 430, 452, 471, 492, 506, 527, 549, 550,564, 566, 586, 601, 602, 623, 627, 649, 690, 918,973, 1015, 1016, 1045, 1050, 1071, 1079, 1101,1143, 1221, 1250, 1321, 1328, 1343, 1346, 1362,1363, 1376, 1401, 1450, 1469, 1483, 1493, 1539,1641, 1691, 1717, 1744, 1798, 1861, 1983, 2070,2230, 2281, 2306, 2441, 2460, 2676, 3032, 3080,3203, 3432, 3456, 3484, 3531, 3599, 3602, 3745,3888, 3894, 4027, 4141, 4154, 4338]. Internet[2, 26, 31, 55, 112, 145, 163, 261, 449, 453, 493,508, 748, 775, 799, 824, 837, 939, 1024, 1042,1093, 1132, 1149, 1239, 1314, 1400, 1532, 1559,1576, 1656, 1763, 2054, 2336, 2364, 3684, 3869,3946, 3969, 3970, 4002, 4040, 4126, 4173].Internet-based [833]. Internet-borne[610]. Internet-enabled [501].Internet/intranet [517, 618, 621, 681, 918].InterNetNews [698]. Interpreters [510].INTERSHOP [1031]. Interview[2253, 3480, 3492, 3503, 3535]. intranet[517, 618, 621, 681, 686, 819, 918, 1003].Intranets [680, 740]. introduced [1501].introduces [699, 970]. Introduction[125, 2119, 2247,3497, 3508, 3520, 4009].intruder [1215]. intruders [1321, 1872].Intrusion [902, 920, 1032, 1127, 1256, 1345,1482, 1523, 1789, 1833, 1834, 1955, 1987, 2017,2073, 2181, 2243, 2246, 2300, 2717, 2850, 2861,

2951,2952, 3486, 4355]. intrusions [2234].Invasion [608, 2377, 2747]. invent [2460].inventory [1075]. investigates [1592, 2479].Investigating [3039, 3127, 3531].Investigation [1470, 2909, 3115, 3174, 3639].Investigations [3522, 3746, 3788, 4378].investigators [777]. Investigatory [3791].Investing [195]. Investment[428, 519, 1634, 2484, 2999]. invests[7, 71, 1825]. involvement [3070]. ioctls[822]. iOS[236, 1046, 1080, 1119, 1199, 3794, 3823]. IoT[3705, 3978,3986, 4021, 4044, 4057, 4091, 4123,4142,4145, 4150, 4151, 4157, 4161–4164,4171, 4192, 4201, 4248, 4344]. IP[128, 139, 183, 228, 373, 406, 506, 563, 589, 769,852, 1005, 1182, 1273, 1419, 1426, 1501, 1578,1647,2209, 2321, 2379, 2486, 2600, 3009, 3028,3502,3647, 3993, 4273]. IP-based [3502].IPCS [1443]. IpFrags [1834]. iPod[2529, 2728]. IPS [2181, 2289, 3004]. IPSEC[1202, 1290,2749]. IPSec/IKE [1202]. IPV6[1009, 3177,3209, 3235, 3279, 3352, 3353, 3455].IPX [769]. Iran [3459, 4230]. Iranians[4278]. IRC [105, 1100]. Ireland[808, 1542, 2085]. Irina [591]. IRIX[512, 653, 758, 823, 842, 882, 999, 1012, 1118].IronBridge [545]. IronWall [545].irrational [3887]. ISA [1473]. ISBN[3184, 3197,3209, 3210, 3221, 3222, 3232, 3243,3252,3253, 3266, 3276, 3277, 3287, 3295, 3304,3305,3326, 3327, 3344, 3345, 3373, 3374, 3383,3384,3393, 3413, 3414, 3425, 3435, 3444, 3454,3466,3476, 3477, 3509, 3519, 3555, 3614, 3657,3658,3668, 3678, 3679, 3689, 3699, 3700, 3710,3720,3741, 3742, 3751, 3752, 3761, 3771, 3772,3783,3784, 3794, 3813, 3814, 3823, 3824, 3833,3834,3844, 3845, 3863, 3864, 3873, 3881, 3891,3892,3901, 3911, 3922, 3955, 3956, 3966, 3976,3977,3988, 3998, 4008, 4009, 4065]. ISBN[149, 1178, 1482, 3334, 3352, 3353, 3363, 3392,3402,3403, 3730, 3731, 3803, 3804, 3933].ISDN [42, 256]. Islamic [1753]. ISN [1297].isn’t [2472, 3727]. ISO [2542]. iSolve [1504].

Page 26: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

26

ISP [600, 760, 1342, 1897].ISP-independent [600]. ISPs[750, 1335, 1649,2183, 3888]. ISS[1473, 2024, 2447, 2524, 2603]. ISSE [2605].issue [689, 1091, 3733]. issued [497, 687, 894].Issues [21, 221, 225, 981, 995, 1438, 1696, 2140,2192, 2209, 2740, 2767, 2866, 3042, 3323, 3385,3407, 3817, 4129, 4194, 4196, 4268]. issuing[1643]. ISTE [3742, 3834]. IT/OT[4102, 4113]. Italian [1744, 3974]. Italy[193]. ither [1619]. ITIL [2642]. ITSEC[479]. itself [3599]. ITT [468]. IV [345].IVES [137]. Ivy [2390].

J [3454]. Jabadoo [866]. Jabbusch [3305].Jack [3305]. jacker [2308]. Jail [2371].Jake [453]. Jakobsson [3901]. James[1763, 3519]. jamming [3357]. Jan [3383].Japan [657]. Japanese[299, 617, 1270, 1384, 2392]. Jason [3731].Java[475, 692, 731, 768, 770, 804, 809, 849, 877, 903,997, 1018, 1068, 1390, 1487, 3367, 3422, 3568].Java-based [1068, 1390]. JavaScript[398, 1326, 2759,3658, 4065]. Javier [3834].JCP [853]. Jeff [1617]. Jeffreys [3945].Jeffreys-Jones [3945]. Jelle [3864].Jennifer [3305]. jeopardized [945].Jeremy [3276]. Jessop [2082]. Jet [1284].jihad [3396]. Jim [3243]. Joanap [4167].job [188, 1964, 2343, 2631, 3067, 4112]. Joe[4065]. Joel [3678]. John [149, 1178, 2082,2523, 3326, 3327, 3524, 3700, 3933, 3976, 4008].join [314, 930, 1303, 1497, 1802]. joined[3877]. joined-up [3877]. Joining[2941, 4176]. joins [715, 788, 809, 830]. Joint[481, 558, 1011]. Jon [3492]. Jones [3945].Joseph [3853]. Josh [3476, 3477]. Joshua[3414, 3824, 3922]. Journalists [582, 3460].JPEGS [1940]. jScript [1045]. Judge[262, 2481]. judges [67]. July [4099]. jump[4010]. Juniper [3780]. Junk [1636].Junkie [4]. Jurisdiction [1093, 1532]. Just[1239, 1599, 1766, 2006, 2152, 2385, 2584, 3364,

4020,4201]. Justice [1261, 2652]. Justin[3668, 3689].

Kali [3604]. Kaminsky [2848]. Kane [642].Karamanian [3210]. karma [604].Karyotis [3844]. Kaspersky[2824, 3633,3696, 4257]. Kaufman[3197, 3844]. Kaufmann [3402, 4008].KCMS [554]. Kearns [3243]. Keep[78, 149, 284, 1716, 3588, 4332, 4368].Keeping [120, 2396, 2542, 2611, 3670, 3711,3895,4365, 4366]. keeps [712, 1560, 1978].Keith [3657]. Kennedy [3243]. kept[414, 3501, 3618]. Kerberos [142, 469, 1444].Kernighan [3911]. Kevin[185, 819, 2084, 3413, 3845]. Kevvie [3873].Key [104, 413, 414, 478, 579, 593, 595, 665, 695,797, 814, 909, 929, 931, 938, 993, 1014,1022,1035,1364, 1398, 1417, 1507, 1544, 2632, 2699,3057,3469, 3693, 3766, 3769, 3789, 3836, 3960,4164,4319]. Keyboard [3933]. keychain[2830]. Keyloggers [2687, 3126, 3226, 4320].keys [387, 1817, 3126]. keystroke [2147].Khouzani [3844]. kid [4014]. Kido [2913].Kids [1637, 1688]. Kilger [3988]. Kill[932, 2162, 3348]. killed [1537]. King [2085].kingdom [1663]. kiss [3714]. kit[1205, 2795]. kits [532]. Klein [3287]. Klez[1919]. KMPG [3482]. Knapp [3678]. knife[2862]. knocked [3228]. Know [1617, 1861,1950,2043, 2127, 2273, 3618, 3827, 3945, 4165].Knowing [2914, 4103]. known[388, 1374, 1679, 2863]. knows [2086]. Kong[1219]. Korea [214, 2957, 3653, 4025, 4167].Korean [4158, 4351]. Korn [652].Kournikova [1758]. KPMG [480, 4087].Kristin [3772]. Kumar [3730]. Kyas [799].Kyrgyzstan [2899].

L0phtCrack [1668, 2965]. Lab[25, 1239,1506, 2982, 3435]. Labs [951]. Lack[1208, 1358,2042, 2111, 3602]. lacking [1512].LaMacchia [114]. LAN[17, 28, 46, 108, 110, 123, 132, 139, 371, 449,

Page 27: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

27

521, 577, 1275, 1339, 1893, 2043, 2526].LAN/WAN [108]. land [1570]. Landscape[1979, 2418, 3546, 3568, 3736, 3915, 4293].Langill [3678]. language[398, 628, 730, 1233]. LANs[14, 227, 1888, 2069, 2609]. Lantern[1817, 1843]. lapses [366]. Laptop[2193, 2868, 3360]. Large[783, 858, 1476, 1668, 2066, 2940, 4301].large-scale [2940]. largest [2492]. Larry[3197]. Laser [123]. last[1514, 1963, 2384, 3319, 3920]. Latches [1327].late [2023]. latency [3125]. Latest[128, 307, 685, 805, 870, 1901, 2014, 2408, 3381,3687, 3708, 4254]. Latin [1200]. launch[93, 2933, 3612]. Launched[49, 700, 742, 1083, 1250, 1389, 1411, 1693,1712, 1721, 2142, 3013]. launches[48, 544, 600, 702, 853, 1427, 1451, 2112, 2202,2703, 2733, 2789, 2910, 3014, 3260, 3879, 4044].Laundry [1579]. Laurent [3742]. Law[232, 269, 1586, 2146, 2556, 3444]. lawful[2679]. laws[795, 1173, 1309,1587, 1647, 3460, 3861].Lawsuit [1636, 1722]. Lawyers [1395]. lax[17, 266, 1015, 2684]. Layer[371, 2488, 2771,2940, 3471]. Layered[1574, 3306, 4152]. layoffs [1641]. Layton[3803]. ld.so [801]. lead [1441, 3848]. leader[1104]. Leaders [725, 1944, 2435]. leading[3986]. leads [2255, 3539, 3572, 4119, 4145].League [2390]. leak[85, 1952, 2879, 3643, 3952, 4334]. leaked[1367, 1907]. Leaks[3085, 3158, 3302, 3675, 3960]. leap [2332].Learn [1077, 1787, 2991]. Learned[688, 2049]. Learning[3176, 3191, 3291, 3658, 4135, 4203, 4355].learnt [1803]. least [3336, 3691]. leave[1015, 1084, 4283]. leaves[153, 2340, 3001,3181, 3563, 3856, 4218]. led[3576]. Lee [3363]. Left[511, 1559, 1634,4189]. legacy [2181]. Legal[167, 1132, 1149,1585, 1762, 1794]. Legally

[1084, 1437]. legislates [1625]. legislation[1021, 1271,1514, 3712]. legislators [795].legislature [10]. length [1014]. Lenin [755].Less [1679, 1959, 3707]. lesser [1679].lesser-known [1679]. lesson [330]. Lessons[688, 1077, 2049, 4135]. let [2285, 4020].Lethal [2329]. Letter [2141]. letters [126].level[138, 767, 850, 1279, 2226, 2366, 2929, 3446].levels [2498, 4181]. Levithan [3383]. Lewis[2523]. Liability [1194]. liable [1402].liberation [87]. Liberties [1511]. Liberty[2335]. Librarians [542]. libraries [730].libXt [729]. licence [396, 790]. license[1317]. Licensed [1786]. lid [2930]. Life[1863, 2001,2451, 3035, 3420, 3817]. lifecycle[4200]. lifts [1269]. light [1744, 2582].lightning [549]. Lights [1534, 3885]. Like[438, 1863, 2271, 3403]. likely [3641].limelight [1900]. Limited [807, 1617, 2252].limits [1209, 1292, 2598]. line[2229, 2451,3570]. lingering [2569]. lingua[4364]. Link[9, 180, 336, 826, 1088, 1624, 3330]. link-state[3330]. Linked [1194, 1876, 2480]. Linking[1313, 1675]. links [44, 194, 338, 483, 1360].Linux [684, 1154, 1182, 1490, 1653, 1680, 1755,1777,1869, 1922, 1935, 1995, 1998, 2299, 2300,3604,3666, 3668, 4337]. Lion [1652]. Liska[3881]. List [1613, 1712, 2319, 2583, 2879].LISTSERV [1464]. literature [1792]. little[427, 1094]. Living [552, 3513, 4199]. Lloyds[2477]. LLP [781]. loadable [1088].loadmodule [349]. lobby [1566]. Local[147, 895, 1379, 1489, 3801]. location [2175].Lock [414, 1090, 1841, 3469]. lockdown[2624]. locked [448]. Locking [3338, 3816].LOCKOUT [842]. Log[2176, 2462,2769, 2966, 3127, 3413]. logger[2147]. Logging [2015, 3413]. Logica [1105].logical [1833]. logically [1480]. login[842, 1080]. login/scheme [842].LOGINOUT [1028]. Logjam [3708].London [1888, 2481, 3977]. Long

Page 28: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

28

[400, 942, 3666, 3708]. long-term[3666, 3708]. longer[387, 1736, 3067,3095, 3406]. longstanding[3858]. Look [368, 938, 1196, 1508, 2100, 2453,2543, 2721, 3281, 3389]. looking[1928, 2913, 3479, 4224]. looks [647, 4267].Looming [1656, 3561]. loose [1372]. Lords[2712]. lose [340, 374]. loses [396]. Losing[1715, 3841, 4346]. Loss[2766, 3015, 3138, 3178, 3712, 3833, 4270].Losses [1420, 2754, 3112, 3227,4110]. lost[1430, 3456]. lots [2110]. lotteries [1314].Lotus [31, 356, 429, 721, 952]. louder [2530].Love [1435, 3191, 4124]. Low[634, 766, 1204, 2366, 2432, 3046, 3305, 3646].Low-cost [1204]. low-interaction [3046].Low-level [2366]. Lowdown [1701].Lowther [3305]. Ltd [1327, 1368]. Lucent[785, 2868]. Ludloff [3344, 3345]. Lumeta[2330]. lunch [2303]. lurch [2340]. Lurid[3260]. LYDownload.c [802]. Lynx [802].Lyons [3524].

M [1567, 1568, 1607, 3844]. M-commerce[1567, 1607]. M-spam [1568]. Mac[1715, 2419, 2516, 2550, 3026, 3312]. machine[692, 1298, 2314,2854, 4203, 4355]. machines[2928, 4259]. Macmillan [1482]. Macro[439, 488, 497, 596, 926, 1135, 3947]. Macs[3131]. made [144, 427, 1797]. Madison[3744]. maelstrom [369]. mafia [2836].Mafiaboy [1754]. magic [384, 1817, 1843].Magistrate [587]. magnet [1688].Magnetics [1368]. Mail [28, 79, 120, 126,148, 149, 152, 232, 288, 310, 394, 402, 514, 528,567, 581, 720, 736, 741, 834, 846, 851, 865, 874,932, 945, 949, 1099, 1157, 1164, 1177, 1388,1416, 1457, 1499, 1524, 1545, 1636, 1734, 4358].mailers [1226]. MailSafe [1368].mainframe [139]. mainframes [9].mainstream [3883]. maintain [3748].Maintaining [2570, 4330]. Major[194, 616, 1951, 2970, 3118, 3367, 3624, 3643,3810, 3888, 3974, 4063, 4232, 4315]. Makan

[3657]. Make[356, 623, 755, 1205, 1687, 2073, 3004, 3393,3559,3573, 3700, 3883, 3904, 4219, 4236].Make/O’Reilly [3393]. Makes[193, 771, 825, 1090, 1855, 1945, 2292, 2551,2878,3130, 3169, 3188, 3324, 3348, 3971].Making [334, 2084, 2938, 3416, 3482, 3628,3854,4066, 4286]. Malcolm [3956].Malformed [1229]. Maliciou [2088].Malicious [328, 1396, 1787, 1853, 2298, 2765,3053,3158, 3200, 3947, 4196, 4247, 4329].Malin [3988]. Malvertising [3739].Malware[1779, 2217,2325, 2327, 2471, 2487, 2619, 2666,2674,2707, 2713, 2763, 2785, 2798, 2808, 2892,2933,2981, 2993, 3000, 3015, 3052, 3057, 3089,3108,3213, 3216, 3312, 3341, 3387, 3392, 3479,3495,3519, 3538, 3539, 3570, 3696, 3713, 3787,3844,3909, 3935, 3947, 4068, 4212, 4224, 4328].Malware-infested [3089]. Man[2147, 3058,3339]. Man-in-the-Browser[3058]. Man-in-the-Middle [3058, 3339].manage [3627, 3942]. Managed[516, 1409, 1503, 1911, 1988, 2776, 3365, 3490].Management[121, 727, 754, 877, 931, 937, 1065, 1068, 1075,1930,1958, 2129, 2176, 2268, 2276, 2337, 2409,2462,2465, 2518, 2542, 2580, 2616, 2629, 2630,2632,2642, 2678, 2772, 2773, 2786, 2794, 2807,2819,2882, 2916, 3124, 3144, 3253, 3318, 3413,3500,3501, 3545, 3742, 3798, 3804, 3815, 3902,3917,3925, 3969, 4092, 4285, 4365, 4379].Manager [15, 699, 700, 899, 2411, 2972, 4228].managers [966, 1561, 1850,2626].Managing[648, 669, 689, 705, 727, 754, 774, 798, 817, 836,860, 879, 902, 921, 937, 955, 980, 996, 1011,1023,1040, 1053, 1073, 1091, 1114, 1133, 1148,1168,1176, 1189, 1209, 1224, 1240, 1259, 1277,1292,1311, 1380, 1678, 2117, 2762, 2797, 2805,3037,3069, 3134, 3408, 3662, 3734, 4163].Manual [3444]. manufacturer [11].Manufacturing [4233]. many[2, 229, 1848, 3707, 4150, 4179, 4260].

Page 29: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

29

mapping [4057]. March [2918]. Marconi[1607]. Marcus [3295]. mark [548]. market[6, 69, 117, 133, 333, 499, 617, 886, 1211, 1232,1289, 1384, 1428, 1630, 1719, 2092, 2630, 2703,3494, 4349]. Marketing [558, 1195,1598].marketplace [1158]. marketplaces [3973].Markets [3831, 4362]. Markus [3901].marriage [4124]. Marshal [2877].Marsicano [3772]. Martijn [3864]. Mary[3344, 3345]. Maryline [3742]. mask [3738].Masking [3631]. mass [117]. masses[2311, 2632, 2838]. Massive[421, 1644, 2980,3361, 3653, 4168].MasterCard [291, 461]. matching [2498].material [309]. Math [3752].mathematical [2406]. Mathematics[3922]. Mati [3243]. Matter[1727, 2949, 3178, 3480, 3651, 4213]. matters[3577, 4238]. maturity [4352]. maverick[3978]. Max [3988]. Maximize [1064].Maximizing [2661]. may [444, 477, 1173,1326, 1564, 1704, 2425, 3111, 3204, 3505, 3861].Maybe [1621, 3360]. mayor [2357]. MBR[2782]. McAfee [426, 550, 831, 871, 1594,2548, 2857, 2918, 3100, 3452]. McCain [1188].McDonalds [1627]. McFarland [3209].MCI [200]. McNeally [2514]. McVeigh[981]. MD5 [2890, 2907]. mean [1679, 3874].meaning [3148]. means[1331, 1618, 3141, 3835]. Meanwhile [1618].measures [318, 1400, 2867, 4361].Measuring [2998, 4125]. mechanics[2679, 2718]. mechanism [2940].mechanisms [508, 3298]. Media[706, 2412, 3784,3826]. mediation [1190].Medical [1673, 2690, 3548, 4268]. medium[706, 3849]. medium-size [3849]. meets[1285]. mega [572, 3017]. Mega-D [3017].megatrends [3467]. Melissa [1170, 1171].meltdown [4001]. meltdowns [3083].melting [1372]. members [2879, 3582].menace [2970, 3335, 3851, 4063]. mentality[20, 55, 295, 345]. merchants [1300]. mere[3154]. Merge

[479, 572, 928, 2096, 2261, 2877]. Mergent[247]. Merkle [396]. Merlin [384]. mesh[2940]. Message [287, 315, 706, 3274].Messages [149, 153, 741, 835, 932, 2826, 3052].messaging [69, 169, 598, 1285, 1871, 1934,2409,2416, 2577, 2644, 3648]. messenger[1055]. Meta [1010, 1025]. Meta-firewall[1010, 1025]. metadata [2697]. metal [4177].Metamail [757]. Metasploit[3092, 3243,3509]. Meteors [1561]. meters[2950]. method [3019]. methodology[472, 726, 3176]. Methods [975, 4077].Metric [1745, 1892]. metrics [2818, 3627].Mexicans [1540]. Michael[881, 3392, 3444, 3679, 3833]. Mick [3480].Micro [772, 1090, 2271, 4110, 4187, 4362].Micro-miniature [1090].Micro-segmentation [4187]. microchip[1314]. MicroLan [715]. Micron [1722].micropayment [716]. microscope [3548].Microsoft [75, 93, 158, 249, 288, 331, 356, 465,515, 547, 550, 575, 626, 736, 784, 788, 790, 855,942, 950, 960, 1044, 1153, 1159, 1174, 1245,1283,1285, 1297, 1298, 1320, 1340, 1341, 1344,1351,1473, 1488, 1535, 1596, 1666, 1671, 1687,1775,1841, 1901, 1904, 2034, 2039, 2125, 2160,2169,2213, 2242, 2255, 2283, 2340, 2374, 2384,2412,2469, 2479, 2490, 2563, 2587, 2605, 2606,2667,2756, 2777, 2866, 2876, 2895, 3184, 3185,3304,3411, 3422, 3425, 3564, 4325].Microsoft-Mail [288]. Mid [4293].Mid-Year [4293]. middle[313, 2924, 3058, 3285, 3339, 3361, 4278].Midian [2086]. Midyear [4110]. Migrating[1016, 2247]. migration [3177, 4343].migrations [3723]. Mike [3384, 3466].milestone [3958]. Military[429, 850, 1041, 1223, 1401, 1761, 3207, 3423].Military-level [850]. Millennium [1581].Miller [3853]. million [374, 745, 1192, 1252,1583,1609, 2122, 2230, 3495, 4374]. Millions[3563, 3831,4218, 4242]. millisecond [1168].MIME [673, 834, 1055]. Mimecast [4222].MIMEsweeper [720]. mimic [2836]. mind

Page 30: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

30

[3093, 3124, 4368]. Minded [1639]. minds[3939]. mine [39]. miniature [1090].minimise [3967, 4058]. minimising [3567].Ministry [843]. minor [2097]. Minute[2031]. minutes [1737, 3238]. mirror [1710].mirroring [1685]. MIS [1602].Misconceptions [52, 2017]. Misenar[3414, 3824]. Misimpressions [1914]. miss[3378]. misses [953]. Mission [1471, 2452].Mission-critical [1471]. Mistakes [2091].misunderstood [2410]. Misuse[1475, 1785, 2280, 3826, 4372]. mitigate[3659, 4309]. Mitigating [3257, 3407, 4032].Mitigation [2101, 3278, 3595, 4078].mitigations [3387]. Mitnick [154, 185].mixed [158, 769, 2917]. mmap [962].Mnemonics [2180]. Mob [1481]. Mobile[6, 43, 218, 333, 1110, 1319, 1359, 1360, 1484,1498, 1650, 1699, 1721, 1787, 1796, 1973, 2216,2288, 2355, 2398, 2568, 2589, 2619, 2707, 2710,3037, 3114, 3188, 3202, 3237, 3241, 3298, 3308,3335, 3364, 3371, 3408, 3448, 3474, 3495, 3503,3509, 3544, 3552, 3553, 3638, 3640, 3686, 3696,3720, 3785, 3823, 3833, 3912, 4037]. mobility[1396, 3439]. mode [80, 606]. model[793, 2069, 2563,2709, 2952, 2982, 3291].Modelling [2895, 4049]. Models [3844].modem [707, 811]. modems[418, 1238, 1550]. Modern[2796, 3298, 3546, 3690, 3844, 4089, 4365].module [732]. modules [2821]. Moment[1808]. momentum [2375]. Mondex [716].monetisation [4214]. Money[1584, 2551, 3095, 3696]. Monitor[1550, 1649, 1726, 1983, 3236]. monitored[237]. Monitoring [136, 148, 893, 1113, 1167,1251, 1349, 1529, 1613, 1936, 2054, 2360, 3289,3386, 3546, 3626, 3672, 3934, 4342]. monitors[2523]. monopolies [99, 160]. Monroe[2919]. Monster [4254]. monster.com[2720]. Month [1831, 1856, 3808]. months[1754, 2842]. Moon [1766]. Moraes[3221, 3222]. Morgan[3197, 3402, 3844, 4008, 4065]. Moroccan

[2458]. Moskowitz [3998]. Most[312, 767, 1420, 1955, 2592, 2765, 3241, 3308,3364,3394, 3895, 3899, 3909, 4379].most-attacked [3241]. motion [2601, 3490].motivates [57]. motivations [3068].Motorola [251, 253, 255, 519]. mountd[1081]. mounting [3237]. mouse [535, 3038].Move [116, 1981, 2239, 2537, 3735].movement [1647, 3323]. Moves [193, 356,450, 952, 1037, 2171, 2523, 2531, 2557, 3801].movies [1604]. Moving[2045, 2986,3418, 3576, 4368]. Mozilla [2811].MP [2436]. MPack [2695]. MPs [2280].MS [1824, 2071, 2136, 2344]. MS-SQL[2071]. MSBlaster [2164]. Much [1893].muffin [2612]. Mullen [3304]. Multi[599, 713, 744, 745, 831, 1220, 3059, 3306].Multi-discipline [599]. multi-layered[3306]. multi-million [745].multi-platform [713, 1220].multi-tenanted [3059]. Multi-tier[744, 831]. multifunction [2521].multimedia [73, 75, 250, 2581]. multimodal[2633]. multinational [2797]. Multiple[983, 1064]. multiplies [3705]. multiply[3474]. Muninder [3209]. munition [231].murder [777]. Music [1520, 1604]. must[3417, 3915]. muzzles [1539]. MVA [1911].MVS [125]. mwcollectd [3046]. My[1663, 1863,2302]. MyDoom[2219, 2235,2296]. MyNet [546]. MySQL[3658]. mystery [1147]. Myth[2191, 2204,2299].

NAC [2476]. Nachreiner [3535]. NAFTA[1022]. NAI [1449, 1752]. Naked [1632].Name [325, 576, 987, 1055, 2648, 4115].names [942]. Naming [104]. Nance [3956].Napster [1618, 1772]. Narayanan [3853].NAS [2248]. NASA [1980]. Nash [4087].nasty [2695, 3762]. Natas [175]. Nate[3771]. Nation [2030, 3989, 3990, 3999, 4000,4138,4331, 4358, 4371]. Nation-state[3989, 3999,4000, 4138, 4331, 4358, 4371].

Page 31: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

31

National [1357, 1469, 1506, 1804, 1830, 1993,2417, 3841, 3924, 3963, 4013, 4038, 4132].Nations [4312]. Nationwide [91]. Native[1067]. NATO [1285, 3461, 3611]. Natural[730]. navigation [3683]. Navigator[609, 778, 805]. nCipher [930, 2153]. NCSA[584, 701]. NCSC [3996, 4245, 4266, 4281].NDR [3048]. NDS [1174, 1912]. near[3378]. near-miss [3378]. Nearly[3172, 3553, 4006]. necessarily [219].necessary [4092]. Necurs [4325]. Need[1009, 1587, 1866, 1914, 2280, 3877, 4048, 4081,4124, 4240, 4356]. needed [1606, 2919].needing [638]. Needs [192, 852, 1137, 1138,1973, 2225, 2420, 2797, 2992, 3240]. negative[2655]. neglected [3245]. Negligent [1801].negotiates [303, 365]. Negotiating [3036].neighbour [883]. neighbourhood [3773].Nerd [3771, 3772]. Net[51, 67, 92, 116, 124, 215, 281, 290, 316, 328,342, 356, 380, 431, 482, 840, 889, 982, 1105,1241, 1252, 1590, 1688, 1738, 1827, 1832, 2264,2368, 2450, 2496, 2649, 2801, 2888, 3682, 3789].NetConnect [415]. NetCop [309]. Netect[934]. Netherlands [1782].NetRegulation.inconfusion [1072].NetScan [970]. Netscape[224, 297, 304, 307, 320, 360, 366, 480, 481, 559,609, 713, 718, 778, 805, 854, 1228, 1267].NetScreen [1008, 2243]. NetSec [1960].Netsolve [600]. NetSP [16]. NetWare[9, 32, 155, 178, 523]. NetWitness [2878].Network [43, 50, 94, 98, 121, 136, 141, 162,184, 203, 208, 225, 234, 249, 251, 254, 266, 269,283, 308, 336, 359, 383, 390, 404, 422, 425, 427,455, 500, 502, 518, 526, 642, 689, 743, 773, 831,833, 893, 895, 928, 1040, 1061, 1068, 1113, 1114,1133, 1137, 1147, 1167, 1189, 1292, 1438, 1458,1655, 1741, 1745, 1828, 1833, 1859, 1943, 2000,2001, 2003, 2021, 2028, 2060, 2072, 2085, 2138,2225, 2251, 2411, 2497, 2521, 2631, 2663, 2716,2750, 2872, 3061, 3125, 3267, 3508, 3626, 3660,3668, 3678, 3775, 4028, 4359]. network[1, 24, 82, 143, 166, 344, 367, 371, 388, 389, 432,

491, 495, 565, 648, 669, 705, 727, 754, 774, 798,817, 836, 860, 879, 902, 920, 921, 933, 937, 955,976, 980, 996, 1011, 1023, 1041, 1053, 1054,1073,1075, 1091, 1092, 1127, 1131, 1139, 1146,1148,1168, 1176, 1209, 1224, 1240, 1251, 1256,1259,1277, 1279, 1280, 1288, 1306, 1311, 1324,1330,1494, 1917, 1924, 2248, 2276, 2324, 2330,2366,2376, 2405, 2455, 2496, 2613, 2664, 2906,2952,3091, 3104, 3105, 3232, 3256, 3281, 3299,3310,3321, 3469, 3534, 3560, 3753, 3829, 4096,4202,4250]. network [158, 182, 871, 1144,1337,2517, 2721, 2752, 3297, 3936, 4342].network-based [3560]. Network-related[269]. Networking [96, 539, 719, 1205, 1518,1807,2617, 2870, 3259, 3639, 4031]. Networks[23, 65, 76, 77, 81, 97, 99, 147, 258, 268, 294, 353,424, 543, 563, 597, 616, 667, 741, 769, 816, 971,1005,1041, 1202, 1236, 1255, 1578, 1654, 2108,2422,2505, 2690, 2730, 2747, 2836, 2930, 2940,2974,2997, 3009, 3028, 3081, 3115, 3197, 3209,3212,3244, 3257, 3270, 3430, 3439, 3557, 3620,3755,3807, 3844, 3942, 4057, 4091, 4149, 4248].Neumann [3731]. Newcombe [3363].newgrp [633]. NewLove [1421]. News[108, 390, 494, 560, 711, 806, 1795, 1845, 2012,3186,3198]. Next[442, 559, 580, 1944, 2151, 2474, 2902, 3355,3397,3445, 3490, 3500, 3764, 3814, 3924, 3937].Next-generation [3397, 3500]. NFC [3725].NFS [3407]. NHS [2958, 4016]. NIAC[2040]. Nicholas [3891]. Nicko [2153].Nicolson [3977]. NIDS [1833]. Nightmare[1807, 1832,2060, 3883]. Nikhil [3209].Nikkel [3955]. Nikolay [3710]. Nimda[1759, 1779]. NIPC [1589, 1686]. Nirvana[1807, 4248]. NIS [511, 1013]. Nitro [3264].Nixon [3658]. No[909, 1736, 2342, 2595, 3067, 3095, 3232, 3243,3252,3287, 3392, 3403, 3406, 3689, 3700, 3710,3731,3752, 3761, 3794, 3813, 3846, 3863, 3887,3891,3892, 3955, 3966, 4286]. Nokia[1615, 4146]. Non [1567, 2444, 3096, 4205].Non-contact [1567]. non-disclosure[3096]. non-functional [4205]. non-US

Page 32: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

32

[2444]. nonsense [2938]. norm [4366].normal [3991, 4000]. Nortel [252]. North[2957, 3653, 4025, 4158, 4167, 4351]. northern[2512]. Norton [77]. Not-so-smart [2950].Note [1094]. notebook [1573]. notebooks[227]. notes [31, 182, 429]. nothing[2385, 3596]. notice [1264]. notices[305, 1208]. notify [2553]. novel [2987].Novell [29, 227, 282, 416, 1174]. Novelty[2074]. nph [694]. nph-test-cgi [694]. NSA[762, 1166, 1175,1638, 1726, 1777, 3473, 3484,3528, 3675, 3676, 3952, 4315]. NSF [2325].NSS [3195]. NT[425, 451, 487, 562, 577, 594, 626, 646, 734, 749,751, 769, 800, 815, 956, 989, 1019, 1067, 1089,1124, 1225, 1230, 1242, 1246, 1282].NT-based [769]. NTFS [2588].NtOpenProcessToken [800]. nuclear[25, 3993]. nude [25]. number[41, 59, 740, 1453]. numbers [1903, 2225].Numeric [2975]. nut [1834]. Nutan [3730].NY [1644]. Nynex [8].

Obama [2898]. Obfuscation [2828]. object[2998, 3049]. object-oriented [2998, 3049].OBS [2862]. obscurity [1679, 2442].ObserveIT [4316]. Obsession [1876].obstructs [878]. O’Connor [3454].October [2469]. Ode [1440]. Odyssey[1863]. Off [5, 311, 2930, 4259, 4271].Offensive [2733, 3468]. Offer[200, 282, 784, 847, 1062, 1261, 1745]. offered[500, 536, 744, 891, 1065]. offering [913, 1456].offerings [574, 1234]. offers[485, 490, 505, 772, 912, 914, 1243, 1304, 1362,1363, 1671, 4207]. office [683, 1204, 1637,1783, 1859, 2622, 2844, 3963, 4284]. officer[755]. officers [3506]. official [210].officially [3871]. offline [3228]. Offshore[2140]. O’Gorman [3243]. oil [3361]. Old[1331, 1419, 1851, 1997, 2373, 2785, 4199].older [4218]. olive [1536]. olive-branch[1536]. Ollie [3720]. Olympic [2513].omniguard [48]. On-LAN [577]. Once

[3373]. One[295, 329, 858, 1304, 1558, 1599, 1930, 1939,2519,3495, 3592, 3612, 4061, 4141, 4237].One-day [3612]. one-stop [2519]. one-time[295]. OneCare [2876]. Onion [1910, 2671].Online [10, 18, 61, 93, 111, 159, 176, 177, 280,284, 326, 327, 343, 417, 676, 707, 746, 891, 981,1078,1218, 1386, 1407, 1495, 1504, 1531, 1540,1637,1665, 1680, 1689, 1872, 2066, 2256, 2498,2524,2528, 2533, 2534, 2639, 2709, 2736, 2752,2836,2939, 2948, 3030, 3041, 3094, 3494].Only [1597, 2140, 4259]. ons [2411].Ontario [2767]. onto [102]. Open[520, 713, 867, 984, 1206, 1288, 1565, 1647,1673,1819, 1959, 2239, 2263, 2508, 2813, 3001,3276,3621, 3803, 3827, 3903, 4038, 4040, 4056,4075,4155, 4189, 4215, 4381]. open-source[1288]. OpeN/2 [520]. opened [482, 1447].opening [3686, 3936, 4202]. openings [804].opens [1488, 2039]. OpenSSH [1465].OpenVMS [1028]. Operating[416, 565, 571, 1679, 1939, 3713]. Operation[2100, 2921,3524, 4016, 4319]. Operational[1041, 4274,4307]. Operations[169, 2104, 3828, 3882]. operators [60].Opinion [2239]. opportunities [3258].Opportunity [3894]. oppose [1166]. optic[8, 44, 220, 2681]. optical [65, 72]. optimal[3439]. optimisation [2781]. Optimising[2985, 3917,4354]. option [2424]. Optional[2098]. Options [36, 167, 1312, 2113,2706].opts [1917]. Oracle[209, 363, 364, 431, 1312, 1900, 2412, 3526].Oracle7 [363]. Orange [479]. order [1774].Orders [1726]. O’Reilly[3344, 3345,3352, 3353, 3383, 3393, 3658].Organisation[2910, 3213,3855, 3883, 4079, 4375].organisations [3172, 3284, 3665, 3748, 3856,3960,4022, 4052, 4286]. Organised [4120].organization [1493, 1996, 2538, 2554].Organizations [129, 792, 1015, 2409].oriented [2998, 3049]. origin [1416]. OS/2[386]. OSF [476, 867]. OSF/1 [476].

Page 33: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

33

OSF/DCE [867]. OSSEC [3486]. OT[4102, 4113, 4273]. Other[981, 1395, 1618,3146, 3171, 3563, 3738, 4115].Othmar [799]. Our [1866, 2664]. ourselves[2218, 2395]. oust [2322]. out-number [740].outages [1101, 3775]. outbreak [2492].Outfoxing [241]. outlines [375, 1207, 2100].outlook [1055]. outmoded [2952]. Outs[1789]. Outsiders [991]. Outsmarting[3145]. outsource [860]. Outsourced[2360, 2475]. Outsourcing[389, 600, 1503, 2140, 2557]. outweigh [2326].over-hyping [3927]. over-run[631, 633, 908]. over-runs [964]. overcome[4343]. Overcoming [4101]. overflow[673, 759, 841, 1013, 1081, 1097, 1154, 1180,1378, 1464]. overflows [1151]. overhaul[1587]. overload [2084, 3491]. oversight[1243]. overstayed [2507]. overtake [28].overview [1263, 2419, 2863, 2929]. Own[367, 761, 975, 1827, 1911, 2506, 3427, 3558,3663, 3884]. own-goals [2506]. owner [639].owners [2968]. Oxford [4009]. Oxley[2444]. Oxymoron [528, 1640].

P [362]. PAC [3053]. Pacific [200]. pack[1020]. package [223, 1154]. Packard[1257, 1967]. Packet [346, 3232, 3944, 4039].packs [2695]. Packt [3435, 3509, 3657, 3668].Pagan [819]. pagers [165]. pages [101, 812].paid [2066]. pain [2469, 3318]. Pains [4087].pall [2743]. palm [1308, 1454]. PAM [4262].Panacea [1417]. Panda [3730]. PandaLabs[3451]. Pandemic [4341, 4356].pandemic-driven [4341]. Panel [660, 1726].panic [3367, 3623]. Panix [625]. PANs[1909]. paper [868]. paperback[3334, 3444, 4065]. Paradigm [1743].paradox [3715]. Paranoid [3364]. parasite[2327]. Parasites [2287]. Parasitic [2785].Parker [1178]. Parliament [3964].parliamentary [4155]. Parsing [1014].Part [55, 146, 168, 184, 208, 234, 268, 294, 295,315, 345, 346, 369, 390, 407, 430, 452, 471, 492,

506, 527, 549, 566, 586, 602, 604, 628, 648, 650,669, 670, 689, 705, 727, 754, 774, 798, 817, 836,838, 859, 860, 879, 880, 902, 921, 1010,1024,1025,1042, 1132, 1149, 1212, 1225, 1241, 1242,1328,1346, 1597, 1725, 1765, 1832, 1836, 1857,1931,1942, 2128, 2130, 2131, 2538, 2554, 2819,2861,3009, 4102, 4113, 4141, 4154]. partial[2959]. parties [3069]. Partly [1708].partners [1105]. Partnership[357, 988, 1016, 1126, 1140, 1201, 1448, 3149].party [919, 1436]. Pass [2844]. passed[2822]. Passenger [2199]. Passing [1915].Passive [870, 3829]. passport [2658].passwd [1122]. Password [146, 168, 295,443, 511, 631, 836, 1342, 2135, 2395, 2507, 2621,2751,2756, 2902, 3043, 3116, 3725, 3798, 4228].Passwords [56, 165, 229, 1000, 1876, 2041,2147,2463, 2504, 3103, 3157, 3796, 3816, 4332].Past [1599, 4043, 4093]. Paste [1079].PASV [1136]. Patch [2023, 2129, 2212, 2268,2469,2866, 2905, 2953, 3815, 4092].patch-fest [2469]. patched [2386, 2491].patches [322, 1874,2242, 2724]. patching[2285, 2969,4235]. patchy [709]. path[1180, 2301,3330]. Pathways [576, 662, 3514].patient [1280, 2958, 3439]. Patrick [3277].Patriot [2009]. patterns [1548, 2963, 3795].Paul [2085, 2086, 3803]. Pauli [3476, 3477].pave [2624]. paves [1231]. pay [1618, 3792].paying [3125]. payment[1031, 1307,1319, 4033]. payments[354, 486, 1780, 4334]. payouts [3899]. pays[1521]. PBX [206]. PC[29, 94, 519, 759, 1272, 1413, 1826]. PCCIP[1261]. PCI [3374]. PCMCIA [227]. PCs[814, 1318, 4244]. PDA[1606, 1826,2180, 2286]. PDAs [1784]. PDF[1736, 3051]. peace [3093]. Peachy [1736].Peacomm [2649]. Peapod [1033]. Pearson[1617]. Peekabooty [1667]. Peer[1618, 1954,1981, 2027, 2963, 3115]. peer-[1981]. Peer-To-Peer[1618, 1954,2027, 2963, 3115]. Peering[3818]. pegged [2944]. Peggy [3751]. Pen

Page 34: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

34

[2647, 4016, 4139]. Pen-testing [4016, 4139].pendulum [2070]. penetrate [240].Penetrating [3415]. Penetration[472, 817, 857, 1970, 2016, 2058, 2086, 3243,3276, 3277, 3435, 3509, 3555, 3594, 3604, 3606,3637, 3646, 3657, 4082]. penguin [1652].Pentagon [310, 1726, 1830, 2172]. People[1724, 1773, 2070, 3836, 4288]. performance[852, 1455, 3397,3660]. performing[97, 518, 1686]. Perils [2129, 3027].perimeter[2567, 3355, 3438, 3550, 3982, 4308].perimeterisation [2404, 2903]. perimeters[2021]. periodic [3226]. permission [394].permissions [1398]. perplexed [3629].Perry [3892, 3966]. Persistent[3070, 3236, 3567, 3692]. PersonaCard [103].Personal [846, 1558, 2979, 3246, 3638].perspective [370, 1055, 3069, 4307, 4378].Perspectives [1970, 2016, 2058, 2086].Pervasive [2369]. Peterson [3197].petition [1157]. petrol [1559]. Pfizer[2293]. PGP[52, 101, 504, 627, 697, 807, 1317, 1491]. pgs[3334, 4065]. phasing [2885]. phasing-in[2885]. phenomenon [3907]. Phillips[3413, 3772]. phish [2500, 4003, 4175].phished [2313]. Phishing[2264, 2368, 2468, 2477, 2590, 2637, 2685, 2910,2914, 2929, 2942, 3109, 3207, 4025, 4175, 4292].Phone [43, 45, 53, 63, 89, 99, 130, 218, 246,400, 412, 445, 737, 745, 748, 895, 985, 1108,1484, 1721, 2288, 2398, 3114]. phones[898, 1498]. photonics [7]. PHP [3658].phreaking [3214]. Physical[371, 2096, 2426]. physically [3799]. PI[1141]. pick [3775]. PICS [641]. Picture[2144, 2158, 2169, 2179, 2188, 2196, 2210, 2220,2238, 2265, 2290, 2304, 2317, 2751]. pictures[2329, 3653]. piercing [2975]. Pigeon [1723].pilot [310, 541]. pimping [3204]. pinch[1718]. ping [654]. Pinning [2568].pinpoints [2307, 2668]. Pinto [3295].Piracy

[60, 62, 83, 114, 191, 1603, 1965, 2222, 3293].Pirates [90, 275, 1191, 1738, 2121]. Pirc[3976]. Pitfall [1986]. pitfalls[2379, 2505,2526, 3447, 4379]. PIX [1466].pizza [1136]. PKI [965, 1017, 1140, 1159,1161,1183, 1184, 1211, 1220, 1263, 1302, 1320,1370,1393, 1404, 1410, 1412, 1418, 1427, 1564,1637,1764, 2438, 3210, 3825]. PKZIP [271].PLA [3582]. place [334, 3846]. places[1301]. Placing [2178, 3046]. plan[9, 910, 2022, 2040]. planned[332, 2226, 2245]. Planning[956, 3352, 3353, 3721]. plans[160, 177, 1337, 2363, 2814]. plasters [1666].Platform [679, 713, 1159, 1220, 1287, 1454,1635,2247, 2414, 2821, 3241, 3364]. platforms[3533, 3552,3801, 4275]. Platt [3393]. play[875, 1500, 1551, 2337, 3866]. Playboy [828].playboy.com [1820]. Player [2019].Players [2412, 3344, 3345]. Playing[2490, 3884]. plays [1008, 1667]. plc [2668].please [1863]. Plot [3956]. Plug[875, 1500, 1551, 2068]. Plug-and-play[1500, 1551]. pluggable [732]. Plugging[4102, 4113]. plugs [1549]. Plus [203, 1912].PMTU [1350]. point [663, 752, 1207, 1343,2203,2321, 2322, 2414, 3463]. pointed [2957].Points [2083, 2667, 3375, 3423]. poised[2370]. poisoning [2788]. PoizonB0x[1740]. Poking [1639]. Police [237, 343, 394,1590,1626, 2308, 2435, 2652, 3293, 3842].Policies [79, 147, 420, 775, 966, 1058, 1177,1478,2166, 2454]. Policy[292, 293, 408, 647, 843, 1006, 1021, 1188, 1369,1606,1945, 2568, 2927, 3001, 3611]. polite[22]. Political [1688, 1708, 1999, 4107, 4126].Politicians [1276]. politics [1036]. Poll[1805]. Ponemon [2779, 4185]. Poor[1773, 1929,2624]. poorly [2491, 3268]. POP[710]. popular [3119, 3364, 3617,3831, 3899].popularity [3324, 3552]. Porn[190, 272, 612, 1524, 1749, 1812, 2734].pornography [327, 1812,2564]. Port[437, 491, 1092, 1585, 1739, 2184, 4054].

Page 35: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

35

portable [2579]. portals [1409]. portfolio[253]. ports [3138]. PoS [4025]. Pose[1828, 2956, 4278]. posed [3045, 3903]. poses[148, 210, 1469, 1887, 3335, 3970]. positive[2884, 3211]. possible[498, 1938, 2274,2999, 3341, 3404]. possibly[3473]. post [1637, 1803]. postage [1250].poster [1648]. Postfix [1226]. postmortem[2205]. Pot [1957]. Potential[421, 1129, 1425,1930, 2480]. potentially[1641]. Potter [2083]. Power[681, 1557, 1727,3646, 4310]. Power-cached[681]. Powerful [1448]. Powergen [1467].Powers [2009, 3791]. PowerShell [3425].PPTP [1044]. Practical[2715, 2773, 3232, 3392, 3944, 3955, 3989, 4161].practicality [3663]. Practice[1451, 1702, 2117, 2494, 3626, 4137].Practices[1162, 2115, 2416, 2600, 2624, 4251, 4261].practitioners [3773]. Pragmatic[3363, 4065]. pranksters [881]. Pray [2068].Preacher [1992]. Preble [3771]. precedent[1672]. precious [3895]. predator [2529].Predators [1511]. Predicted [1101, 2136].Predictions [986, 2744, 3140]. predicts[2092]. Preemptive [933]. prefer [198].preferences [2411]. preferred [1574].preliminaries [1834]. premature [1952].Preparation [3873]. prepare [2647].prepared [2357]. prepares [2776].Preparing [1678, 3167, 3445, 3736]. present[3118, 4063, 4093]. Preserving [3059].President [1505]. Presidential [4209].Press [799, 819, 1907, 3209, 3210, 3221, 3222,3232, 3243, 3252, 3287, 3392, 3403, 3425, 3444,3689, 3700, 3710, 3731, 3742, 3751, 3752, 3761,3794, 3813, 3834, 3863, 3891, 3892, 3911, 3922,3955, 3966, 3988, 4009]. Press/Elsevier[3742]. pressed [459]. Pressure[88, 3605, 3825]. pressures [3106].prevalent [3909]. Prevent [774, 4238].Preventing [83, 2871, 3039, 3083, 3138, 4202].Prevention [737, 898, 1353, 2093, 2181, 2474,

2717,2966, 3178, 3854, 3865]. prevents[1273, 1475]. prey [2441]. Price[1728, 2193,2610, 3334, 3517, 4065]. prime[3324]. PrimeLife [2789]. Princeton[770, 1805, 3911, 3922]. Principal [2084].Principles [2189]. print[1308, 3352,3353, 3425, 3614]. Printers[1828, 3245]. printing [2521]. priorities[2455]. prioritising [4235]. priority[2172, 3142,3854, 4066]. Pritchard [3751].Privacy [10, 61, 595, 643, 981, 1163, 1195,1208,1217, 1280, 1405, 1515, 1580, 1586, 1592,1613,1691, 1692, 1714, 1829, 1863, 1936, 2257,2303,2398, 2840, 2948, 3023, 3344, 3345, 3385,3629,3669, 3837, 4194, 4380]. Private[120, 149, 197, 244, 502, 543, 719, 816, 1035,1288,1458, 1714, 3085, 3149, 3386]. Privatize[3509, 3544]. Privilege[899, 1268, 3336, 3501]. Privileged[3134, 3144,3447, 4101]. Proactive [2408].probably [232, 2766]. probe [1129]. probed[1820]. Problem[274, 551, 570, 778, 841, 907, 1620, 1708, 1724,1930,2199, 2235, 2609, 3456, 3495, 3949, 4062].problematic [3617]. Problems[21, 368, 401, 435, 616, 786, 1027, 1196, 1237,1618,2015, 2804, 2974, 3232, 3381, 3589].Procedures [147, 2505, 3575]. process[1228, 2997,3916]. Processes [1645, 4354].Processing [620, 3575]. processor [3105].procfs [821]. produces [1126]. Product[308, 382, 386, 600, 650, 659, 670, 744, 833,1162,1416, 1452, 2229, 2418, 4226].production [2741]. productive [4263].productivity [4251]. products[141, 342, 578, 743, 1232, 1382, 1729, 2111,2239,2322, 2354]. Profession [2375].Professional [3555]. Professionals[1790, 2425,3151, 3305, 4270]. Professor[668]. Profile [733, 1681, 3573]. profitable[444]. profiting [2052]. profits [1629, 3218].Proginet [9]. Program [119, 533, 632, 758,780, 944, 1310, 1887, 1957, 3699]. programme[143, 584, 742, 796, 830, 887, 2417, 2520].

Page 36: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

36

Programmer [3403]. Programmers [2046].Programming [80, 3402, 3771, 3772].programs [554, 823]. progress [4219, 4286].Project [313, 587, 1881, 2130, 2789, 3581].projects [4262]. promiscuous [80].Promise [228, 445, 1985, 2961, 3365].promises [2946]. promote [1139, 1299].promoted [43]. promotes [2867]. prompt[1080, 1400]. prone [2107]. pronounces[2373]. Proof [619, 1090, 1721, 2890].proofing [2464]. properly [1228, 2518].property [268, 294, 3914]. proposal[362, 739]. proposals [1261, 2257]. proposed[1529]. Pros [1278, 2226, 2616, 3020].Prosecute [1661]. prosecuted [275].Prosecutes [1809]. Protect [255, 881, 1191,1255, 1321, 1453, 1455, 1576, 1604, 1890, 2125,3394, 3557, 3743, 3914, 4069, 4263]. protected[767, 917, 1487, 3172]. Protecting[24, 1280, 1688, 1833, 2108, 2118, 2486, 2601,2995, 3084, 3146, 3246, 3248, 3307, 3310, 3469,3532, 3585, 3616, 4149, 4204, 4225, 4248, 4273].Protection[66, 76, 286, 402, 422, 443, 446, 524, 581, 597,637, 642, 645, 660, 669, 683, 772, 874, 914, 948,1011, 1061, 1087, 1195, 1305, 1369, 1448, 1498,1577, 1696, 1834, 1894, 1947, 1990, 2243, 2519,2539, 2851, 2868, 2902, 2944, 2952, 3175, 3449,3460, 3512, 3536, 3547, 3665, 4306]. protects[361, 563, 792, 813, 833, 989, 1020, 1218].Protek [1285]. protest [828]. protests[2079]. Protocol[315, 390, 542, 834, 853, 1699, 1938, 3969].protocols [2581, 3330, 3484]. proved [1559].provide [829, 1061, 1125, 1186, 1220, 1302,1356, 1386, 1608, 1689]. Providers[174, 440, 739, 1132, 1149, 1595, 3946].provides [659, 783, 890, 1035, 1106, 1107,1340, 1450, 1519, 3780]. Providing[567, 3905]. proving [2484]. provision [243].provokes [2388]. prowl [2889]. Proxies[2822, 3395]. proxy [3053]. ps [321]. psyche[3280]. psychology [3135]. psychos [881].PTK [2795]. ptrace [1247]. Public

[23, 210, 304, 413, 502, 665, 814, 938, 1364,1417,1507, 1579, 2306, 3149, 3728, 4164].Public-Key [413, 1507]. public-private[3149]. Publicity [1579]. Published[149, 3184, 3363, 4065]. Publisher [1178].publishes [827]. Publishing[1482, 3363,3373, 3435, 3509, 3657, 3668, 3956].Puerto [892]. punch [2695, 4247]. purchase[457]. purchasers [280]. purchasing [2485].purpose [3126]. push [2124, 2306, 4033].Pushes [10, 249, 253, 1830, 2374, 2658]. put[1059, 4117,4295]. puts [243, 261, 3605, 4170].Putting [229, 1055, 2691,3225, 4011].Pwn2Own [3055]. pwned [2915]. Python[3454, 3614,3689, 3752].

Q&A [3458]. Q1 [2791]. Q4 [4338]. Qaeda[3228]. qualified [2140]. quality [3715].Qualys [2401]. QualysGuard [2476].Quantitative [1083]. Quantum[1509, 1855,1974, 1985, 2153, 2440, 2561, 4114].quarter [703]. Quarterly [4099]. Que[1557]. queen [2118]. quest [3547].question [860, 2553]. questioned [911].Questions [1174, 2133, 3203]. Quick [2048].quicksand [3732]. Quiet [1975]. quite[1736].

R [3374, 3844, 3863, 4008]. Rabbit [4005].race [2406]. Rack [3449]. radar[3776, 4178]. Radicchio [1338]. Radio [281].rage [1967]. rages [967, 994]. Raggo [3833].railways [2809]. Rainbow [713]. raised[1256]. raises [626]. raising [45, 3458]. rally[625]. Rambus [1722]. ramifications[2652]. rampant [3517]. Ramsey [777].Ranch [3771, 3772]. range [3778, 3909].ranked [634]. ransom[2066, 2566,2835, 3517]. ransoms[3792, 3960]. Ransomware [3759, 3801, 3810,3851,3865, 3875, 3876, 3889, 3899, 3909, 3928,3967,3986, 4005, 4290, 4319, 4334, 4354].rants [493]. Rapid [6, 1385]. Raptor[578, 580, 785, 1063]. Rash [2114, 3086]. rate

Page 37: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

37

[766, 1775]. Rather [1809]. Raxco [48].Razor [2718]. RC2 [827]. RC5 [900]. rdist[556, 841, 1097]. RDP [4218]. re [2580].re-thinking [2580]. reach [1513, 4181].reached [575]. reaches [247, 377]. react[4022]. reactions [3528]. Reactor [1098].read [1487]. reader [1050]. Readiness[4210]. ready [1737, 1886, 3665, 4122, 4341].Real [650, 670, 1091, 1681, 1879, 2142, 2252,2440, 2563, 2793, 2886, 2928, 2936, 2940, 3020,3232, 3240, 3396, 3510, 3903]. Real-time[2940]. real-world [2936, 3232]. reality[2204, 2299, 4105]. Really[997, 1393, 2070,2235, 2783, 3011]. realm[1226]. reassembly [1426]. Rebecca [1482].rebirth [3214]. rebounds [3015]. receive[966]. receives [158, 1183]. recently [1641].recession [2956]. recognition [2808].recommended [611, 641, 1175].recommends [1726]. Reconnaissance[238, 2872]. record [4181]. records[794, 1673, 2556,2854, 4242]. Recover[3509, 3544]. recoverable [567]. recovery[94, 593, 595, 909, 929, 948, 969, 1022, 2363,3428, 3488, 4137]. Recycling [3008]. Red[955, 1733, 1746,1757, 2845, 3814, 3882, 4059].redefines [720]. redirects [3053]. Reduce[82, 1612, 3076, 3925, 4082, 4354]. reduced[1143]. reduces [1014, 4098]. Reducing[166, 1146, 3701,3755, 4058, 4318]. Reference[3185]. Reflection [1808]. Reflex[596, 1368]. reform [2280]. reformat [1867].Regin [3644]. registers [1921]. registrar[66]. registration [277, 1218]. registry[1398, 1570, 2636]. Regular [3383].Regulation [272, 611, 1619, 2174, 2424, 4123].Regulations [615, 636, 657, 787, 825, 1082,1195, 1367, 1403, 1805, 2343, 4192]. regulator[4188]. regulators [3344, 3345]. rejected[484]. related [269, 995, 4073]. relationship[4352]. Relative [1929]. Relativistic [798].relaxes [1058, 1382]. relaxing [825]. relay[198, 361, 502, 1186, 1236]. Release[1699, 1777, 1962, 2024]. released

[1130, 1732]. releases [1553]. Relevance[3693]. relevant [4114]. relief [1166].reload [1424]. remain[416, 2276, 3653, 3919]. remains [4313].remedies [3795]. remedy [2504]. Remote[21, 46, 345, 446, 664, 747, 818, 832, 873, 890,895, 913, 1046, 1124, 1204, 1464, 1489, 1597,1761,1869, 1903, 1923, 2253, 3310, 3337, 3714].remotely [3532, 4021]. remove [826].removed [946]. repair [746, 1306]. replace[1401, 2181]. replaced [1052]. Replacement[2011]. Replacing [2504, 3030, 3206]. replay[4032]. Report [136, 414, 979, 1053, 1104,1723,1784, 2152, 2280, 2626, 3423, 4021, 4099,4146,4157, 4159, 4210, 4222, 4233, 4293, 4304,4326,4338, 4375, 4378]. reported[1375, 1399,1522]. Reporter [2152].reporting [1554, 1603, 2910]. reports[2275, 3996,4182]. representative [503].reputation [3095]. reputational [4188].request [1229]. require [1649, 3721].required [909]. requirement [4205].Requirements [169, 2538, 2820,3968].requires [1342]. Research [742, 1139, 2006,2052,2221, 2237, 2307, 2417, 3368, 4077].Researcher [2371, 2815, 2930, 2946,3042].Researchers[2460, 2801,2826, 2954, 2991, 3707, 4348].resell [785]. resells [578]. reset [1466].Resetting [3524]. Resilience[3161, 3317,3948, 4298, 4382]. Resilient[4375]. resistance [4382]. Resolved [1392].Resources [409, 565, 1487, 2337]. respond[774]. respondents [1399]. responder[3029]. Response[158, 566, 572, 586, 1294, 1910, 1944, 2157,2328,2462, 2608, 2748, 2873, 2884, 3545, 3690,3701,3873, 3876, 4022, 4099, 4252].responsibilities [1175, 2770, 3029].responsibility [1132, 1149, 2783].responsible [2712, 3653]. Rest[2104, 2601,2820]. Restoring [3882].restricted [696]. restrictions [11, 477, 765].result [1288, 3158]. resulting [1352].

Page 38: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

38

results [3399]. resurgence [2785, 3171].retail [1921, 2930]. Retailers [3915].rethink [4236, 4306]. Rethinking[3290, 3714]. Return [2060, 2484, 2999].Returning [1148]. returns [2492]. Reuters[2360]. Revamping [51]. Reveal[1593, 3675]. Revealed [2057, 2879]. reveals[489, 610, 984, 2548]. revelations [3528].revenge [1753]. revenues [462]. reverse[2963]. Review[2004, 3184, 3197, 3209, 3210, 3221, 3222, 3232,3243, 3252, 3253, 3266, 3276, 3277, 3287, 3295,3304, 3305, 3326, 3327, 3344, 3345, 3373, 3374,3383, 3384, 3413, 3414, 3425, 3435, 3444, 3454,3466, 3476, 3477, 3509, 3519, 3555, 3614, 3657,3658, 3678, 3679, 3689, 3699, 3700, 3710, 3720,3741, 3742, 3751, 3752, 3761, 3771, 3772, 3783,3784, 3794, 3813, 3814, 3823, 3824, 3833, 3834,3844, 3845, 3853, 3863, 3864, 3873, 3881, 3891,3892, 3901, 3911, 3922, 3955, 3956, 3966, 3976,3977, 3988, 3998, 4008, 4009, 4089]. Review[149, 184, 208, 234, 799, 819, 881, 1178, 1278,1482, 1617, 1763, 1836, 1857, 2207, 2221, 2237,2350, 2945, 2965, 3046, 3334, 3352, 3353, 3363,3392, 3393, 3402, 3403, 3730, 3731, 3803, 3804,3933, 3944, 3945, 4065, 4132, 4281].reviewKali [3668]. reviews [650, 670].Revised [1367]. Revisions [548, 4372].Revisited [1345, 1974]. Revisiting [1533].revitalising [2640]. Revolution[1705, 3481]. revolutionary [878]. rewards[2448]. Reworking [2005]. RFID[2410, 2658, 2715, 2767]. Rhodri [3945].Rican [892]. Richard [1557]. Rickey[3864]. Right [518, 529, 535, 1439, 2058,2472,2556, 3503, 4022, 4123]. Rights [2125, 2355].Ring [38, 4300]. Ringing [1860, 1886]. RIP[1528]. Rise[41, 44, 462, 1812, 2422, 2687, 2746, 2993, 3048,3051, 3089, 3541, 3542, 3738, 4073, 4212, 4254].rises [2900]. rising [3647, 4340]. Risk[112, 166, 727, 798, 799, 868, 996, 1083, 1114,1146, 1444, 1465, 1533, 1679, 1784, 1828, 2294,2498, 2518, 2548, 2550, 2557, 2617, 2678, 2730,

2916,3076, 3114, 3253, 3705, 3712, 3734, 3858,3866,3894, 3903, 3917, 3925, 3978, 4075, 4082,4125,4170, 4295, 4309, 4318, 4344, 4354].Risk-based [3866]. Risks [82, 1418, 1612,1835,2103, 2155, 2285, 2326, 2475, 2660, 2668,2710,2805, 3765, 3774, 4101, 4163, 4343].Risky [4215]. rivalry [514]. rlogin[672, 864]. rlogin/Term [672]. rlogind[863]. RMS [2125]. road[312, 954, 2301, 3494, 4103]. roadblocks[4284]. roaming [829]. robbers [1078].Robert [3803]. Robin [3658]. robot [4039].robotic [4275]. Rocher [4254]. rocks[2834]. rocky [658]. rods [549]. Rogers[3305]. Rogue [1238, 1938, 2083, 2143, 2611].Rogueware [2922, 2970]. ROI [2661]. Role[22, 289, 507, 1726, 1947, 2100, 2337, 2972,3354,3405, 3426, 3489, 3866, 4250]. roles[2708]. roll [703, 2657, 2744]. Roman [295].room [4094]. Root[1268, 1324,1379, 1689, 2648]. Rootkit[2509, 2815]. rootkits [2782, 2871]. Round[704, 771, 1901, 2551, 3122]. round-up [3122].Roundup [4110]. Rountree [3184]. router[181, 992, 1046]. Routers[344, 463, 1131, 1910, 2181]. routes [2517].Routing [2671, 3199, 3330, 4028, 4287]. Row[243]. RPC [2158, 2273, 2866]. rpc.cmsd[957]. rpc.statd [1215]. rpc.ypupdated[411]. RPKI [4287]. RSA [365, 396, 575, 674,717, 827, 935, 1066, 3181, 3206]. RTF [1351].Ruby [3252]. Rule [1785, 1862]. rules[10, 1382,1794, 2024, 2277, 2655, 3665].rumours [3121]. run[631, 633, 849, 908, 1447]. Running [2643].runpriv [758]. runs [964, 3517]. Russ[3305]. Russia [3260, 3871, 4005, 4130, 4143].Russian[1347, 2402,3601, 3641, 3931, 3952, 4096, 4358].Russians [130, 3927, 4278].

S [209, 834]. S/MIME [834]. Sabotage[1641]. Safe [23, 622, 623, 910, 986, 1047, 1260,1262,1266, 1555, 2140, 2499, 4134, 4332, 4366].

Page 39: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

39

Safeguarding [268, 294, 4367]. safely [502].safer [334, 1354, 1363]. Safety[911, 1054, 2496,2537, 2809, 4019, 4046].Sagishi [4162]. Saha [3752]. sake [930].sale [90, 2437]. Salesforce [4101]. Sam[954]. Samba [2103]. Sambi [3209]. Same[1420, 2046, 4104]. Samia [3742]. Sammons[3326, 3327]. San [1960, 2835]. Sanchez[3834]. sand [3570]. sandbox [1663].Sandboxing [3570]. Sanders [3232, 3944].Sanford [3998]. Sanjay [3209]. SANS.org[1709]. Sarbanes [2444]. Sasser [2271, 2309].Sasser-like [2271]. SATAN [188, 230].satellite [45, 560, 1517, 1951,3683]. save[1432]. saves [1739]. saving [3095]. Savvy[1481]. say [1211, 1714, 1850, 2225, 3707].Says [262, 1104, 1479, 1624, 1631, 1781, 1784,1841, 2241, 2280, 2357, 2436, 2481, 2563, 2968,3005, 3051, 3240, 3370, 3451, 3452, 3482, 3495,3633, 3641, 3696, 3820, 3841, 4043]. SCADA[2758, 2977, 3620]. Scalable [2798, 2951].scale [1591, 2940,3619]. Scales [142, 1622].scam [824, 1645]. Scammers [3000, 4361].scams [3901, 3941, 4033]. scan [3267].scanned [896, 1413]. scanner[337, 562, 598, 1108, 1388, 1524, 1902].Scanners [2059, 2497, 2980]. Scanning[1335, 1585, 3668]. scans [309, 382]. scare[320, 609, 4288]. Scared [1657]. scares[3052]. scene [1563]. Sceptical [1723].scheme [607, 763, 842, 1936, 2743]. Schmidt[3413]. Schmitt [3444]. Schneier[149, 1781]. schools [2390]. Science[1773, 2417, 2440]. SCM [1611]. score [837].Scotland [38]. Scott [819]. scraping [3638].screen [1372, 2292]. Screen-melting [1372].screening [1300]. screensaver [1573].script [694]. Scripted [1079]. Scripting[1266, 1873, 2002, 2578, 2602, 3328]. Scripts[3892]. scupper [2347]. SD[3904, 3968, 4124]. SD-WAN[3904, 3968, 4124]. SDI [14]. SDL [2895].SDLC [338, 2885]. SDN [3426]. SDR[3335]. SeaChange [1033]. seal [1611].

Sean [3305]. search[2504, 2548,2621, 2774, 2781, 2980, 3023, 3550].searches [2250]. searching [3623]. seas[62]. season [661, 1822]. seasoned [3924].seat [2713]. Seattle [2692]. SEC [428].Second [703, 771, 1235, 3232, 3266, 3383,3555,3751, 3772, 3892, 4245]. Secondary[1929]. Secret[1980, 2057,2504, 2547, 2826, 3501, 3977].Secrets [226, 2072, 2801, 3922]. sector[2239, 3728,3799]. sectors [3985]. Secure[19, 21, 47, 121, 163, 206, 209, 278, 288, 342,354, 399, 419, 422, 431, 445, 447, 483, 486, 539,543, 573, 618, 719, 735, 812, 825, 829, 847, 853,873, 877, 890, 891, 913, 988, 997, 1050,1062,1085,1107, 1219, 1226, 1236, 1286, 1289, 1299,1302,1307, 1319, 1338, 1362, 1386, 1390, 1391,1429,1452, 1472, 1473, 1499, 1607, 1615, 1680,1695,1717, 1780, 1859, 1934, 1935, 1943, 1959,1993,2028, 2095, 2099, 2409, 2499, 2534, 2644,3081,3202, 3271, 3439, 3489, 3509, 3544, 3559,3707,4191, 4365]. secure[470, 548, 567, 815, 936, 1428, 1559, 1777, 2082,2333,2682, 2830, 2841, 2857, 3175, 3290, 3291,3588,3630, 3670, 3680, 3723, 3754, 3789, 3869,3904,4021, 4047, 4080, 4177]. secured[78, 518, 635, 872, 1357, 1360, 1407, 1630].Securely[835, 1004, 1016, 1409, 3470, 3526, 4288].secures [14, 122, 1069, 1202, 1496, 1609, 2259].SecureWay [702]. SecureZone [1109].Securicor [134]. SecurID [463, 3181, 3206].Securing [919, 1330, 1679,1880, 2029, 2216,2233,2262, 2455, 2505, 2528, 2538, 2554, 2579,2589,2600, 2620, 2690, 2728, 2747, 2974, 2977,2997,3007, 3009, 3028, 3080, 3138, 3144, 3309,3363,3416, 3741, 3755, 3784, 3849, 3866, 3916,3961,4027, 4030, 4039, 4136, 4141, 4148, 4154,4161,4187, 4249, 4308]. Security[15, 37, 85, 203, 277, 401, 464, 513, 536, 570,642, 667, 682, 802, 821, 1030, 1044, 1121, 1139,1160,1335, 1414, 1526, 1591, 1634, 1694, 1778,1795,1860, 1878, 1891, 1905, 1918, 1926, 1964,1966,1970, 1973, 1979, 1981, 1986, 1988, 2000,

Page 40: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

40

2001, 2004, 2008, 2019, 2034, 2035, 2065, 2082,2089, 2111, 2128, 2129, 2138, 2152, 2332, 2606,2646, 2858, 2933, 3061, 3151, 3266, 3274, 3304,3305, 3506, 3508, 3509, 3520, 3544, 3604, 3615,3626, 3699, 3710, 3823, 4008, 4075, 4077, 4110,4132, 4171, 4197, 4222]. Security[16, 29, 33, 36, 74, 98, 115, 144, 149, 169, 225,263, 312, 389, 468, 547, 689, 699, 951, 995, 1040,1112, 1114, 1130, 1133, 1189, 1292, 1346, 1369,1420, 1438, 1458, 1461, 1578–1580, 1594, 1595, 1597, 1614, 1617, 1621, 1640,1740, 1745, 1767, 1828, 1835, 1882, 1911, 1931,1942, 1944, 1945, 2018, 2030, 2043, 2046, 2098,2102, 2104, 2116, 2140, 2142, 2151, 2154, 2176,2180, 2209, 2248, 2260, 2312, 2429, 2433, 2442,2520, 2553, 2587, 2642, 2651, 2719, 2748, 2809,2917, 2972, 2976, 3176, 3319, 3446, 3627, 3693,3797, 4012, 4020, 4286, 4304, 4307, 4338].security [134, 138, 140, 141, 192, 195, 213, 221,223, 224, 226, 227, 251, 253, 254, 257, 259, 287,302, 307, 308, 320, 322, 331, 352, 359, 379, 383,385, 386, 404, 423–425,435, 440, 456, 457, 461,484, 487, 500, 515, 517, 522, 532, 561, 572, 574,578, 594, 613, 617, 634, 644, 646, 659, 663, 664,676, 680, 709, 717, 718, 720, 733, 743, 744, 766,778, 783, 809, 811, 814, 831, 848, 852, 897, 918,928, 930, 972, 990, 1015, 1018, 1032, 1105].security [949, 966, 971, 976, 1003, 1019, 1028,1034, 1050, 1068, 1083, 1089, 1099, 1106, 1137,1138, 1162, 1184, 1186, 1232, 1255, 1301, 1303,1306, 1340, 1348, 1358, 1359, 1361, 1389, 1412,1430, 1450, 1465, 1469, 1471, 1474, 1486, 1493–1495, 1500, 1503, 1512, 1546–1548,1608, 1729,1773, 1846, 1852, 1866, 1874, 1886, 1953, 1962,1998, 2037, 2069, 2073, 2078, 2083–2085, 2096, 2100, 2133, 2183, 2225, 2229, 2303,2414, 2425, 2524, 2573, 2583, 2615, 2657, 2668,2684, 2694, 2723, 2724, 2733, 2744, 2802].security[103, 266, 291, 340, 366, 371, 648, 669, 705, 727,752, 754, 774, 788, 796, 798, 817, 836, 860, 879,902, 921, 937, 955, 980, 996, 1328, 1678, 2300,2418, 2521, 2740, 2769, 2776, 2846, 2855, 2867,2956, 2980, 2992, 3059, 3076, 3077, 3082, 3098,

3141,3142, 3149, 3152, 3161, 3187, 3190, 3212,3240,3250, 3262, 3282, 3284, 3298, 3404, 3407,3429,3455, 3498, 3502, 3530, 3573, 3579, 3589,3601,3602, 3623, 3673, 3681, 3728, 3748, 3774,3860,3879, 3919, 3959, 4085, 4091, 4145, 4184,4257,4263, 4267, 4275, 4300, 4318, 4320, 4352].security [82, 105, 110, 142, 143, 406, 432, 491,773, 920, 1009, 1011, 1023, 1053, 1071, 1073,1091,1092, 1113, 1147, 1148, 1167, 1168, 1174,1176,1209, 1224, 1240, 1257–1259,1277, 1278, 1280, 1311, 1679, 1704, 2194,2218,2239, 2301, 2352, 2376, 2379, 2411, 2417,2472,2483, 2484, 2526, 2567, 2568, 2652, 2739,2772,2786, 2797, 2818, 2842, 2853, 2885, 2896,2948,2966, 2988, 2989, 3011, 3026, 3037, 3069,3094,3147, 3163, 3177, 3211, 3215, 3306, 3406,3418,3430, 3449, 3537, 3547, 3659, 3753, 3763,3798,3836, 3838, 3839, 3905, 3949, 3981, 4164,4236,4285, 4330, 4345, 4368, 4377]. security[17, 147, 289, 311, 318, 427, 528, 668, 755, 903,1339,1400, 1558, 2014, 2021, 2042, 2166, 2188,2214,2226, 2251, 2257, 2272, 2276, 2284, 2286,2299,2324, 2354, 2365, 2370, 2373, 2377, 2384,2394,2408, 2413, 2419, 2420, 2426, 2430, 2454,2485,2488, 2513, 2531, 2536, 2558, 2563, 2622,2623,2680, 2689, 2691, 2771, 2882, 2928, 3047,3281,3394, 3397, 3427, 3458, 3503, 3535, 3576,3598,3640, 3660, 3661, 3712, 3735, 3766, 3773,3817,3828, 3829, 3893, 3946, 4022, 4031, 4056,4066,4094, 4112, 4114, 4203, 4226, 4250, 4274,4287,4343, 4381]. security[1, 2, 79, 181, 182, 519, 599, 713, 725, 749, 751,760, 789, 799, 865, 894, 952, 956, 992, 1096,1145,1275, 1341, 1698, 1763, 1783, 1877, 2100,2191,2195, 2205, 2252, 2326, 2364, 2380, 2404,2465,2475, 2494, 2498, 2540, 2612, 2639, 2660–2663,2708, 2710, 2717, 2770, 2783, 2832, 2916,2987,2996, 3036, 3060, 3106, 3247, 3299, 3308,3321,3346, 3347, 3363, 3365, 3385, 3437, 3467,3478,3533, 3549, 3663, 3678, 3702, 3722, 3732,3785,3794, 3866, 3877, 3881, 3896, 3923, 3927,3937,3958, 3968, 4011, 4063, 4071, 4079, 4124,4173,4251, 4364]. Security[2721, 2752,3184, 3253]. security-based

Page 41: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

41

[1678]. security-positive [3211]. SecurlD[813]. SecurVPN [873]. see[1903, 2287, 2751, 2991, 3279, 3724]. seedy[1040]. Seek [3366, 4190]. Seeking[133, 3354, 4037]. seeks [540]. seems [4168].seen [1641]. sees [6, 498]. segmentation[4187]. Seitz [3689]. Selecting[2701, 3789, 4342]. Self [65, 611, 2108].Self-healing [65]. self-protecting [2108].self-regulation [611]. Selfie [4292]. sell[177, 1063, 1698,2438]. Selling[583, 1655, 2786,2979]. Semantic [1895].Sendmail [172, 298, 323, 369, 590, 606, 1121,1198, 1226, 2103, 2169]. sends [1156]. Senior[2084, 2138, 2616]. sense[2084, 2938, 3188, 3905]. sensitive[1630, 2592, 3394, 3470, 3618, 3631]. sensor[3257]. sensors [2850, 2861]. sent[502, 1711]. sentenced [190]. SeNTry [544].SentryLink [199]. SEO [2788]. separating[2299]. Serbian [1442]. Series [2119].Serious [1469, 1934, 1946, 1986, 3154, 3312].Seriously [1749, 4052]. Server[33, 49, 201, 223, 424, 465, 561, 698, 700, 784,806, 885, 1128, 1180, 1201, 1228, 1322, 1341,1424, 1473, 1552, 1725, 1765, 2051, 2095, 2144,2274, 3014, 3297, 3741, 3874]. server-based[1201]. Servers[455, 711, 718, 1151, 1246, 1340, 1397, 1486,1725, 1734, 1765, 1923, 2029, 2122, 2143, 2648,2860, 3563, 4010, 4117, 4177, 4312, 4337, 4358].Serverware [544]. serves [1264, 2811].Service [93, 134, 222, 238, 311, 437, 440, 460,516, 521, 654, 730, 736, 867, 905, 943, 959, 970,1119, 1132, 1149, 1198, 1230, 1273, 1334, 1350,1352, 1443, 1477, 1503, 1595, 1618, 1685, 1720,1834, 1925, 2101, 2547, 2771, 2957, 3068, 3257,3805, 3946, 4380]. Services[5, 131, 196, 200, 333, 447, 1110, 1164, 1544,1904, 1988, 1998, 2102, 2154, 2429, 2524, 2615,2776, 3246, 3313, 3363, 3365, 3563, 3585].serving [345]. servitude [2301]. Session[183, 2914, 3905]. Sessions [1423, 2117].SessionWall [792, 893]. SessionWall-3

[792, 893]. Set[115, 220, 333, 548, 635, 808, 869, 927, 1031,1694,1697, 1717, 1778, 1821, 2149, 3097]. Seth[3414, 3503,3824]. sets [1672, 3718]. Setting[2556, 3435]. settle [291]. Setup [1463].Seven [2277, 2841]. Several [1930, 3256].severe [3005]. severity [1775]. Sex [453].SGI [653, 823, 842, 882, 999, 1118, 1180].shade [1900]. shadow [4163, 4340].Shadows [1557, 3070, 3436, 3521]. shakes[2363]. Shane [3402]. Shannon [3209].Share [1858]. sharers [3052]. shares [1710].Sharing [1618, 1954, 2199, 2514, 2610, 2963,3027,3202, 3470, 3773]. Shark [1019].Sharma [3209]. Sharp [4073]. Sharpening[2608]. sharpens [2294]. Shaun [3720].shave [2392]. Shavers [3933]. Shedding[2582]. Shell [652, 1869, 3657, 3892].Shellshock [3623]. Shema [3384, 3466].Shetland [940]. Shields [2995]. shift[1618, 2321,2616, 2704]. Shifts [2630, 4362].shines [1998]. ships [2868]. Shiva [14, 252].Shock [1870, 2034]. Shop [311, 1304, 1637].shopping [163, 548, 573, 635, 1495]. Shore[960]. short [2277, 4009]. shortage [1559].shortcomings [3195]. Should[669, 1053, 1813, 2043, 2351, 3682, 3815, 3857,4010,4022, 4236, 4259, 4288, 4331].Shouldn’t [1702]. show [954, 1949].Showdown [1656]. Shows[1348, 1805,2617, 3952]. Shredder [978].SHTTP [164]. shut [734, 4279]. shuts[1818]. shutting [4119]. Side [471, 1040,1093,1532, 1915, 2556, 2634, 2716, 2986].Side-channel [2634]. sideways [2453].Sidewinder [78]. SIEM[3191, 3578,3597, 4276]. sights [3718]. sign[317, 358, 383, 522, 546]. sign-on[317, 358, 383, 522, 546]. Signature[722, 1505]. Signatures[1049, 1086,1355, 1405, 1575, 1650, 1689, 4048].signed [1816]. significant [977, 3633, 3738].Signing [793, 1329, 1411, 3093]. Signs[1505, 4321]. Sikich [4233]. Sikorski [3392].

Page 42: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

42

Silent [3492, 3858, 4320]. silicon [373, 1090].Silk [3494]. Silvia [3352, 3353]. SIM [2874].similar [1618]. Simmons [3373]. Simple[144, 267, 1077, 2277, 2925, 3358, 3487].simplified [1160, 1203, 1433]. simplifies[1270]. simplify [1030, 2580]. Simplifying[4065]. simulates [1129]. Simulating[1176]. simulators [585]. simultaneously[441]. Singapore [440, 830, 1335,1584].Singh [3509]. Singing [1094]. Single[317, 358, 383, 522, 546, 663, 2636].single-database [2636]. single-point [663].Sinister [3160]. sinkholes [3356]. sinks[2156]. sins [2307]. SIP [3839]. SirCam[1734]. SITA [222]. site [379, 656, 1156, 1191,1192, 1383, 1795, 1845, 1873, 2002, 2256, 2578,2602, 2790, 2992, 3328, 4279]. Sites[584, 733, 945, 1002, 1047, 1084, 1194, 1208,1375, 1740, 1753, 2765, 3053, 3831, 4086].situation [2758]. Six[1252, 2842, 3271, 4001]. six-step [3271].sixth [1010, 1025]. size [2609, 3849]. Sizing[3057]. Skeleton [3126]. Skewed [2347].Skills [1075, 3151, 3845, 3856, 4296]. SKIP[764]. Sklyarov [1842]. Skyhorse [3956].Skype [2510]. slacken [1173]. Slammer[2049, 2060, 2071]. slap [1995]. slashes[2037]. Sleuth [2795]. slim [3060]. slip[1996]. slip-ups [1996]. slow [1397]. Small[180, 2529, 2545,3849]. smaller [1387].Smart [1110, 1248, 1304, 1320, 1406, 1418,1431, 1502, 1525, 1567, 1660, 2946, 2950, 3187,3417, 3498, 3596, 3877]. smartcard[665, 717, 1003, 1035, 1854]. smartcards[614, 1601, 2634]. Smarten [3712]. Smarter[2571, 3000, 3522]. smartphone[2968, 3088, 3145, 3182]. smartphones[2298, 2537, 3118, 3765]. Smarts [3305].SMB [3105]. SME [3597]. SMEs[2370, 4134]. smile [2862]. Smith [3813].SMS [1883]. smurf [905]. snafu [678].snaps [2857]. Sniffers [603]. Sniffing[34, 1238]. SNMP [340, 1291, 1886, 1900].snoop [1323]. snooped [3064]. snooping

[953, 1843, 2009, 3528]. Snort [2103, 2411].Snowden [3675]. SOA [3290]. SOAPBOX[1683]. soar [1694, 4356]. soars [451].SOARX [4276]. Sober [2201, 2492]. Sobig[2141, 2149,2167]. Sobig.F [2187]. SOC[4016, 4264]. Social[267, 495, 1724, 2033, 2198, 2617, 2870, 3135,3259,3637, 3639, 3784, 3826, 3901, 3941].society [22, 518, 1231]. SOCKS [144].SoftID [525]. Software[83, 202, 236, 290, 320, 376, 513, 520, 525, 532,644, 687, 752, 791, 978, 1048, 1098, 1184, 1199,1214,1248, 1317, 1325, 1411, 1594, 1633, 1917,2082,2277, 2324, 2662, 2813, 2831, 2878, 2886,3097,3404, 3548, 3558, 3717, 3761, 3774, 3857,3903,3925, 3978, 4162, 4199, 4202, 4377].Solaris [321, 554, 759, 779, 822, 957, 1122,1152,1323, 1872]. sold [3831]. solstice [779].Solution [485, 501, 526, 721, 747, 852, 891,949, 990, 1065, 1068, 1127, 1128, 1141, 1159,1184,1201, 1203, 1204, 1236, 1289, 1307, 1320,1356,1417, 1427, 1474, 1597, 1660, 2756, 2959].Solutions [538, 539, 559, 620, 921, 1085, 1115,1140,1410, 1655, 1924, 2015, 2154, 2863, 3585,3651,3981, 4032, 4273]. solve [3232, 3323].solved [2734]. solves [435]. Solving[81, 973, 4164]. some[1228, 1744,1834, 1863, 3107]. Someren[2153]. something [1743]. somewhat[1846]. son [3644]. song [1771]. Sons[149, 1178]. Sony [3643, 3653]. Soon [601].sophisticated [1133, 2867, 4371]. Sophos[337, 1376]. Sorting [2017]. sorts [2153].Source [1206, 1288,1565, 1647, 1819, 1959,2063,2213, 2239, 2263, 2344, 2508, 2813, 3276,3803,3827, 3903, 4040, 4056, 4075, 4215, 4381].sourcing [3621]. South [2957].southwestern [175]. space [1981]. Spain[1286]. Spam [492, 803, 844, 901, 1568, 2156,2167,2177, 2500, 2627, 2704, 2713, 2894, 2918,2993,3089, 3624, 4239]. Spam-borne [2993].Spamhaus [3432]. spammer [2692].Spammers [2293, 2479, 2774,2810, 3056].spams [2187]. span [2376]. Spanair [3108].

Page 43: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

43

spanner [1314]. spans [599]. sparekey [32].spares [2363]. Sparks [749]. spate [1641].spawns [3022]. speak [1276]. spear [3207].spear-phishing [3207]. Spec [419]. Special[2974]. specific [706]. specification[827, 1290]. specifications [461, 1904, 2840].speech [2456, 2641]. speed[72, 96, 667, 3043]. Speedy [913, 1049, 1364].spend [2325]. spending [1694, 1878, 3282].Spider [1683]. Spies[284, 1837, 2121,3542, 3977]. spikes [2512].spinning [1978]. spirit [2691]. splash[2370]. splits [335]. spoil [2303]. sponsored[3991, 3993]. spoofing [128, 183, 589, 2987].spot [2169, 3691]. spotlight [3448].spotlights [2348]. spots [4148]. Spraul[3403, 3761]. spread [3121, 3538].Spreading [1170, 3377]. spreads[175, 328, 438, 1422]. spreadsheet[557, 3491]. Sprengers [3864]. Springer[3901]. spy [4117]. SpyEye [3033, 3168].Spying [1716, 3200]. Spyware [1984, 2146,2155, 2369, 2374, 2384, 2397, 2495, 2512]. SQL[1341, 2071, 2536, 2738, 2760, 2800, 3741].squabbles [940]. squad [1059]. squatters[1264]. squeaky [1715]. squeaky-clean[1715]. squeezes [2242]. squishing [1683].Srinivas [3210]. SS7 [3906]. SSD[3043, 3428]. SSH [925, 2169, 2326].ssh-agent [925]. SSL [224, 1423, 1445, 2528,2749, 2999, 3300, 3323, 4251]. SSO [1302].stability [3203]. stack [1182, 2113]. stacks[963]. staff [3866, 4341]. staffers [1261].Stage [263, 1746, 3490]. Stagefright [3727].staging [996]. stake [177, 1384].stakeholders [3344, 3345]. stalkers [881].stampedes [1734]. stamps [624].Standard [279, 291, 381, 514, 1052, 1071,1183, 1210, 1272, 1293, 1303, 1508, 1651, 1699,1788, 1909, 1956, 2335, 2542, 2910, 3018].standardisation [2352]. standardization[2642]. Standards[406, 479, 1285, 1336, 1566, 2818]. Standing[1682]. stands [1758]. Star [2440]. Starch

[3232, 3243,3252, 3287, 3392, 3403, 3689, 3700,3710,3731, 3752, 3761, 3794, 3813, 3863, 3891,3892,3955, 3966]. start[1158, 1165,2383, 2490, 2849, 4138]. start-up[1165]. starts [2438, 4377]. statd [908].State [953, 2030, 2249, 2435, 2570, 2839, 3107,3111,3299, 3330, 3347, 3985, 3989–3991,3993, 3999, 4000, 4138, 4171, 4222, 4257,4274,4331, 4358, 4371]. State-backed[3111, 3985]. State-sponsored [3991, 3993].States [175, 1250]. station [1601]. Stats[4326]. status [231, 3181]. Stay[1420, 1618,2510, 3041, 4104, 4263]. Staying[2556, 3671]. steal [731, 2564]. Stealing[1425, 2529]. steals [246, 2147]. Stealth[2292]. stealthy [4178]. Steams [1676].Steganography [2057, 2706]. STEM [3751].Step [1113, 1167, 1558, 1833, 2214, 2335, 3271,3425,3924]. Stepping [3798]. Steps[2360, 2396,2841, 3487, 4001, 4129]. Steve[3655]. Steven [3383, 3853]. stewardship[3499]. Stewart [3772]. sticking [2006].sticks [2342, 2425]. sticky [2051]. stifles[2346]. still[585, 709, 977, 1009, 1208, 1354, 2270, 2356,2583,2609, 2684, 3192, 3306, 3463, 3665, 4062].stimulate [450]. sting [1672, 2316]. Stock[1630]. Stock-market [1630]. stolen[1000, 1374,3601]. Stop[232, 1304, 1380, 1636, 2203, 2313, 2519, 3691].storage [2248, 2579, 2853, 4354]. stores[1407]. stories [1190]. storm[2407, 2888,2934]. story [603, 1764]. Stowe[3881]. straight [2556, 3696]. stranded[1559]. Strategic [1882, 3094, 4066].Strategies [799, 1224, 2421, 2474, 2916, 3135,3419,3595, 3659, 3751]. strategy[1207, 1257,1350, 1993, 2037, 2451, 2558, 3175,3271,3279, 3478, 3879, 4017]. Streamlining[4083]. Streams [2588]. Street [3305].streetwise [3417, 3523]. strength[874, 968, 1223, 1949, 3950, 4381]. strengthen[182, 3948]. strengthened [1361].Strengthening [2821]. stretching [2598].

Page 44: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

44

strike [724, 2800, 3056]. strikes [2010, 3001].striking [3147, 4123, 4173]. stripping [1216].Strong [540, 583, 714, 989, 1035,1419, 1782,4332, 4377]. Stronger [301, 3348]. structure[2540]. structured [3011]. struggle[2268, 3748, 3942]. Struts [4029]. students[2390, 3119]. Study [1083, 1258, 1420, 2548,2617, 3266, 3368, 3414, 3824, 4049]. stupid[2831]. Stuttard [3295]. Stuxnet[3111, 3121, 3644]. style [2373].Subcommittee [1262]. subject [1923].SubSeven [1957]. Subverting [3481].succeeds [803]. Success[1190, 2561, 3539, 3751]. successful[1133, 3591, 4150]. such [3335]. Sudhanshu[3730]. sued [762, 1007]. sues [824, 1851].suffer [258, 1402]. suffers[458, 2720, 3086,3263, 3643]. suid exec [652].Suidperl [534]. Suit [231, 1515, 3597].suitable [1476]. Suite [914, 972]. summary[1193]. Summer [2165]. Summit [210]. sun[34, 322, 323, 349, 787, 961, 1122, 1152, 1998,3407]. SunOS [782, 822]. SunSoft [456].Super [1154]. superhighway [71, 197, 289].Superior [1987, 2717]. Superman [552].Supermarket [1852]. Supernet [360].Supplier [2058]. supplies [134]. supply[3978, 4191, 4298]. Support[115, 157, 363, 679, 931, 966, 1047, 1391, 1404,1801, 2335, 3564]. supports [701, 713].Supreme [608]. surely [2086]. surface[2510, 4058]. surfing [615]. surge [2627].surges [132]. surprise [2649]. Surveillance[260, 985, 1656, 2172, 3717, 3781]. Survey[489, 610, 634, 1099, 1301, 1348, 1399, 1420,4049, 4063, 4087, 4197]. surveys [86].Survival [2000]. survives [1760]. sus[2989]. susceptible [686]. suspect [1626].Swede [846]. Sweden [193]. Swedish [275].swine [2936, 2989]. Swiss [1626]. switch[1273, 2355, 2520, 4259]. switches[1096, 1937, 2093]. Switching[96, 491, 1092, 2061]. Sybex [3266].Symantec [1363, 1953, 2084, 2124, 2361, 2373,

2446,2666, 2776, 2810, 3051, 3293, 3411].symbiosis [2567]. SYN [589, 602].Syngress[3184, 3253,3276, 3277, 3304, 3305, 3326, 3327,3334,3374, 3384, 3413, 3414, 3454, 3466, 3476,3477,3519, 3555, 3614, 3678, 3679, 3699, 3730,3741,3783, 3784, 3803, 3804, 3814, 3823, 3824,3833,3845, 3864, 3873, 3881, 3933, 3976].Synopsis [1074, 4075]. Syrian [3442].sysdef [862]. Sysid.exe [1483]. syslog[350, 436, 1119]. System [45, 76, 136, 142, 464,565, 598, 619, 684, 745, 877, 902, 971, 985, 1001,1031,1096, 1216, 1247, 1250, 1319, 1364, 1411,1574,1618, 1679, 1939, 2023, 2328, 2491, 2701,2868,2915, 3081, 3378, 3648, 3952, 4355].systematic [472]. Systems[312, 407, 416, 430, 522, 524, 571, 715, 734, 920,1039,1618, 1834, 1955, 1987, 2056, 2073, 2085,2181,2267, 2273, 2389, 2550, 2600, 2717, 2952,3174,3176, 3184, 3197, 3291, 3307, 3519, 3578,3683,3713, 3871, 3916, 4136, 4259].Systemware [1984].

T [3454]. tables [511, 1647]. tabs [3711].tackle [3317, 4107]. tackles [428, 2384].Tackling [3211, 3650, 4033]. tactics[1940, 4297,4340]. tail [181]. Taiwan [71].Taiwanese [635]. Take[5, 582, 601, 858, 1749, 2557, 3432]. take-off[5]. takedown [3017]. takedowns [4336].taken [3129, 3494, 3682, 3973, 4349].takeover [1923]. takes [263, 745, 787, 2649,2713,2888, 2898, 2934, 3194, 3442, 4086, 4325].Taking [1314, 3201, 3318, 3774, 3875]. Tales[1557]. talk [4048]. talkd [675]. Tallinn[3444]. Tangled [1557, 3315]. Tankard[3458, 3514]. Tap [394, 1721]. Tap-proof[1721]. Tapping [1593, 2681]. target[1387, 1922,1939, 2790, 2968, 3324, 3764, 3810,3985,4174, 4358]. Targeted [523, 1484, 2471,2746,3218, 3516, 3584, 3888, 4158, 4309].targeting [3607]. Targets[1594, 3207,3264, 3676, 3935, 4278, 4290].Tasini [922]. task [3157]. Taskforce [1994].

Page 45: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

45

tax [3125]. taxes [1252, 3420]. Taylor[3892]. TCP [139, 563, 589, 769, 1123, 1181,1182, 1466, 2486]. TCP/IP[139, 563, 769, 1182, 2486]. teach [2085, 3336].Team[572, 770, 1219, 1710, 1806, 3545, 3717, 3882].teaming [955, 3814, 4059]. Tech[59, 1658, 1800, 2712, 3305, 3758, 4107, 4232].Technical[1011, 1279, 1482, 1641, 2261, 4029].Techniques[1041, 1703, 1834, 2057, 2672, 3156].Technological [2873]. Technologies[468, 785, 2894, 3853]. Technology[3, 358, 505, 636, 1163, 1272, 1434, 1454, 1499,1854, 1906, 2346, 2589, 2616, 2718, 2749, 2871,3235, 3433, 3481, 3502, 3630, 3711, 4274, 4307].Teenage [1373]. teenager [2223]. teens[1590]. teeth [2156]. Telco [2044]. Telecom[828, 953, 1918, 2385]. Telecommunications[1195, 1200, 1262]. telecommuting [345].Telecomputing [345]. telecoms[70, 160, 753]. Telekom [75]. telemetry[3416]. telephone [393, 818]. telephony[1115, 2600, 4136]. Teleworkers [41, 2622].teleworking [4366]. Telnet[151, 351, 734, 943]. temporary [802]. Ten[1418, 3104]. tenacious [2346]. tenanted[3059]. Tenneti [3210]. tensions [3582].Terence [3344, 3345]. term [672, 3666, 3708].Terminal [1246]. terminology [4284].terrain [1917]. territory [2374]. terror[1849]. Terrorism[205, 1751, 1801,1895, 1932, 3223]. terrorist[2436]. terrorists [1625, 1837, 2241]. Terry[3305, 3988]. Test[72, 694, 2018, 2647, 3288, 3435]. tested [927].Tester [3243, 3276]. Testing[472, 688, 726, 817, 857, 1621, 1970, 2016, 2058,2086, 2277, 2281, 2354, 2662, 3277, 3418, 3435,3509, 3555, 3586, 3594, 3604, 3606, 3637, 3646,3657, 3838, 4016, 4082, 4139]. tests[2277, 2756, 3769]. text [2250]. TFN2K[1334]. Theft

[59, 1644,2506, 2575, 2761, 2981, 3768, 4035].their[1641, 2193,3427, 3573, 3723, 3884, 3941, 4259].Them[723, 975, 1703, 1889, 2517, 3236, 4020, 4343].Theory [1702]. there [22, 1240, 1926, 2235,2284,2364, 2630, 3136, 3329, 3596, 4247]. thief[753, 1136]. Thiel [3794]. thieves [241, 2193].Thin [3060, 3166, 3215]. Things [1420, 2043,3602,3684, 3745, 3869, 3888, 3894, 3969, 3970,4002,4027, 4040, 4141, 4154, 4173, 4321].think [3403, 3707, 3934]. Thinking[1802, 2580,3166]. thinks [1274, 2010].Third [919, 1237, 1436, 3069, 3276, 3334, 3374,3658,3824, 4008]. third-party [919]. thirds[3820, 3861]. Thomas [3555, 3699, 3988].Thompson [2373]. Thomson [799]. Thor[3304]. Thorny [1093, 1532]. though [1679].thousands [3842]. Threat [128, 145, 977,1029,1065, 1469, 1641, 1681, 1804, 2014, 2027,2083,2203, 2233, 2234, 2480, 2516, 2545, 2598,2784,2785, 2806, 2895, 2939, 2956, 3057, 3118,3122,3148, 3154, 3192, 3224, 3245, 3250, 3313,3335,3396, 3534, 3546, 3599, 3620, 3633, 3648,3690,3692, 3736, 3773, 3876, 3883, 3927, 3938,3948,3970, 3976, 3980, 4050, 4058, 4099, 4120,4146,4221, 4227, 4261, 4293, 4341, 4367].threatened [906, 1405, 3460]. threatening[153, 456, 4216]. threatens [2398, 3727, 4301].Threats [887, 1704, 1893, 1896, 2154, 2298,2315,2339, 2430, 2441, 2443, 2487, 2497, 2509,2530,2709, 2862, 3045, 3070, 3211, 3235–3237,3278, 3317, 3368, 3510, 3552, 3557, 3567,3595,3647, 3650, 3683, 3701, 3754, 3821, 3833,3851,3858, 3957, 3960, 3986, 3990, 3993, 4023,4098,4110, 4316, 4328, 4351]. Threatwatch[4097, 4108,4118, 4131, 4144, 4156, 4169, 4183,4195,4208, 4220, 4231, 4243, 4255, 4269, 4280,4291,4302, 4314, 4324, 4335, 4350, 4360, 4373].Three[335, 1583, 1709, 1720, 1953, 2906, 3001, 3659].three-strikes [3001]. throughout [4079].ticks [2401]. tier [744, 831]. tiered [2613].Ties [325]. tighten [2271, 3098, 3573,4267].

Page 46: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

46

Tightening [657]. Tighter [1398]. TikTok[4303]. Tilman [3863]. Tim [981]. Time[20, 262, 295, 413, 1073, 1461, 1745, 1749, 1773,1892, 2633, 2822, 2849, 2940, 2989, 3125, 3288,3491, 3510, 3649, 3701, 3714, 3981, 4041, 4306].Time-Based [1073, 1461]. Timeline [3868].Timely [1677]. times[187, 2281, 2558,3256, 3300, 3842]. TimeStep[1126]. Timing [2004]. Timothy [3304].Tin [1479]. Tips [2313, 2400, 2906]. TIS[701, 724, 946, 1822]. Tmobile [2597]. Toad[1639]. Tobias [3287]. today[3135, 3137, 4136]. together[1032, 1112, 2338, 4124, 4256]. token[103, 644, 2477]. tokenisation [3084].tokenless [3609]. Tokens[295, 3010, 3206,3714]. told [1773, 3098].tolerance [376]. tolerant [139, 201]. toll[2421]. tolls [707]. tomorrow [3137, 3736].too [229, 266, 723, 1848, 1850, 2023]. Tool[254, 425, 512, 934, 1142, 1324, 1475, 2330,2639, 2727, 2878, 2895, 2944, 3013, 4342].toolbox [2738]. Toolkit[909, 3276, 3334,3636, 4226]. toolkits [1220].Tools [1278, 1834,2101, 2132, 2151, 2218,2322, 2432, 2529, 2926, 2938, 3528]. Top[181, 1301, 1330,2036, 2081, 2169, 2172, 2187,2195, 2319, 2517, 2583, 2786, 3968, 4368].Top-down [2195]. Tops[1613, 1700, 2201, 2791, 3495]. TOR[459, 3473, 3654]. Toronto [92]. Toshiba[1855]. Total [539, 1163]. touch [4346].‘TouchLock’ [259]. Tough [856, 1834, 3300].toughen [1082]. Towers [1791]. town[2500]. trace [2940]. trace-back [2940].tracing [2697]. track [3895]. trackable[1559]. tracker [212]. tracking[2171, 2175, 2398, 2697, 3711]. tracks [2666].trade [110]. trading [138, 1413].traditional [1559, 2496,3406]. Traffic[252, 1380, 1559,1910, 2088, 2582, 3226, 3289,3834, 4251]. trail [1059]. trailing [2858].trails [3587]. training [4071]. Transaction[620]. Transactions

[102, 419, 853, 1359, 1615, 2939]. transfer[390, 1559, 2333, 3490]. transfers [1452].transformation [3979, 4134, 4170].transient [3672]. Transition [468, 1956].transmissions [850]. transparency [4381].transportation [4149]. trap [324, 2564].trapper [596]. travails [707]. travel [794].travelled [312]. Treading [4286]. Treating[2806]. treatment [1206]. treatments[2315]. Treats [1582]. treaty [1816]. trek[2440]. Trend [772, 1569, 2271, 4110, 4362].Trends [1978, 2188, 2207, 2471, 2558, 3057,3068,3160, 3224, 3766]. trial [261, 1758].trials [1650]. trick [2479]. Tricks[110, 1582, 1958, 3135]. trillion [1468]. triple[220, 333]. Tripwire [1287]. Tristrata[1111]. Tritheim [1106]. Triton [4130].TROJ XPLOREZIP [1216]. Trojan[271, 738, 771, 1100, 1123, 1442, 1485, 1755,1869,2190, 2564, 2755, 3179]. trojans[2013, 2397,2566, 2594, 2746, 3171, 4050].Trouble [1313, 1365, 1540, 2044, 2667].Troubled [1638]. Tru64 [1214, 1967].Tru64/DIGITAL [1214]. True[1834, 2327,3724, 4059]. TrueCrypt [3581].TruSecure [2202]. Trust [1295, 1318, 1531,1572,1596, 1743, 1763, 1797, 1884, 1889, 1902,2306,2454, 2949, 3426, 3480, 4047, 4213].Trusted [1635, 2301, 2384, 2569,2821, 2871].Trusting [2870, 4369]. TrustWorks [1972].trustworthy [1902, 3323, 4127]. Truth[958, 3896, 4037]. TSB [2477]. Tsunami[2363]. tuning [2513]. tunnelling [4297].tunnels [1433]. Turk [2458]. turn[2774, 2854,3219]. turned [975, 1726].Turning [2769]. Turnkey [1141]. turns[449, 1647, 2070, 3762]. TV [615, 1601]. TVD[892]. Twice [1535, 1795, 2010, 3085, 4043].Twinkle [1222]. Twitter [3073, 3098]. Two[105, 1365, 1410, 1453, 1836, 1857, 2543, 2701,3188,3238, 3609, 3820, 3861, 3973, 4154].Two-factor [1410, 2543, 2701, 3188, 3609].Two-thirds [3820, 3861]. type [497, 1744].typical [1023]. Tyrone [3720].

Page 47: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

47

U.S [1420]. UDP [437, 527]. UK[7, 66, 69, 412, 478, 765, 928, 945, 1072,1082,1158, 1185, 1193, 1271, 1420, 1429, 1451, 1559,1625, 1650, 1673, 1905, 2085, 2280, 2306, 2424,2533, 2636, 2668, 2676, 2743, 2754, 2779, 2814,3728, 3758, 3768, 3820, 3841, 3860, 3879, 3977,4017, 4044, 4052, 4155, 4207, 4219, 4266, 4328].Ukraine [3885, 4005, 4143]. Ultimo [1496].unable [1874]. unacceptable [408].unauthorized [162]. uncertain [3181].uncertainty [2646, 2651]. Uncle [954].Uncovered [3210]. Uncovering [4345].uncovers [770, 3195]. uncrackable [2621].under-performing [97, 1686]. Undercover[324, 4162]. Underground [238, 1582, 4362].undermines [2042]. underpins [4356].understaffed [1686]. Understanding[1480, 1911, 2963, 3280, 3407, 3525, 3620, 3693,3754, 3891, 3901, 3911, 3999]. understood[3268]. undetected [230]. Unicode [2393].uniform [10]. Unify [2580]. uniquely[3071]. Unisys [1610]. unit [422, 3423].unite [290, 316, 969, 1428, 1473]. United[175, 1250, 4312]. universities [2245, 4266].University[1096, 1543, 2112, 3444, 3911, 3922, 4009].UNIX [404, 484, 687, 744, 899, 1048,1155,1214, 1287, 1322, 1853]. unknown [3650].unlawful [1192]. unleash [2283].unleashed [1538, 2319]. unmasking [753].unopened [1422]. Unpatched [2192].unpredictability [980]. unprepared [4052].unprotected [1888]. Unravelling [2153].Unsafe [1375]. unsecured [3704]. Unseen[4110]. unsniffable [3416]. unsolvable [81].unsolved [1147]. Unto [3373]. Untrusted[1079, 3246]. untrustworthy [2410]. unveil[2945]. unveiled [1499]. Unveiling [3569].unveils [9, 222, 796, 815, 1478, 2413, 2778].unwanted [932, 1157]. Update[68, 1291, 1675, 1762, 1843, 1881, 2285, 2590].updated [64, 926]. updates[2283, 2297, 4196]. upgrade [340, 1863, 2280].Upgrades [899, 2414, 2499]. UPnP [1841].

ups [1996]. upset [26]. Upstream [4304].Upturn [2594]. Urge [1616]. urged [1455].urges [660, 868]. URL [1228, 3133]. urls[2393]. USA [269, 1170, 1196, 1482, 2009].Usability [2526, 3147]. USB[2068, 2342,2425, 3138]. Use[82, 112, 378, 910, 1436, 1462, 1744, 1813, 2218,2767,3213, 3967, 4228]. used[738, 1738, 3043, 3273, 3612, 3738]. UseLogin[1465]. Usenet [560]. User [1, 330, 385, 1030,1156,1312, 1502, 1660, 1876, 2541, 2629, 2641,2852,3093, 3134, 3147, 3693, 3831, 4101, 4115].Users [17, 26, 119, 157, 198, 288, 405, 420, 616,638, 712, 786, 818, 1268, 1376, 1632, 1874, 2313,2340,2428, 2441, 2637, 3071, 3141, 3237, 3670,3887,3941, 4295]. uses [717, 808, 834, 2564].Using[387, 696, 840, 883, 1041, 2326, 2548, 2641,2810,2821, 2832, 3053, 3105, 3232, 3460, 3526,3557,3746, 3765, 3893, 4039, 4174, 4239, 4355].usual [3452]. usually [705]. Utilities [3192].utility [666, 1001]. UTM [2519, 3405]. UX[395, 555, 1027, 1120, 1172, 1198].

V [1668, 2412, 3403, 3761]. V.5 [298]. V6[2209, 2321]. V7.1 [1028]. vacation [961].Vacca [4008]. Valentine [1616, 2514].Valerie [3699]. valid [2541]. validated[2962]. validation [1183, 1445, 4295]. Value[2142, 2336]. valued [2518]. Vampire [1703].Vandalizes [1740]. Vanishing [1556].variant [2148]. Variants [2141, 2346].Variations [2131]. Vasileios [3844].Vaulting [207]. VDI [3047]. vector[2578, 3588]. vectors [3146, 3448]. Vegas[2969]. vehicle [1559]. veil [2975]. Vendor[623, 2418, 2487]. Vendors [365, 625, 1275,1387,1616, 1853, 1981, 2408, 2606, 2953, 3797].Ventana [819]. venture [75, 481, 1011].ventures [3077]. verdicts [2657]. verge[117]. verification [279, 722, 818, 2641].verifier [475]. Verifying [3404]. VeriSign[1643, 1904]. Veritas [2361]. Verizon [2825].Version [228, 429, 435, 470, 544, 1123].

Page 48: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

48

versions [1354, 4218]. Versus[1575, 1912, 2195, 3147]. very [3479, 4009].veteran [2575]. via [400, 560, 654, 821, 895,1110, 1502, 2760, 3244, 3768]. Viagra [2293].vicious [397]. Victim [1720, 3035, 3337].victims [3768, 3889, 3909]. video[1137, 2222, 4300]. View[883, 1393, 2465,2487, 2587, 2602]. Vigilantes[1670, 1989]. Vim [4089]. violations [1692].Violent [3454]. Vipul [2718]. Viral [1875].Virtual [285, 399, 543, 587, 692, 719, 816, 851,1298, 1458, 1989, 2538, 2554, 2793, 2830, 2841,2863, 2928, 3020, 3396]. Virtualisation[2727, 2987, 3074, 3319]. virtualised [2976].Virus[40, 68, 76, 81, 119, 174, 273, 276, 285, 329, 337,405, 426, 438, 497, 526, 551, 557, 562, 571, 585,591, 592, 596, 598, 609, 642, 650, 661, 670, 683,684, 712, 721, 742, 746, 772, 874, 969, 976, 1103,1135, 1156, 1201, 1388, 1421, 1422, 1432, 1434,1448, 1449, 1454, 1484, 1498, 1516, 1517, 1616,1620, 1653, 1696, 1708, 1759, 1870, 1887, 1939,1940, 1975, 2056, 2112, 2162, 2165, 2171, 2201,2207, 2223, 2288, 2374, 2490, 2595, 3131, 3390].Viruses [167, 299, 382, 397, 402, 439, 448, 488,527, 535, 581, 610, 914, 926, 1447, 1468, 1480,1506, 1564, 2346, 2384, 2432, 2578, 2958].Virusland [1971]. Virusnet [690].VirusPatrol [712]. Visa [291, 461, 1800].visibility [3535, 4284]. vision [3549].Visitor [1413]. Vista[2587, 2606, 2643, 2657]. VistaNet [894].Visual [4238]. visuals [2330]. Vital[1947, 2337, 3926]. VLSI [1107]. VMware[2724]. vogue [2488]. Voice [169, 818, 1115,1237, 1525, 2379, 3506, 3647, 3704, 4310].voicemail [1907]. void [2670]. VOIP[2014, 2443, 2459, 2530, 2539, 2581, 2592, 2668,2826, 3309, 4136]. Volatile [2820].volrmmount [944]. Volume [2432, 3393].voracious [1527]. voting [2389, 2676, 2739].VPN [872, 890, 915, 1060, 1126, 1141, 1202,1204, 1207, 1234, 1356, 1362, 1414, 1433, 1500,2099, 2311, 2749, 2999, 3338]. VPN-1 [1141].

VPNs [365, 1185,1597, 3408]. vs[1989, 2016,2263, 2577, 2749, 2820, 2988, 3084,3428,3894, 4226]. vulnerabilites [2081].Vulnerabilities [152, 172, 173, 351, 555, 590,653, 732, 779, 806, 823, 842, 863, 882, 884, 924,983, 984, 999, 1012, 1044, 1057, 1097, 1120,1122,1152, 1155, 1172, 1181, 1212, 1215, 1230,1241,1901, 1911, 1969, 1997, 2035, 2050, 2106,2114,2144, 2192, 2231, 2412, 2491, 2886, 3005,3088,3533, 3686, 3795, 3903, 4102, 4104, 4113,4122,4142, 4157, 4174, 4199, 4323].Vulnerability [151, 236, 298, 321, 323, 349,350, 373, 392, 395, 411, 436, 476, 512, 532–534, 554, 556, 569, 606, 630–633, 652, 672, 675, 694, 698, 710, 729, 730, 757–759, 780, 782, 800–802, 822, 862, 864, 867, 908, 925, 944, 957, 961–963, 1001, 1028, 1045, 1080, 1081, 1118, 1121,1153,1199, 1214, 1229, 1245–1247,1267, 1282–1284,1298, 1351, 1381, 1700, 1911, 1930, 1987,2059,2126, 2132, 2158, 2168, 2555, 2807, 2819,2998,3124, 3815, 4326]. vulnerability[1055, 1070,1212, 1322–1324,1377, 1378, 1426,1445,1446, 1463, 1466, 1490–1492,1712, 1871, 1883, 1902, 1917, 1996, 2024,2202,2212, 2275, 2405, 2431, 2497, 2703, 2905,3182,3568, 3727, 3925, 4062, 4379].vulnerability-management [4379].Vulnerable[614, 667, 1002, 1038, 1654, 1853, 2097, 2356,3563,3564, 3778, 3856, 4209, 4218, 4244].Vyacheslav [3435].

W [1619]. W2K [1666]. W2K.Stream[1516]. W97M.Footprint [1135].WabiSabiLabi [2703]. WAFs [3957].wages [2320]. wait [2212, 3279]. wake[1849]. Waledac [3169]. walk [4344]. Wall[442, 467, 3082]. wallet [1165]. walls[2991, 4284]. WAN[108, 1651, 3904, 3968, 4124]. wanna[2390, 3971]. wanna-B [2390]. WannaCry[4025, 4061]. Want[1546, 1617,1824, 1838, 2712]. wanting [484].

Page 49: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

49

wants [1493, 1867]. Wapping [552]. War[170, 265, 901, 1751, 1791, 1812, 2079, 2448,2575, 3112, 3227, 4138, 4230, 4247].Warchalking [2204]. ward [311].warehouse [1852]. Warfare[838, 859, 880, 1259, 3316, 3444, 3497].warming [4001]. warn [3262]. Warning[497, 687, 2386, 4268]. warns[503, 960, 1545, 3459, 3589, 4155, 4266, 4348].warrant [733]. warring [3285]. wars [3056].was [1311, 3653]. washer [1644]. Washing[1579]. watch [1641, 1782,3773].WatchGuard [3535, 4338]. Watching[1189, 1742, 1810, 2351, 2367]. water [4286].watering [3422]. Waters [1638]. Watters[3803]. Wave [883, 1895, 2359, 2474, 4290].way [495, 1231, 1311, 2187, 2624,3164, 3503,4069, 4284]. Wayfarer [449]. Ways[2, 407, 430, 902, 2135, 3358, 4260]. Weak[1486, 3375, 3728, 4148]. weakened [985].weakest [3463]. weakness[1374, 3780, 4300]. Weaknesses[475, 1005, 1066,3906, 3919]. wealthy [2968].Weaponised [3213]. Weaponising[3980, 4002]. weapons [25, 4320]. wearable[3630]. weather [248]. Web[161, 192, 201, 381, 407, 430, 559, 584, 615, 656,668, 718, 720, 733, 772, 788, 796, 812, 897, 947,949, 1002, 1018, 1034, 1047, 1084, 1184, 1191,1192, 1218, 1245, 1305, 1340, 1373, 1383, 1464,1474, 1547, 1552, 1633, 1649, 1743, 1744, 1835,1846, 1904, 1970, 1998, 2029, 2036, 2121, 2144,2154, 2206, 2251, 2547, 2698, 2720, 2737, 2765,2771, 2796, 2834, 2855, 2870, 2934, 2992, 2995,3005, 3039, 3117, 3176, 3238, 3246, 3250, 3295,3315, 3384, 3463, 3466, 3476, 3477, 3553, 3569,3730, 3769, 3973, 4019, 4046, 4359]. Web[716, 826, 881, 1310, 1557, 1725, 1765, 2102,2262, 2429, 2527, 2536, 2570, 2660, 2729, 3585,3795, 4214]. web-based[897, 947, 1018, 1547, 2995, 3246].Web-surfing [615]. Web/E [720].Web/E-mail [720]. Webcam [3907].WebCom [655]. webdist.cgi [823].

WebGlimpse [884]. Webjacking [2591].website [2781, 2925, 2980, 3783]. websites[1697, 2079,2760, 3563, 3607, 3612, 3739].WEF [1626]. Weidenfeld [3977]. Welcome[2001, 2507]. Well [552, 1786, 3148].well-meaning [3148]. went[2158, 2161,2385]. WEP [1737, 2011].Wesley [1763]. Western [3591]. Wheeler[3253]. WheelGroup [781]. Where [669,816, 1392, 1659, 1744, 2223, 2302, 3618, 3815].whether [1436, 1704, 3653]. while[2797, 3871]. White[101, 868, 1711, 2016, 3225]. Whitehouse[286, 1478, 1993, 3720]. whitelisting [2961].Who [1211, 1479, 1810, 1982, 2630,3136, 3271,3874,3994]. whole [603]. Whom[707, 1053, 1786, 2421, 3400]. whose[2822, 4112]. Wicked [3892]. Wide[192, 522, 3778, 4155, 4189]. widely [1170].widening [2653]. widens [2376]. wider[2184, 3909]. widespread [3022]. Wife[1632]. Wifi[2612, 3036,3064, 3081, 3152, 3164, 4006, 4189].wild [438, 1755, 3046]. Wiles [3305]. Wiley[149, 1178, 1658, 3295, 3720]. Wilhelm [3555].Will [601, 1392, 1393, 1401, 2303, 2348, 2384,2395,2436, 3721, 3855, 3976, 3983]. Williams[3374]. willing [3792]. Wilson [3425]. win[2389]. Win2000 [2340]. Winamp [2356].window [1045, 2904, 2905]. Windows[226, 285, 337, 401, 425, 487, 577, 646, 791, 800,876, 942, 956, 989, 1124, 1230, 1246, 1282, 1320,1327,1398, 1653, 1931, 1942, 1995, 2095, 2205,2273,2550, 2587, 2621, 2860, 3078, 3184, 3185,3334,3425, 3479, 3519, 3564, 3636, 4218, 4315].Winning [4297]. Wins[1542, 2574,3112, 3227]. Winword [439].wipe [1731, 2529]. WIPO [1264]. wire[2408]. wired [2731]. Wireless[5, 1249, 1289, 1299, 1338, 1361, 1414, 1470,1472,1580, 1592, 1615, 1651, 1654, 1705, 1807,1859,1880, 1888, 1906, 1909, 1921, 1926, 1943,1963,2043, 2069, 2113, 2127, 2139, 2151, 2166,2175,2188, 2246, 2272, 2292, 2294, 2297, 2431,

Page 50: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 50

2526, 2581, 2597, 2609, 2688, 2699, 2731, 2940,2991, 3081, 3257, 3270, 3329, 3789].Wireless-based [2175]. Wireshark [3232].wiretapping [64, 375]. wise [2637].WISekey [1497]. wising [2597]. within[1704, 2337, 2956, 2964, 3489, 3557, 3585, 3897].without [579, 680, 1447, 2021, 2072, 3076,3163, 3660, 3935]. Wizard [277]. WLAN[2043]. WLANs [2292]. wmcdplay [1379].Wnn [1492]. Woe [380]. Wolf [1766, 1824].Women [1814, 3505, 3751]. won [3451].wonder [3612]. won’t [1205]. Word[328, 488, 497, 1329, 3947]. WordPress[3061]. Work [1023, 1112, 1275, 1393, 1850,2275, 2476, 2802, 3111, 3628, 3789, 3828].workaround [350]. Worker[1349, 2620, 2835, 3408]. workers [42, 4308].workflows [4284]. workgroups [2248].Working [429, 737, 1548, 2355, 2640, 3310,3406, 3532, 4256]. Workplace[1613, 1812, 3259]. Works [3761]. World[192, 650, 670, 869, 1189, 1838, 1978, 2072,2402, 2429, 2563, 2736, 2804, 2904, 2936, 2976,3232, 3336, 3408, 3911, 4225]. worlds[2793, 3212]. WorldView [1492].Worldwide[663, 714, 764, 940, 1927, 2194, 3528, 4181].Worm[1372, 1483, 1671, 1693, 1879, 1999, 2049, 2071,2085, 2136, 2141, 2164, 2382, 2492, 2649, 2888].wormable [4218]. Worms[1747, 1811, 1941, 2165, 2348, 2578, 2688].worried [1589, 2766, 4331]. worries[277, 280, 405, 1586, 2583, 3074]. Worrying[2849, 4323]. Worse [1620, 2164, 2673, 4188].Worst [1460, 3786, 3948]. worth [2484].Would [755]. WPA [3013]. wrangles [940].wrap [823, 3055]. Wrappers [1123].wrecking [2217]. writer [2165]. writers[1484, 2112, 2148]. Writing [2682]. Written[1767]. wrong [2158, 2161]. WSLS [2771].wu [1268]. wu-ftpd [1268]. WWW [885].

X [149, 392, 1180, 1678, 2419, 2516, 2849, 3179,

3771]. X-commerce [1678]. X.400 [598].X.509 [1202]. X25 [597]. Xinetica [1550].XML [1764]. XP [1804, 3561, 3564].XPSP1 [2340].

Y2K [921, 1091, 1190, 1205]. Yahoo[865, 906, 1434, 3538]. Year [274, 276, 1599,1836,1857, 2078, 2207, 2350, 2412, 3140, 3899,3996,4043, 4061, 4237, 4245, 4293]. Years[1419, 2562,3920]. yes [2140]. yesterday[3151]. York [2357]. Young [781, 2458].You’re [1976]. yourself [881, 2472]. youths[2255]. YouTube [2694]. Yves [4254].

Zakas [3891]. zap [2035]. Zaxus [1427].Zealand [1303]. Zergo [965]. Zero[1969, 2236,2473, 3224, 3920, 4047]. Zero-days [3920]. Zeus [3109, 3130, 3168, 3171].ZigBee [4032]. zombie [2640]. zombies[1739, 2571]. Zotob [2458, 2459].

ReferencesSteffora:1994:UEC

[1] Ann Steffora. User education critical toeffective network security. Network Se-curity, 1994(6):2, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900280.

Steffora:1994:ICM

[2] Ann Steffora. Internet commu-nity has many ways to handle se-curity infringements. Network Secu-rity, 1994(6):3, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900299.

Page 51: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 51

Anonymous:1994:FFC

[3] Anonymous. Flaw found in Clip-per technology. Network Security,1994(6):3–4, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900302.

Anonymous:1994:J

[4] Anonymous. Junkie. Network Secu-rity, 1994(6):4, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900310.

Anonymous:1994:WDS

[5] Anonymous. Wireless data ser-vices take-off. Network Security,1994(6):4, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900329.

Anonymous:1994:MDC

[6] Anonymous. Mobile data comms mar-ket sees rapid growth. Network Secu-rity, 1994(6):4–5, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900337.

Anonymous:1994:UIP

[7] Anonymous. UK invests in photon-ics. Network Security, 1994(6):5, June1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900345.

Anonymous:1994:NDF

[8] Anonymous. Nynex develops fibre-optic infrastracture. Network Secu-rity, 1994(6):5, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900353.

Anonymous:1994:PUP

[9] Anonymous. Proginet unveils planto link IBM mainframes to Netware.Network Security, 1994(6):5, June1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900361.

Anonymous:1994:ULP

[10] Anonymous. US legislature pushesfor uniform online health privacyrules. Network Security, 1994(6):5–6, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589490037X.

Anonymous:1994:ERB

[11] Anonymous. Encryption restrictionsbind manufacturer’s hands. Net-work Security, 1994(6):6, June 1994.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900388.

Anonymous:1994:EC

[12] Anonymous. Electronic cash. Net-work Security, 1994(6):6, June 1994.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 52: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 52

URL http://www.sciencedirect.

com/science/article/pii/1353485894900396.

Anonymous:1994:CC

[13] Anonymous. CyberSAFE Chal-lenger 5.2.1. Network Security,1994(6):7, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589490040X.

Anonymous:1994:SSS

[14] Anonymous. SDI secures Shiva LANs.Network Security, 1994(6):7, June1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900418.

Anonymous:1994:SM

[15] Anonymous. Security manager. Net-work Security, 1994(6):7, June 1994.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900426.

Anonymous:1994:INS

[16] Anonymous. Increased NetSP secu-rity. Network Security, 1994(6):7, June1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900434.

Michaels:1994:LUL

[17] Steven Michaels. LAN users arelax on security. Network Secu-rity, 1994(6):8, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900442.

Riggs:1994:COC

[18] Brian Riggs. Cracking down ononline crime. Network Security,1994(6):8, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900450.

Highland:1994:HSD

[19] Harold Joseph Highland. How secure isdata over the Internet? Network Secu-rity, 1994(6):9–11, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900469.

Peterson:1994:FMT

[20] Padgett Peterson. The fortressmentality: Its time has comeagain. Network Security, 1994(6):12–13, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900477.

Hancock:1994:IPS

[21] William M. Hancock. Issues and prob-lems in secure remote access. Net-work Security, 1994(6):14–18, June1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900485.

Lindup:1994:TRH

[22] Ken Lindup. Is there a role for hack-ers in polite society? Network Secu-

Page 53: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 53

rity, 1994(6):19, June 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900493.

Armstrong:1994:PNS

[23] Lisa Armstrong. Are public net-works safe? Network Security,1994(7):2, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900019.

Snell:1994:PIN

[24] Monica Snell. Protecting the in-ternal network. Network Security,1994(7):2, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900027.

English:1994:CNI

[25] Erin English. Cache of nude im-ages found at nuclear weapons lab.Network Security, 1994(7):2–3, July1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900035.

Snell:1994:UUI

[26] Monica Snell. Users upset overInternet ads. Network Security,1994(7):3, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900043.

Anonymous:1994:CCD

[27] Anonymous. Changes to come for DCS.Network Security, 1994(7):3–4, July1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900051.

Anonymous:1994:LMO

[28] Anonymous. LAN mail to over-take host mail. Network Secu-rity, 1994(7):4, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589490006X.

Anonymous:1994:NPS

[29] Anonymous. Novell and PC se-curity collaborate. Network Secu-rity, 1994(7):4, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900078.

Anonymous:1994:CAM

[30] Anonymous. Communications avail-able to more countries. Network Se-curity, 1994(7):4, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900086.

Snell:1994:LNI

[31] Monica Snell. Lotus notes the In-ternet advantage. Network Security,1994(7):4–5, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900094.

Page 54: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 54

Armstrong:1994:SN

[32] Lisa Armstrong. A sparekey to Net-ware. Network Security, 1994(7):5, July1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900108.

Lawrence:1994:SCS

[33] L. G. Lawrence. Security in a clientserver environment. Network Secu-rity, 1994(7):5–15, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900116.

Gordon:1994:SSH

[34] S. Gordon and I. Nedelchev. Sniff-ing in the sun: History of adisaster. Network Security, 1994(7):16–19, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900124.

Anonymous:1994:Ea

[35] Anonymous. Events. Network Secu-rity, 1994(7):20, July 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900132.

Anonymous:1994:UCC

[36] Anonymous. US companies count In-ternet security options. Network Secu-rity, 1994(8):2, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900736.

Anonymous:1994:SCI

[37] Anonymous. Security for commerceon the Internet. Network Security,1994(8):2, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900744.

Anonymous:1994:RCS

[38] Anonymous. Ring of crime inScotland. Network Security, 1994(8):2–3, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900752.

Anonymous:1994:CMI

[39] Anonymous. CIA to mine In-ternet. Network Security, 1994(8):3, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900760.

Anonymous:1994:IVC

[40] Anonymous. IBM’s virus collec-tion grows. Network Security,1994(8):3, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900779.

Anonymous:1994:RNT

[41] Anonymous. Rise in number of tele-workers. Network Security, 1994(8):4, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),

Page 55: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 55

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900787.

Anonymous:1994:HWD

[42] Anonymous. Home workers de-mand ISDN. Network Security,1994(8):4, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900795.

Anonymous:1994:MPN

[43] Anonymous. Mobile phone net-work promoted. Network Security,1994(8):4, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900809.

Anonymous:1994:HRO

[44] Anonymous. High-rise optic links.Network Security, 1994(8):4, August1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900817.

Anonymous:1994:FRS

[45] Anonymous. Fund raising for satel-lite phone system. Network Security,1994(8):4–5, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900825.

Anonymous:1994:IRL

[46] Anonymous. Improved remote LANaccess. Network Security, 1994(8):5, August 1994. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900833.

Anonymous:1994:SAC

[47] Anonymous. Secure access for coun-cillors. Network Security, 1994(8):5, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900841.

Anonymous:1994:RLO

[48] Anonymous. Raxco launches omniguard.Network Security, 1994(8):5, August1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589490085X.

Anonymous:1994:NFS

[49] Anonymous. New firewall serverlaunched. Network Security, 1994(8):5, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900868.

Anonymous:1994:BAN

[50] Anonymous. Bell Atlantic networkdelayed. Network Security, 1994(8):5–6, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900876.

Anonymous:1994:RN

[51] Anonymous. Revamping the net!Network Security, 1994(8):6, August

Page 56: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 56

1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900884.

Anonymous:1994:PME

[52] Anonymous. PGP misconceptionsexplained. Network Security, 1994(8):6, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900892.

Anonymous:1994:CPFa

[53] Anonymous. Cellular phone fraud. Net-work Security, 1994(8):7–10, August1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900906.

Hancock:1994:IF

[54] Bill Hancock. Internet firewalls. Net-work Security, 1994(8):10–11, August1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900914.

Peterson:1994:FMP

[55] Padgett Peterson. The fortressmentality — Part II: The Inter-net. Network Security, 1994(8):11–14, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900922.

Ongetta:1994:EP

[56] Silvano Ongetta. Effectiveness ofpasswords. Network Security, 1994

(8):14–17, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900930.

Schifreen:1994:WMH

[57] Robert Schifreen. What motivatesa hacker? Network Security, 1994(8):17–19, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900949.

Anonymous:1994:Eb

[58] Anonymous. Events. Network Security,1994(8):19–20, August 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900957.

Anonymous:1994:HTC

[59] Anonymous. High-tech calling-cardnumber theft. Network Security,1994(9):2, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901554.

Anonymous:1994:BBO

[60] Anonymous. Bulletin board operatorsfined for piracy. Network Security,1994(9):2, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901562.

Page 57: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 57

Anonymous:1994:OP

[61] Anonymous. Online privacy. Net-work Security, 1994(9):2, September1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894901570.

Anonymous:1994:IBH

[62] Anonymous. The Internet becomes thehigh seas of piracy. Network Security,1994(9):2–3, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901589.

Anonymous:1994:CCP

[63] Anonymous. Combatting cellularphone fraud. Network Security, 1994(9):3, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901597.

Anonymous:1994:UGW

[64] Anonymous. US government wire-tapping updated. Network Security,1994(9):3, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901600.

Anonymous:1994:SHO

[65] Anonymous. Self-healing opticalnetworks. Network Security, 1994(9):3–4, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901619.

Anonymous:1994:NUD

[66] Anonymous. New UK data pro-tection registrar. Network Security,1994(9):4, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901627.

Anonymous:1994:NJ

[67] Anonymous. Net judges. Net-work Security, 1994(9):4, September1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894901635.

Anonymous:1994:AVU

[68] Anonymous. Australian virus up-date. Network Security, 1994(9):4–5, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901643.

Anonymous:1994:UMM

[69] Anonymous. UK messaging marketcommandeered. Network Security,1994(9):5, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901651.

Anonymous:1994:GTG

[70] Anonymous. Global telecoms growth.Network Security, 1994(9):5, Septem-ber 1994. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/135348589490166X.

Page 58: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 58

Anonymous:1994:TIS

[71] Anonymous. Taiwan invests in thesuperhighway era. Network Security,1994(9):5, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901678.

Anonymous:1994:HSO

[72] Anonymous. High-speed opticaltest bed. Network Security, 1994(9):5, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901686.

Anonymous:1994:BBC

[73] Anonymous. Baby Bells commit tomultimedia. Network Security, 1994(9):5–6, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901694.

Anonymous:1994:ECD

[74] Anonymous. Ericsson cooperateswith DynaSoft on security. Net-work Security, 1994(9):6, September1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894901708.

Anonymous:1994:MTA

[75] Anonymous. Microsoft and Telekomannounce multimedia venture. Net-work Security, 1994(9):6, September1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/1353485894901716.

Anonymous:1994:VPS

[76] Anonymous. Virus protection sys-tem for networks. Network Security,1994(9):6, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901724.

Anonymous:1994:NAN

[77] Anonymous. Norton administratorfor networks 1.5. Network Security,1994(9):6, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901732.

Cheek:1994:SHK

[78] Martin Cheek. Sidewinder helpskeep Internet better secured. Net-work Security, 1994(9):6–7, September1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894901740.

Snell:1994:PBM

[79] Monica Snell. Policies bring more se-curity to e-mail. Network Security,1994(9):7, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901759.

Hancock:1994:HPM

[80] Bill Hancock. Hazards of promiscuousmode programming. Network Security,1994(9):8–9, September 1994. CODEN

Page 59: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 59

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901767.

Hruska:1994:VCN

[81] Jan Hruska. Virus control on net-works: Solving the unsolvable. NetworkSecurity, 1994(9):10–13, September1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894901775.

Hansen:1994:UND

[82] Lesley Hansen. Use of network de-sign to reduce security risks. NetworkSecurity, 1994(9):13–17, September1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894901783.

Schifreen:1994:PSP

[83] Robert Schifreen. Preventing soft-ware piracy. Network Security, 1994(9):17–19, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901791.

Anonymous:1994:Ed

[84] Anonymous. Events. Network Security,1994(9):20, September 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901805.

Anonymous:1994:SLB

[85] Anonymous. Security leak at BT.Network Security, 1994(10):2, October

1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900507.

Anonymous:1994:CAS

[86] Anonymous. Computer abuse sur-veys. Network Security, 1994(10):2, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900515.

Anonymous:1994:ILF

[87] Anonymous. Internet liberationfront. Network Security, 1994(10):2–3, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900523.

Anonymous:1994:PCH

[88] Anonymous. Pressure to chargehacker. Network Security, 1994(10):3, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900531.

Anonymous:1994:CPFb

[89] Anonymous. Cellular phone fraudarrest. Network Security, 1994(10):3, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589490054X.

Page 60: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 60

Anonymous:1994:IPS

[90] Anonymous. Internet pirates saleagain. Network Security, 1994(10):3–4, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900558.

Anonymous:1994:NEI

[91] Anonymous. Nationwide EDI forIndia. Network Security, 1994(10):4, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900566.

Anonymous:1994:TGF

[92] Anonymous. Toronto gets Free-Net.Network Security, 1994(10):4, October1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900574.

Anonymous:1994:MLN

[93] Anonymous. Microsoft launch newonline service. Network Security,1994(10):4, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900582.

Anonymous:1994:PND

[94] Anonymous. PC network disasterrecovery. Network Security, 1994(10):5, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900590.

Anonymous:1994:GCB

[95] Anonymous. The great ‘cyber-bucks’give away. Network Security, 1994(10):5, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900604.

Anonymous:1994:HSS

[96] Anonymous. High speed switchingand networking. Network Security,1994(10):5, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900612.

Anonymous:1994:CUP

[97] Anonymous. Checks for under-performing networks. Network Se-curity, 1994(10):5, October 1994.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900620.

Anonymous:1994:CSN

[98] Anonymous. Crime and securitynetwork. Network Security, 1994(10):6, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900639.

Anonymous:1994:EEM

[99] Anonymous. EU ends monopolies onphone networks. Network Security,1994(10):6, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),

Page 61: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 61

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900647.

Armstrong:1994:IC

[100] Lisa Armstrong. Internet copy-rights. Network Security, 1994(10):6, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900655.

English:1994:IWP

[101] Erin English. Internet white pageswith PGP. Network Security, 1994(10):7, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900663.

Cheek:1994:FTC

[102] Martin Cheek. Financial transac-tions to come onto the Internet. Net-work Security, 1994(10):7, October1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900671.

Armstrong:1994:PDS

[103] Lisa Armstrong. PersonaCard 100data security token. Network Security,1994(10):7–8, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589490068X.

Hancock:1994:NKF

[104] Bill Hancock. Naming is the key tothe future. Network Security, 1994

(10):8–9, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900698.

Gordon:1994:ISC

[105] Sara Gordon. IRC and security —can the two co-exist? Network Se-curity, 1994(10):10–17, October 1994.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900701.

Schifreen:1994:HHD

[106] Robert Schifreen. How hackers doit. Network Security, 1994(10):17–19, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589490071X.

Anonymous:1994:Ee

[107] Anonymous. Events. Network Security,1994(10):20, October 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900728.

Anonymous:1994:LWN

[108] Anonymous. LAN/WAN news. Net-work Security, 1994(11):2–5, November1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900965.

Madsen:1994:CC

[109] Wayne Madsen. The Clipper con-troversy. Network Security, 1994

Page 62: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 62

(11):6–11, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900973.

Doyle:1994:TLS

[110] Frank Doyle. Tricks of the LAN se-curity trade. Network Security, 1994(11):12–13, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900981.

Madsen:1994:OIE

[111] Wayne Madsen. Online industrialespionage. Network Security, 1994(11):14–18, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589490099X.

Lindup:1994:CIU

[112] Ken Lindup. Commercial Internetuse: a new risk? Network Security,1994(11):19, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901007.

Anonymous:1994:Ef

[113] Anonymous. Events. Network Security,1994(11):20, November 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894901015.

Anonymous:1994:PCD

[114] Anonymous. Piracy charges dismissedagainst LaMacchia. Network Security,1994(12):2, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900140.

Anonymous:1994:CSS

[115] Anonymous. Computers security sup-port centre set up. Network Security,1994(12):2–3, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900159.

Anonymous:1994:CMN

[116] Anonymous. Corporate move tothe net. Network Security, 1994(12):3, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900167.

Anonymous:1994:CVG

[117] Anonymous. Cellular on the verge ofgoing mass market. Network Security,1994(12):3, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900175.

Anonymous:1994:AAA

[118] Anonymous. Axent announces acqui-sition of datamedia. Network Security,1994(12):4, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),

Page 63: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 63

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900183.

Anonymous:1994:VAP

[119] Anonymous. Virus alert programfor information highway users. Net-work Security, 1994(12):4, December1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900191.

Anonymous:1994:KMP

[120] Anonymous. Keeping e-mail pri-vate. Network Security, 1994(12):4, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900205.

Anonymous:1994:SNM

[121] Anonymous. Secure network man-agement initiative. Network Security,1994(12):4, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900213.

Armstrong:1994:BAS

[122] Lisa Armstrong. Bank of America se-cures the Internet. Network Security,1994(12):4–5, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900221.

Hall:1994:LBL

[123] Phil Hall. Laser beams as a LAN con-nectivity alternative. Network Security,

1994(12):5–6, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589490023X.

Schwartau:1994:NN

[124] Winn Schwartau. To net or notto net? Network Security, 1994(12):7–11, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900248.

Crocker:1994:IMI

[125] Norman Crocker. An introductionto MVS integrity concerns. NetworkSecurity, 1994(12):12–16, December1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900256.

Peterson:1994:DLA

[126] Padgett Peterson. Dangerous let-ters: ANSI bombs and forged e-mail. Network Security, 1994(12):17–19, December 1994. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485894900264.

Anonymous:1994:Eg

[127] Anonymous. Events. NetworkSecurity, 1994(12):19–20, December1994. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485894900272.

Page 64: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 64

Anonymous:1995:ISA

[128] Anonymous. IP spoofing attackslatest threat. Network Security,1995(1):2, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900599.

Anonymous:1995:OC

[129] Anonymous. Organizations in cy-berspace. Network Security, 1995(1):2, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900605.

Anonymous:1995:RBF

[130] Anonymous. Russians better at fight-ing phone fraud. Network Security,1995(1):2–3, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900617.

Anonymous:1995:BVS

[131] Anonymous. A boom in VANservices. Network Security, 1995(1):3, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900629.

Anonymous:1995:LS

[132] Anonymous. The LAN surges on.Network Security, 1995(1):3, January1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900630.

Anonymous:1995:CSM

[133] Anonymous. Concert seeking 10%of market. Network Security, 1995(1):3, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900642.

Anonymous:1995:SSD

[134] Anonymous. Securicor supplies datasecurity business service. NetworkSecurity, 1995(1):3–4, January 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900654.

Anonymous:1995:CCD

[135] Anonymous. CyberSource, the cyber-distributor. Network Security, 1995(1):4, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900666.

Anonymous:1995:NMR

[136] Anonymous. Network monitoring re-port generation system. Network Secu-rity, 1995(1):4, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900678.

Armstrong:1995:AI

[137] Lisa Armstrong. AT&T IVES. Net-work Security, 1995(1):4–5, January1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589890068X.

Page 65: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 65

Anonymous:1995:NLSa

[138] Anonymous. New level of securityfor global electronic trading. Net-work Security, 1995(1):5, January1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900691.

Anonymous:1995:FTT

[139] Anonymous. Fault-tolerant TCP/IP for LAN to mainframe con-nectivity. Network Security, 1995(1):5, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900708.

Anonymous:1995:AII

[140] Anonymous. Award for IBM’s Inter-net security firewall. Network Secu-rity, 1995(1):5, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890071X.

Anonymous:1995:FNS

[141] Anonymous. Flood of network se-curity products. Network Security,1995(1):5–6, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900721.

English:1995:SKS

[142] Erin English. MIT scales upKerberos security system for In-ternet. Network Security, 1995(1):6, January 1995. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900733.

English:1995:NCP

[143] Erin English. A new certifica-tion programme for network se-curity. Network Security, 1995(1):6–7, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900745.

English:1995:SMS

[144] Erin English. Security made sim-ple with SOCKS. Network Security,1995(1):7, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900757.

Wolfe:1995:IT

[145] Henry Wolfe. The Internet threat. Net-work Security, 1995(1):7–8, January1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800800380.

Schwartau:1995:PAPa

[146] Winn Schwartau. Password alterna-tives — Part 1. Network Security,1995(1):9–13, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800392.

Page 66: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 66

Kovacich:1995:LAN

[147] Gerald L. Kovacich. Local area net-works security: Establishing policiesand procedures. Network Security,1995(1):13–16, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800409.

Saxby:1995:EMP

[148] Stephen Saxby. Electronic moni-toring poses e-mail dilemma. Net-work Security, 1995(1):17–18, January1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900769.

Zajac:1995:BRM

[149] Bernard P. Zajac. Book review: E-Mail Security — How To Keep YourElectronic Messages Private: BruceSchneier, published by John Wi-ley & Sons at $24.95. ISBN 0-471-05318-X. Network Security, 1995(1):18–19, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900770.

Anonymous:1995:Ea

[150] Anonymous. Events. Network Security,1995(1):20, January 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900782.

Anonymous:1995:TEV

[151] Anonymous. Telnet encryption vul-nerability. Network Security, 1995

(2):2, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901132.

Anonymous:1995:VM

[152] Anonymous. Vulnerabilities in/bin/mail. Network Security, 1995(2):2–3, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901140.

Anonymous:1995:HLT

[153] Anonymous. Hacker leaves threat-ening messages. Network Security,1995(2):3, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901159.

Lindup:1995:MA

[154] Ken Lindup. Mitnick arrested. Net-work Security, 1995(2):3–4, February1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901167.

Anonymous:1995:BCA

[155] Anonymous. BR complains aboutcounterfeit NetWare. Network Security,1995(2):4, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901175.

Page 67: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 67

Anonymous:1995:GCG

[156] Anonymous. Global communicationsgroup formed. Network Security,1995(2):4, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901183.

Anonymous:1995:SCI

[157] Anonymous. Support for corporateInternet users. Network Security,1995(2):4, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901191.

Anonymous:1995:MNR

[158] Anonymous. Microsoft Network re-ceives mixed response. Network Se-curity, 1995(2):4–5, February 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901205.

Anonymous:1995:OBG

[159] Anonymous. Online banking growth.Network Security, 1995(2):5, February1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901213.

Anonymous:1995:DPB

[160] Anonymous. Draft plans to breakEuropean telecoms monopolies. Net-work Security, 1995(2):5, February1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901221.

Anonymous:1995:GW

[161] Anonymous. The growing Web. Net-work Security, 1995(2):5, February1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589590123X.

Anonymous:1995:EUN

[162] Anonymous. Eliminate unauthorizednetwork access. Network Security,1995(2):5–6, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901248.

Snell:1995:SSI

[163] Monica Snell. Secure shopping onthe Internet. Network Security,1995(2):6, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901256.

Armstrong:1995:ES

[164] Lisa Armstrong. Endorsements forSHTTP. Network Security, 1995(2):6–7, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901264.

English:1995:PTP

[165] Erin English. Passwords throughpagers. Network Security, 1995(2):7, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901272.

Page 68: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 68

Hancock:1995:ARN

[166] Bill Hancock. Assessing and reduc-ing network risk. Network Security,1995(2):7–9, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800410.

Zajac:1995:CVL

[167] Bernard P. Zajac. Computer viruses— legal options. Network Security,1995(2):9–10, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800422.

Schwartau:1995:PAPb

[168] Winn Schwartau. Password alterna-tives — Part 2. Network Security, 1995(2):11–15, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800434.

Kovacich:1995:SRV

[169] Gerald Kovacich. Security require-ments for voice messaging opera-tions. Network Security, 1995(2):15–18, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800446.

Lindup:1995:HW

[170] Ken Lindup. The hacker war. Net-work Security, 1995(2):19, February1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/1353485895901280.

Anonymous:1995:Eb

[171] Anonymous. Events. Network Security,1995(2):20, February 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901299.

Anonymous:1995:SV

[172] Anonymous. Sendmail vulnerabilities.Network Security, 1995(3):2, March1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901302.

Anonymous:1995:CVa

[173] Anonymous. ‘at’ and ‘cron’ vul-nerabilities. Network Security, 1995(3):2–3, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901310.

Anonymous:1995:PAV

[174] Anonymous. Providers not accountablefor virus distribution. Network Secu-rity, 1995(3):3, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901329.

Anonymous:1995:NSSa

[175] Anonymous. Natas spreads in south-western United States. Network Secu-rity, 1995(3):3, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),

Page 69: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 69

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901337.

Anonymous:1995:BOI

[176] Anonymous. Boom in online in-formation. Network Security, 1995(3):3–4, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901345.

Anonymous:1995:AOP

[177] Anonymous. America Online plansto sell 5% stake. Network Secu-rity, 1995(3):4, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901353.

Anonymous:1995:ACN

[178] Anonymous. ACE/Client for NetWare.Network Security, 1995(3):4, March1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589590137X.

Anonymous:1995:NEA

[179] Anonymous. New Ethernet adaptercard. Network Security, 1995(3):4, March 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485895901361.

Anonymous:1995:SBL

[180] Anonymous. Small businesses linkthrough BT. Network Security,1995(3):4–5, March 1995. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901388.

Riggs:1995:TTR

[181] Brian Riggs. Top to tail router security.Network Security, 1995(3):5, March1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901396.

Snell:1995:ASS

[182] Monica Snell. AT&T strengthen secu-rity of Network Notes. Network Secu-rity, 1995(3):5, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589590140X.

Thomsen:1995:ISS

[183] Dan Thomsen. IP spoofing and ses-sion hijacking. Network Security,1995(3):6–11, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800458.

Sheffield:1995:NRPa

[184] Chris Sheffield. Network review —Part 1. Network Security, 1995(3):11–16, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580080046X.

Lindup:1995:AKM

[185] Ken Lindup. The arrest of KevinMitnick. Network Security, 1995

Page 70: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 70

(3):16–19, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800471.

Anonymous:1995:Ec

[186] Anonymous. Events. Network Secu-rity, 1995(3):20, March 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901418.

Anonymous:1995:GTH

[187] Anonymous. ‘Good Times’ is a hoax.Network Security, 1995(4):2, April1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897005.

Anonymous:1995:SCD

[188] Anonymous. Satan costs devel-oper his job. Network Security,1995(4):2, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902090.

Anonymous:1995:HCC

[189] Anonymous. Hacker charged inCanada. Network Security, 1995(4):2, April 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485895902104.

Anonymous:1995:CPH

[190] Anonymous. Child porn hackersentenced. Network Security, 1995

(4):2–3, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902112.

Anonymous:1995:BEG

[191] Anonymous. BT engineer guilty ofpiracy. Network Security, 1995(4):3, April 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485896897017.

Anonymous:1995:WWW

[192] Anonymous. World Wide Web needsa security boost. Network Secu-rity, 1995(4):3, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902120.

Anonymous:1995:BMM

[193] Anonymous. BT makes moves inSweden and Italy. Network Secu-rity, 1995(4):3–4, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902139.

Anonymous:1995:FLM

[194] Anonymous. Fibre links for ma-jor buildings. Network Security,1995(4):4, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902147.

Page 71: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 71

Anonymous:1995:IIS

[195] Anonymous. Investing in Inter-net security. Network Security,1995(4):4, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902155.

Anonymous:1995:III

[196] Anonymous. IBM increases In-ternet services. Network Security,1995(4):4, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902163.

Anonymous:1995:PDS

[197] Anonymous. Private drive on su-perhighway. Network Security, 1995(4):4–5, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902171.

Anonymous:1995:UPF

[198] Anonymous. Users prefer frame re-lay. Network Security, 1995(4):5, April1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589590218X.

Anonymous:1995:SDE

[199] Anonymous. SentryLink data en-cryption devices. Network Secu-rity, 1995(4):5, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902201.

Anonymous:1995:MPB

[200] Anonymous. MCI and Pacific Bell of-fer Internet services. Network Secu-rity, 1995(4):5, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902198.

Anonymous:1995:FTW

[201] Anonymous. Fault tolerant Web server.Network Security, 1995(4):6, April1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589590221X.

Anonymous:1995:DAS

[202] Anonymous. Defender authentica-tion software. Network Security,1995(4):6, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902228.

Anonymous:1995:NSPa

[203] Anonymous. Network securityplus. Network Security, 1995(4):6–7, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902236.

Armstrong:1995:C

[204] Lisa Armstrong. CyberGuard. Net-work Security, 1995(4):7, April 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897029.

Page 72: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 72

Armstrong:1995:IT

[205] Lisa Armstrong. Info-terrorism. Net-work Security, 1995(4):7–8, April1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897030.

Armstrong:1995:SP

[206] Lisa Armstrong. Secure PBX. Net-work Security, 1995(4):8, April 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897042.

Riggs:1995:VA

[207] Brian Riggs. Vaulting with ATM.Network Security, 1995(4):8–9, April1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897054.

Sheffield:1995:NRPb

[208] Chris Sheffield. Network review —Part 2. Network Security, 1995(4):9–13, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897078.

Armstrong:1995:OSC

[209] Lisa Armstrong. Oracle Secure C/S.Network Security, 1995(4):9, April1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897066.

Saxby:1995:GSP

[210] Stephen Saxby. G7 Summit poseschallenge to governments on publicaccess to official information. Net-work Security, 1995(4):14–15, April1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589689708X.

Anonymous:1995:Ed

[211] Anonymous. Events. Network Security,1995(4):15–16, April 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902244.

Anonymous:1995:BHT

[212] Anonymous. The birth of the‘hacker-tracker’. Network Security,1995(5):2, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901922.

Anonymous:1995:DIS

[213] Anonymous. Developments in In-ternet security. Network Security,1995(5):2, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901930.

Anonymous:1995:KFH

[214] Anonymous. Korea fights the hack-ers. Network Security, 1995(5):2, May1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901949.

Page 73: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 73

Anonymous:1995:FNI

[215] Anonymous. Fears of Net insecurity.Network Security, 1995(5):2–3, May1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901957.

Anonymous:1995:FAH

[216] Anonymous. Fixes for AIX holes.Network Security, 1995(5):3, May1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901965.

Anonymous:1995:FUF

[217] Anonymous. Firewalls under fire.Network Security, 1995(5):3–4, May1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901973.

Anonymous:1995:FFA

[218] Anonymous. Further fights againstmobile phone fraud. Network Secu-rity, 1995(5):4–5, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901981.

Anonymous:1995:IIN

[219] Anonymous. Internet interest notnecessarily business. Network Secu-rity, 1995(5):5, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589590199X.

Anonymous:1995:UFO

[220] Anonymous. US fibre-optic ca-bles set to triple. Network Secu-rity, 1995(5):5, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902007.

Anonymous:1995:ISIa

[221] Anonymous. Internet security is-sues addressed. Network Security,1995(5):5–6, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902015.

Anonymous:1995:SUI

[222] Anonymous. SITA unveils In-ternet service. Network Security,1995(5):6, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902023.

Anonymous:1995:CSS

[223] Anonymous. Client/server secu-rity package. Network Security,1995(5):6, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589590204X.

Anonymous:1995:NSI

[224] Anonymous. Netscape’s SSL In-ternet security. Network Security,1995(5):6, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),

Page 74: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 74

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902031.

Anonymous:1995:AANa

[225] Anonymous. ANR addresses net-work security issues. Network Secu-rity, 1995(5):6–7, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902058.

Anonymous:1995:SWS

[226] Anonymous. Secrets for Windows, se-curity for Internet. Network Secu-rity, 1995(5):7, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902066.

Anonymous:1995:PSN

[227] Anonymous. PCMCIA security fornotebooks and Novell LANs. Net-work Security, 1995(5):7, May 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895902074.

English:1995:IVH

[228] Erin English. IP Version 6 holdspromise for the future. Network Secu-rity, 1995(5):7–8, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897091.

Bournellis:1995:PET

[229] Cynthia Bournellis. Putting an end totoo many passwords. Network Secu-

rity, 1995(5):8, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897108.

English:1995:SDG

[230] Erin English. SATAN does notgo undetected. Network Security,1995(5):8–9, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589689711X.

Bucholtz:1995:SCS

[231] Chris Bucholtz. Suit challenges sta-tus of cryptography as munition.Network Security, 1995(5):9, May1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897121.

Hancock:1995:SMY

[232] Bill Hancock. Stop that e-mail!You are probably breaking thelaw! Network Security, 1995(5):10–12, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897133.

Gordon:1995:DA

[233] Sarah Gordon. Devil’s advo-cate. Network Security, 1995(5):12–15, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897145.

Page 75: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 75

Sheffield:1995:NRPc

[234] Chris Sheffield. Network review —Part 3. Network Security, 1995(5):15–19, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897157.

Anonymous:1995:Ee

[235] Anonymous. Events. Network Secu-rity, 1995(5):20, May 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902082.

Anonymous:1995:CISa

[236] Anonymous. Cisco IOS softwarevulnerability. Network Security,1995(6):2, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901701.

Anonymous:1995:HMP

[237] Anonymous. Hackers monitored po-lice. Network Security, 1995(6):2, June1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589590171X.

Anonymous:1995:URS

[238] Anonymous. Underground recon-naissance service. Network Secu-rity, 1995(6):2, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901728.

Anonymous:1995:BBC

[239] Anonymous. Black Baron con-victed. Network Security, 1995(6):2–3, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901736.

Anonymous:1995:HPC

[240] Anonymous. Hackers penetrate col-lege computers. Network Security,1995(6):3, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901744.

Anonymous:1995:OCT

[241] Anonymous. Outfoxing the cel-lular thieves. Network Security,1995(6):3, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901752.

Anonymous:1995:BBF

[242] Anonymous. Bulter Bunny foundguilty. Network Security, 1995(6):3, June 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485895901760.

Anonymous:1995:RPI

[243] Anonymous. Row puts Internet pro-vision in doubt. Network Secu-rity, 1995(6):4, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),

Page 76: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 76

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901779.

Anonymous:1995:IGP

[244] Anonymous. Internet goes pri-vate in Brazil. Network Security,1995(6):4, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901787.

Anonymous:1995:IA

[245] Anonymous. Infohighway in Africa?Network Security, 1995(6):4, June1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901795.

Anonymous:1995:ISIb

[246] Anonymous. Internet steals interna-tional phone calls. Network Secu-rity, 1995(6):4–5, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901809.

Anonymous:1995:MRA

[247] Anonymous. Mergent reaches agree-ment with Bull. Network Secu-rity, 1995(6):5, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901817.

Anonymous:1995:EEW

[248] Anonymous. Europe encrypts weatherdata. Network Security, 1995(6):5, June 1995. CODEN NTSCF5.

ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485896897169.

Anonymous:1995:MNP

[249] Anonymous. Microsoft network pushesinto electronic commerce. NetworkSecurity, 1995(6):5–6, June 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901825.

Anonymous:1995:BMA

[250] Anonymous. Broad multimedia al-liance. Network Security, 1995(6):6, June 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485895901833.

Anonymous:1995:IMA

[251] Anonymous. ICL and Motorola allyfor network security. Network Secu-rity, 1995(6):6, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901841.

Anonymous:1995:NSD

[252] Anonymous. Nortel and Shiva di-rect Internet traffic. Network Secu-rity, 1995(6):6, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589590185X.

Page 77: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 77

Anonymous:1995:MPS

[253] Anonymous. Motorola pushes its se-curity portfolio. Network Security,1995(6):6–7, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897170.

Anonymous:1995:NSA

[254] Anonymous. Network security as-sessment tool. Network Security,1995(6):7, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901868.

Anonymous:1995:MHF

[255] Anonymous. Motorola helps firmsprotect data. Network Security,1995(6):7, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901876.

Anonymous:1995:FDB

[256] Anonymous. Financial data backedup by ISDN. Network Security,1995(6):7, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901884.

Anonymous:1995:ISIc

[257] Anonymous. Internet security im-proved. Network Security, 1995(6):7–8, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901892.

Bucholtz:1995:NSB

[258] Chris Bucholtz. Networks sufferbackup blues. Network Security,1995(6):8, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901906.

Anonymous:1995:TSD

[259] Anonymous. The ‘TouchLock’ se-curity device. Network Security,1995(6):8, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897182.

Anonymous:1995:IGF

[260] Anonymous. Indian groups face in-creased Government electronic surveil-lance. Network Security, 1995(6):9, June 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485896897194.

Riggs:1995:CPF

[261] Brian Riggs. Church puts freedomof Internet on trial. Network Secu-rity, 1995(6):10, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897212.

Page 78: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 78

Bucholtz:1995:JSH

[262] Chris Bucholtz. Judge says hackerdeserves more time. Network Secu-rity, 1995(6):10, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897200.

Bucholtz:1995:STC

[263] Chris Bucholtz. Security takescentre stage at Internet confer-ence. Network Security, 1995(6):10–11, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897224.

Kaneshige:1995:BI

[264] Tom Kaneshige. Banking on the In-ternet. Network Security, 1995(6):11, June 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485896897236.

Bucholtz:1995:UWG

[265] Chris Bucholtz. US war gamesfought. Network Security, 1995(6):11–12, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897248.

Bucholtz:1995:NSF

[266] Chris Bucholtz. Network secu-rity far too lax. Network Secu-rity, 1995(6):12, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589689725X.

Hancock:1995:SSE

[267] Bill Hancock. Simple social en-gineering. Network Security, 1995(6):13–14, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897261.

Worlock:1995:CCSa

[268] David R. Worlock. The cultureof control: Safeguarding intellec-tual property in the age of net-works — Part 1. Network Security,1995(6):14–17, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897273.

Saxby:1995:NRL

[269] Stephen Saxby. Network-related law— recent decisions from USA. Net-work Security, 1995(6):18–19, June1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897285.

Anonymous:1995:Ef

[270] Anonymous. Events. Network Secu-rity, 1995(6):20, June 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901914.

Page 79: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 79

Anonymous:1995:PT

[271] Anonymous. PKZIP Trojan. Net-work Security, 1995(7):2, July 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895900942.

Anonymous:1995:RPC

[272] Anonymous. Regulation of pornin cyberspace. Network Security,1995(7):2, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900950.

Anonymous:1995:CVb

[273] Anonymous. Caibua virus. Net-work Security, 1995(7):2–3, July 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895900969.

Anonymous:1995:CFB

[274] Anonymous. Campaign to fight $3 bil-lion a year problem. Network Secu-rity, 1995(7):3, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900977.

Anonymous:1995:SPP

[275] Anonymous. Swedish pirates pros-ecuted. Network Security, 1995(7):3, July 1995. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/1353485895900993.

Anonymous:1995:YVH

[276] Anonymous. The year of thevirus hoax. Network Security,1995(7):3, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900985.

Anonymous:1995:SWR

[277] Anonymous. Security worries withRegistration Wizard. Network Secu-rity, 1995(7):4, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901000.

Anonymous:1995:FAS

[278] Anonymous. Federal agency to se-cure infohighway. Network Secu-rity, 1995(7):4, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901019.

Anonymous:1995:NEV

[279] Anonymous. New electronic veri-fication standard. Network Secu-rity, 1995(7):4, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901027.

Anonymous:1995:WOP

[280] Anonymous. The worries of on-line purchasers. Network Security,1995(7):4–5, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),

Page 80: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 80

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901035.

Anonymous:1995:RN

[281] Anonymous. Radio over the Net.Network Security, 1995(7):5, July1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901043.

Anonymous:1995:NEO

[282] Anonymous. Novell and EUNet of-fer Internet connection. Network Se-curity, 1995(7):5, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589590106X.

Anonymous:1995:EN

[283] Anonymous. The electric network.Network Security, 1995(7):5, July1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901051.

Anonymous:1995:FKO

[284] Anonymous. Firewalls to keep on-line spies at bay. Network Secu-rity, 1995(7):6, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901078.

Anonymous:1995:WAV

[285] Anonymous. Windows anti-virus vir-tual device driver. Network Secu-rity, 1995(7):6, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901094.

Anonymous:1995:PGW

[286] Anonymous. Protection as good asat the Whitehouse. Network Secu-rity, 1995(7):6, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901086.

Anonymous:1995:MSE

[287] Anonymous. Message security for elec-tronic communications. Network Secu-rity, 1995(7):6–7, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901108.

Anonymous:1995:SMM

[288] Anonymous. Secure e-mail forMicrosoft-Mail users. Network Secu-rity, 1995(7):7, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897297.

Kaneshige:1995:GRS

[289] Thomas Kaneshige. Government’s rolein superhighway security. Network Se-curity, 1995(7):7, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901116.

Kaneshige:1995:SGU

[290] Tom Kaneshige. Software giants uniteto filter the Net. Network Secu-

Page 81: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 81

rity, 1995(7):8, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897303.

Bucholtz:1995:VMS

[291] Chris Bucholtz. Visa and Mas-terCard settle on Internet secu-rity standard. Network Security,1995(7):8–9, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897315.

Bucholtz:1995:EEC

[292] Chris Bucholtz. Encryption ex-ports, Clipper policy criticized byconsortium. Network Security,1995(7):9, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897327.

Beseke:1995:DCI

[293] Kermit Beseke. Developing a corpo-rate Internet policy. Network Security,1995(7):10–13, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897339.

Worlock:1995:CCSb

[294] David R. Worlock. The cultureof control: Safeguarding intellec-tual property in the age of net-works — Part 2. Network Security,1995(7):13–17, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897340.

Peterson:1995:FMPa

[295] Padgett Peterson. The fortress men-tality — Part III: Tokens, one-time password devices and the Ro-man Army. Network Security, 1995(7):17–19, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897352.

Anonymous:1995:Eg

[296] Anonymous. Events. Network Secu-rity, 1995(7):20, July 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901124.

Anonymous:1995:FHC

[297] Anonymous. French hacker cracksNetscape code. Network Security,1995(8):2, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900802.

Anonymous:1995:SVV

[298] Anonymous. Sendmail V.5 vul-nerability. Network Security, 1995(8):2, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900810.

Page 82: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 82

Anonymous:1995:JBH

[299] Anonymous. Japanese battle hack-ers, viruses. Network Security, 1995(8):2–3, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900829.

Anonymous:1995:CBA

[300] Anonymous. Citicorp bank ac-counts breached. Network Security,1995(8):3, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900837.

Anonymous:1995:SEE

[301] Anonymous. Stronger encryption ex-portable. Network Security, 1995(8):3, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900845.

Anonymous:1995:BSA

[302] Anonymous. Bringing security toATM. Network Security, 1995(8):3–4, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900853.

Anonymous:1995:ENE

[303] Anonymous. Europe negotiatesover encryption. Network Security,1995(8):4, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900861.

Anonymous:1995:NGP

[304] Anonymous. Netscape goes public.Network Security, 1995(8):4, August1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589590087X.

Anonymous:1995:AFN

[305] Anonymous. AT&T finally noticesthe Internet. Network Security,1995(8):4, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900888.

Anonymous:1995:A

[306] Anonymous. The authorizer. Net-work Security, 1995(8):4–5, August1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895900896.

Anonymous:1995:NLSb

[307] Anonymous. Netscape’s latest se-curity effort. Network Security,1995(8):5, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589590090X.

Anonymous:1995:NGN

[308] Anonymous. New generation net-work security product. Network Secu-rity, 1995(8):5, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),

Page 83: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 83

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900926.

Anonymous:1995:NSE

[309] Anonymous. NetCop scans for ex-plicit material. Network Security,1995(8):5, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900918.

Bucholtz:1995:PMP

[310] Chris Bucholtz. Pilot’s e-mail has Pen-tagon up in arms. Network Security,1995(8):5–6, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897364.

Kaneshige:1995:FSS

[311] Thomas Kaneshige. Full ser-vice security shop to ward offhackers. Network Security, 1995(8):6, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897376.

Kaneshige:1995:SSR

[312] Thomas Kaneshige. Security systemsfor the road most travelled. Net-work Security, 1995(8):6–7, August1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897388.

Bournellis:1995:IPD

[313] Cynthia Bournellis. Internet projectdefines middle ground. Network Secu-rity, 1995(8):7, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589689739X.

English:1995:CCJ

[314] Erin English. CyberCash and Check-free join forces. Network Security,1995(8):7–8, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897406.

Cohen:1995:IHPa

[315] Fred Cohen. Internet holes —Part 1: Internet control messageprotocol. Network Security, 1995(8):8–10, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589689742X.

English:1995:CUN

[316] Erin English. CyberAngels uniteon the net. Network Security,1995(8):8, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897418.

Shaer:1995:SS

[317] Caroline Shaer. Single sign-on. Net-work Security, 1995(8):11–15, August1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 84: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 84

URL http://www.sciencedirect.

com/science/article/pii/1353485896897431.

Ongetta:1995:EDI

[318] Silvano Ongetta. Electronic data in-terchange — what are the securitymeasures? Network Security, 1995(8):16–19, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897443.

Anonymous:1995:Eh

[319] Anonymous. Events. Network Security,1995(8):19–20, August 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900934.

Anonymous:1995:NSSb

[320] Anonymous. Netscape’s software se-curity scare. Network Security, 1995(9):2, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900594.

Anonymous:1995:SPV

[321] Anonymous. Solaris ps vulnera-bility. Network Security, 1995(9):2–3, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900608.

Anonymous:1995:NSPb

[322] Anonymous. New security patchesfrom Sun. Network Security, 1995(9):3, September 1995. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900616.

Anonymous:1995:SSV

[323] Anonymous. Sun Sendmail -oR vul-nerability. Network Security, 1995(9):3–4, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900624.

Anonymous:1995:UCT

[324] Anonymous. Undercover cybercopstrap hackers. Network Security, 1995(9):4, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900632.

Anonymous:1995:TUI

[325] Anonymous. Ties to US in-telligence for domain name as-signer. Network Security, 1995(9):4, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900640.

Anonymous:1995:AOF

[326] Anonymous. America Online fightshackers. Network Security, 1995(9):4, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900659.

Page 85: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 85

Anonymous:1995:OCP

[327] Anonymous. Online child pornographydebate continues. Network Security,1995(9):5, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900667.

Anonymous:1995:MWS

[328] Anonymous. Malicious Word spreadsto the Net. Network Security, 1995(9):5, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900675.

Anonymous:1995:DAV

[329] Anonymous. Document about viruscontains one. Network Security, 1995(9):5, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900683.

Rees:1995:ELB

[330] Frank Rees. An expensive lesson forbulletin board user. Network Security,1995(9):6, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900691.

Anonymous:1995:MISa

[331] Anonymous. Microsoft’s Internet secu-rity claims criticized. Network Security,1995(9):6, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897455.

Anonymous:1995:ECP

[332] Anonymous. Electronic chequesplanned. Network Security, 1995(9):6–7, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900705.

Anonymous:1995:MSM

[333] Anonymous. Mobile services mar-ket set to triple. Network Security,1995(9):7, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900713.

Anonymous:1995:MISb

[334] Anonymous. Making the Internet asafer place. Network Security, 1995(9):7, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900721.

Anonymous:1995:AST

[335] Anonymous. AT&T splits intothree. Network Security, 1995(9):8, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589590073X.

Anonymous:1995:INL

[336] Anonymous. Integrity of networklink guaranteed. Network Security,

Page 86: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 86

1995(9):8, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485895900748.

Anonymous:1995:SWV

[337] Anonymous. Sophos’ Windows 95virus scanner. Network Security,1995(9):8, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485895900756.

Anonymous:1995:HSL

[338] Anonymous. DES for HDLC/SDLC links. Network Security, 1995(9):8, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485895900764.

Anonymous:1995:IFI

[339] Anonymous. Internet firewall fromIntegralis. Network Security, 1995(9):8–9, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900772.

Barry:1995:SUL

[340] David Barry. SNMP upgrade to lose se-curity features. Network Security, 1995(9):9–10, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897479.

Davis:1995:FC

[341] Cindy Davis. Firewall consor-tium. Network Security, 1995(9):9, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900780.

Anonymous:1995:NSN

[342] Anonymous. New secure Netproducts. Network Security, 1995(9):9, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897467.

Kaneshige:1995:FPO

[343] Thomas Kaneshige. FBI to po-lice online amidst heated contro-versy. Network Security, 1995(9):10, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897480.

Hancock:1995:ANR

[344] Bill Hancock. Attacking networkrouters. Network Security, 1995(9):11–12, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897492.

Peterson:1995:FMPb

[345] Padgett Peterson. The fortress men-tality — Part IV: Telecomputing,telecommuting and serving remote cus-tomers. Network Security, 1995(9):

Page 87: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 87

12–14, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897509.

Cohen:1995:IHPb

[346] Fred Cohen. Internet holes —Part 2: Packet fragmentation at-tacks. Network Security, 1995(9):14–16, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897510.

Herschberg:1995:ICI

[347] Bob Herschberg and Edo Roos Lind-green. Internet: a certain inse-curity. Network Security, 1995(9):16–19, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897522.

Anonymous:1995:Ei

[348] Anonymous. Events. Network Security,1995(9):20, September 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895900799.

Anonymous:1995:SLV

[349] Anonymous. Sun 4.1x loadmod-ule vulnerability. Network Security,1995(10):2, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902570.

Anonymous:1995:SVW

[350] Anonymous. syslog vulnerabil-ity workaround. Network Security,1995(10):2, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902589.

Anonymous:1995:TDV

[351] Anonymous. Telnet daemon vul-nerabilities. Network Security, 1995(10):2–3, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902597.

Anonymous:1995:ISC

[352] Anonymous. Internet security code.Network Security, 1995(10):3, October1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895902600.

Anonymous:1995:GCN

[353] Anonymous. Growing cellular net-works in China. Network Security,1995(10):3–4, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902619.

Anonymous:1995:SPC

[354] Anonymous. Secure payments fromCybercash. Network Security, 1995(10):4, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902627.

Page 88: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 88

Anonymous:1995:DIC

[355] Anonymous. The digital ID case.Network Security, 1995(10):4, October1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895902635.

Anonymous:1995:MLM

[356] Anonymous. Microsoft and Lotusmake net moves. Network Security,1995(10):4–5, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902643.

Anonymous:1995:FPF

[357] Anonymous. Firewall partnershipformed. Network Security, 1995(10):5, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902651.

Anonymous:1995:SST

[358] Anonymous. Single sign-on tech-nology. Network Security, 1995(10):5, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902678.

Anonymous:1995:FSN

[359] Anonymous. Firewall security for net-work applications. Network Security,1995(10):5, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902686.

Anonymous:1995:AANb

[360] Anonymous. Azlan’s alliance withNetscape and supernet. NetworkSecurity, 1995(10):5, October 1995.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/135348589590266X.

Anonymous:1995:FRE

[361] Anonymous. Frame relay encryp-tor protects. Network Security, 1995(10):5–6, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902694.

Anonymous:1995:HPE

[362] Anonymous. H-P’s encryption en-gine proposal. Network Security,1995(10):6, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897534.

English:1995:OES

[363] Erin English. Oracle expands sup-port for Oracle7. Network Security,1995(10):6, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902708.

English:1995:OEF

[364] Erin English. Oracle embracesFortezza. Network Security, 1995(10):7, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),

Page 89: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 89

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897558.

Bournellis:1995:RNF

[365] Cynthia Bournellis. RSA negoti-ates with firewall vendors to es-tablish VPNs. Network Security,1995(10):7, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897546.

Bucholtz:1995:NAS

[366] Chris Bucholtz. Netscape an-swers security lapses with anti-bugcontest. Network Security, 1995(10):7–8, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589689756X.

Kaneshige:1995:AIC

[367] Thomas Kaneshige. Auto in-dustry to create its own net-work. Network Security, 1995(10):8, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897571.

Hancock:1995:ECI

[368] Bill Hancock. Export of cryptographicinformation from the US: a brief lookat the problems. Network Security,1995(10):9–11, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897583.

Cohen:1995:IHPc

[369] Fred Cohen. Internet holes — Part3: The sendmail maelstrom. NetworkSecurity, 1995(10):11–12, October1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896897595.

Schultz:1995:NPF

[370] E. Eugene Schultz. A new perspectiveon firewalls. Network Security, 1995(10):13–17, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897601.

Banes:1995:PLN

[371] D. W. Banes. Physical layer net-work security: What your LAN cando for you. Network Security, 1995(10):17–19, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897613.

Anonymous:1995:Ej

[372] Anonymous. Events. Network Security,1995(10):20, October 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895902716.

Anonymous:1995:SGI

[373] Anonymous. Silicon Graphics Inc.’sIp vulnerability. Network Security,1995(11):2, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),

Page 90: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 90

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901426.

Anonymous:1995:UCL

[374] Anonymous. 30 US companies lose$66 million. Network Security, 1995(11):2, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901434.

Anonymous:1995:FOW

[375] Anonymous. FBI outlines a wiretap-ping future. Network Security, 1995(11):2–3, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901442.

Anonymous:1995:FFT

[376] Anonymous. Flaw in fault-tolerancesoftware. Network Security, 1995(11):3, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897625.

Madsen:1995:FRC

[377] Wayne Madsen. Fortezza reaches intocivilian agencies. Network Security,1995(11):3, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901450.

Anonymous:1995:CCI

[378] Anonymous. Companies crack downon Internet use. Network Security,

1995(11):3, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901469.

Anonymous:1995:CISb

[379] Anonymous. Check in at Internet siteto check security. Network Security,1995(11):3–4, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901477.

Anonymous:1995:WNI

[380] Anonymous. Woe is the Net, oris it? Network Security, 1995(11):4, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901485.

Anonymous:1995:CWS

[381] Anonymous. Choosing a Webstandard. Network Security, 1995(11):4, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901493.

Anonymous:1995:PSV

[382] Anonymous. Product scans for virusesbefore a download. Network Security,1995(11):4, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901507.

Page 91: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 91

Anonymous:1995:SSN

[383] Anonymous. Single sign-on networksecurity. Network Security, 1995(11):4–5, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901515.

Anonymous:1995:MIM

[384] Anonymous. Merlin’s Internetmagic. Network Security, 1995(11):5, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901523.

Anonymous:1995:IUA

[385] Anonymous. Internet user authen-tication security. Network Security,1995(11):5, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901531.

Anonymous:1995:DSP

[386] Anonymous. OS/2 data securityproduct to integrate IBM’s secu-rity hooks. Network Security, 1995(11):5, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589590154X.

Browne:1995:UKL

[387] Graham Browne. Using DES with keyslonger than 56 bits. Network Security,1995(11):5–6, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897637.

Hancock:1995:RHK

[388] Bill Hancock. Recent history of knownnetwork breaches. Network Security,1995(11):6–9, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897649.

Leach:1995:SCN

[389] John Leach and Colin Brown Zergo.Security considerations of network out-sourcing. Network Security, 1995(11):10–14, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897650.

Cohen:1995:IHPd

[390] Fred Cohen. Internet holes — Part4: Network news transfer proto-col. Network Security, 1995(11):15–19, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897662.

Anonymous:1995:Ek

[391] Anonymous. Events. Network Security,1995(11):20, November 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901558.

Page 92: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 92

Anonymous:1995:XAV

[392] Anonymous. X authentication vul-nerability. Network Security, 1995(12):2, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901566.

Anonymous:1995:DIT

[393] Anonymous. Dramatic increase intelephone hacking. Network Security,1995(12):2, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901574.

Anonymous:1995:PGP

[394] Anonymous. Police given permis-sion to tap e-mail. Network Security,1995(12):2, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901582.

Anonymous:1995:HUF

[395] Anonymous. HP-UX ftp vulner-ability. Network Security, 1995(12):2–3, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901590.

Anonymous:1995:RLL

[396] Anonymous. RSA loses licence forHellman–Merkle algorithm. Net-work Security, 1995(12):3, December1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/1353485895901604.

Anonymous:1995:VGM

[397] Anonymous. The viruses are get-ting more vicious. Network Security,1995(12):3, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901612.

Anonymous:1995:JLB

[398] Anonymous. JavaScript language be-comes a competitor. Network Security,1995(12):3, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901620.

Anonymous:1995:FVB

[399] Anonymous. First virtual bank claimsto be secure. Network Security, 1995(12):4, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901639.

Anonymous:1995:LDP

[400] Anonymous. Long distance phone callsvia the Internet. Network Security,1995(12):4, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901655.

Anonymous:1995:SPW

[401] Anonymous. Security problems withWindows 95. Network Security, 1995(12):4, December 1995. CODEN

Page 93: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 93

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901647.

Anonymous:1995:PVM

[402] Anonymous. Protection from virusesfor e-mail. Network Security, 1995(12):4–5, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901663.

Anonymous:1995:FA

[403] Anonymous. A firewall for ATM. Net-work Security, 1995(12):5, December1995. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485895901671.

Anonymous:1995:UNS

[404] Anonymous. Unix network se-curity. Network Security, 1995(12):5, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589590168X.

English:1995:AVW

[405] Erin English. AOLGOLD virus wor-ries users. Network Security, 1995(12):5–6, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897674.

English:1995:ISS

[406] Erin English. IP security standardsbattle it out. Network Security, 1995

(12):6, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897686.

Cohen:1995:IHPe

[407] Fred Cohen. Internet holes — Part5a: 50 ways to attack your websystems. Network Security, 1995(12):7–11, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897704.

English:1995:EEP

[408] Erin English. Exportable en-cryption policy found ‘unaccept-able’. Network Security, 1995(12):7, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897698.

Hancock:1995:IHR

[409] Bill Hancock. Internet hacking re-sources. Network Security, 1995(12):11–15, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896897716.

Anonymous:1995:El

[410] Anonymous. Events. Network Security,1995(12):16, December 1995. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485895901698.

Page 94: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 94

Anonymous:1996:RYV

[411] Anonymous. rpc.ypupdated vul-nerability. Network Security, 1996(1):2, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901518.

Anonymous:1996:GUC

[412] Anonymous. Growth in UK cell-phone fraud. Network Security, 1996(1):2–3, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690152X.

Anonymous:1996:PKE

[413] Anonymous. Public-key encryptionflawed in time. Network Security,1996(1):3, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901531.

Anonymous:1996:ERK

[414] Anonymous. Encryption report keptunder lock and key. Network Secu-rity, 1996(1):3, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901543.

Anonymous:1996:NDB

[415] Anonymous. NetConnect distributesBorderWare firewall. Network Security,1996(1):3–4, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901555.

Anonymous:1996:NOS

[416] Anonymous. Novell’s operatingsystems forecast to remain dom-inant. Network Security, 1996(1):4, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901567.

Anonymous:1996:FOB

[417] Anonymous. Further online bank-ing competition. Network Security,1996(1):4, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901579.

Anonymous:1996:NEC

[418] Anonymous. The new era of ca-ble modems. Network Security, 1996(1):4–5, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901580.

Anonymous:1996:SST

[419] Anonymous. Spec for secure trans-actions. Network Security, 1996(1):5, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901592.

Page 95: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 95

Anonymous:1996:UDE

[420] Anonymous. Users demand en-cryption policies. Network Security,1996(1):5, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901609.

Anonymous:1996:CGP

[421] Anonymous. Cable growth poten-tial massive. Network Security,1996(1):5, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901610.

Anonymous:1996:SDU

[422] Anonymous. Secure domain unit fornetwork protection. Network Security,1996(1):5–6, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901622.

Anonymous:1996:BDI

[423] Anonymous. Briefing document forInternet security. Network Security,1996(1):6, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901634.

Anonymous:1996:ISA

[424] Anonymous. Internal security acrossclient/server networks. Network Secu-rity, 1996(1):6, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901646.

Anonymous:1996:NSA

[425] Anonymous. Network security assess-ment tool for Windows NT. Net-work Security, 1996(1):7, January1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896901658.

Kaneshige:1996:MGB

[426] Thomas Kaneshige. McAfee givesthe boot to virus. Network Security,1996(1):7, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690166X.

Kaneshige:1996:NSM

[427] Thomas Kaneshige. Network se-curity made easy with little blackbox. Network Security, 1996(1):7–8, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901671.

English:1996:STI

[428] Erin English. SEC tackles Internetinvestment fraud. Network Security,1996(1):8, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901683.

Page 96: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 96

English:1996:LWM

[429] Erin English. Lotus working on mili-tary version of Notes. Network Secu-rity, 1996(1):8, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901695.

Cohen:1996:IHPa

[430] Fred Cohen. Internet holes — Part5b: 50 ways to attack your Websystems. Network Security, 1996(1):9–13, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900011.

Kaneshige:1996:OSD

[431] Thomas Kaneshige. Oracle to se-cure database access over the Net.Network Security, 1996(1):9, January1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896901701.

Hanson:1996:IAS

[432] Lesley Hanson. The impact ofATM on security in the data net-work. Network Security, 1996(1):13–17, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900023.

Lindup:1996:HH

[433] Ken Lindup. Hackers for hire. Net-work Security, 1996(1):18, January1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485896901713.

Anonymous:1996:Ea

[434] Anonymous. Events. Network Security,1996(1):20, January 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901725.

Anonymous:1996:NVS

[435] Anonymous. New version solves BINDsecurity problems. Network Security,1996(2):2, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900410.

Anonymous:1996:HSV

[436] Anonymous. HP syslog vulner-ability. Network Security, 1996(2):2, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900422.

Anonymous:1996:UPD

[437] Anonymous. UDP port denial-of-service attack. Network Security, 1996(2):2–3, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900434.

Anonymous:1996:VSL

[438] Anonymous. Virus spreads likewild fire. Network Security, 1996(2):3, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),

Page 97: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 97

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900446.

Anonymous:1996:WMVa

[439] Anonymous. Winword macro viruses.Network Security, 1996(2):3–4, Febru-ary 1996. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485896900458.

Anonymous:1996:SSP

[440] Anonymous. Singapore’s serviceproviders confident of security de-spite break-in. Network Security,1996(2):4, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690046X.

Anonymous:1996:CED

[441] Anonymous. Compress and encryptdata simultaneously. Network Security,1996(2):4–5, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900471.

Anonymous:1996:NGW

[442] Anonymous. The next Great Wallof China? Network Security,1996(2):5, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900483.

Anonymous:1996:EPP

[443] Anonymous. Extended passwordprotection for CyberGuard Fire-wall. Network Security, 1996(2):5, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900495.

Anonymous:1996:IMP

[444] Anonymous. Internet may not beprofitable. Network Security, 1996(2):5–6, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900501.

Anonymous:1996:PSP

[445] Anonymous. The promise of securephone banking. Network Security,1996(2):6, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900513.

Anonymous:1996:RAP

[446] Anonymous. Remote access pro-tection. Network Security, 1996(2):6, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900525.

Anonymous:1996:SDI

[447] Anonymous. Secure deployment ofInternet services. Network Security,1996(2):6, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),

Page 98: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 98

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900537.

Anonymous:1996:HVL

[448] Anonymous. Humans and viruseslocked out. Network Security, 1996(2):6–7, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900549.

Sterlicchi:1996:WTI

[449] John Sterlicchi. Wayfarer turns In-ternet into LAN. Network Security,1996(2):7, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900550.

Sterlicchi:1996:NMS

[450] John Sterlicchi. New moves to stim-ulate EDI growth. Network Security,1996(2):7–8, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900562.

Sterlicchi:1996:FNF

[451] John Sterlicchi. First NT firewallsoars in. Network Security, 1996(2):8–9, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900574.

Cohen:1996:IHPb

[452] Fred Cohen. Internet holes —Part 6: Automated attack and de-

fence. Network Security, 1996(2):9–14, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900035.

Osen:1996:SCI

[453] Janet Osen. Sex, crimes and the In-ternet: the Jake Baker case. Net-work Security, 1996(2):15–22, February1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800900047.

Anonymous:1996:Eb

[454] Anonymous. Events. Network Security,1996(2):24, February 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900586.

Anonymous:1996:CIN

[455] Anonymous. Corrupt informationfrom network servers. Network Secu-rity, 1996(3):2, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901154.

Anonymous:1996:SDC

[456] Anonymous. SunSoft demo CDscontain a security threatening flaw.Network Security, 1996(3):2, March1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896901166.

Page 99: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 99

Anonymous:1996:ISP

[457] Anonymous. Internet security pur-chase for HP. Network Security,1996(3):2–3, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901178.

Anonymous:1996:CGS

[458] Anonymous. CompuServe in Germanysuffers another inquiry. Network Secu-rity, 1996(3):3, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690118X.

Anonymous:1996:GPT

[459] Anonymous. Governments pressed Toragreement on encryption. Network Se-curity, 1996(3):3, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901191.

Anonymous:1996:BCI

[460] Anonymous. Business class In-ternet service. Network Security,1996(3):3–4, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901208.

Anonymous:1996:VMC

[461] Anonymous. Visa and MasterCardcombine security specifications. Net-work Security, 1996(3):4, March 1996.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S135348589690121X.

Anonymous:1996:IRR

[462] Anonymous. Integralis revenues rise60%. Network Security, 1996(3):4, March 1996. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485896901221.

Anonymous:1996:SAB

[463] Anonymous. SecurID authenticationfor BayRS routers. Network Secu-rity, 1996(3):4, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901233.

Anonymous:1996:SSE

[464] Anonymous. Security system forelectronic cash. Network Security,1996(3):4, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901245.

Anonymous:1996:MII

[465] Anonymous. Microsoft’s Internet in-formation server. Network Security,1996(3):4–5, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901257.

Anonymous:1996:CNE

[466] Anonymous. CyberGuard’s newenhancements. Network Security,1996(3):5, March 1996. CODEN

Page 100: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 100

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901269.

Anonymous:1996:FND

[467] Anonymous. The firewall with thenew dual wall. Network Security,1996(3):5, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901270.

Sterlicchi:1996:STA

[468] John Sterlicchi. Security technologiesaid ITT transition. Network Security,1996(3):5–6, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901282.

Savarnejad:1996:KGC

[469] Atoosa Savarnejad. Kerberos getscracked. Network Security, 1996(3):6, March 1996. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485896901294.

Savarnejad:1996:IDS

[470] Atoosa Savarnejad. IBM to de-velop secure version. Network Secu-rity, 1996(3):6, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901300.

Cohen:1996:IHPc

[471] Fred Cohen. Internet holes — Part 7:The human side. Network Security,1996(3):7–10, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900059.

Moyer:1996:SMF

[472] Philip R. Moyer and E. Eugene Schultz.A systematic methodology for firewallpenetration testing. Network Security,1996(3):11–18, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900060.

Osen:1996:FIAa

[473] Janet Osen. The Freedom of In-formation Act and the 2600 Club.Network Security, 1996(3):19, March1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896901312.

Anonymous:1996:Ec

[474] Anonymous. Events 20. Network Secu-rity, 1996(3):20, March 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901324.

Anonymous:1996:WJB

[475] Anonymous. Weaknesses in Javabytecode verifier. Network Secu-rity, 1996(4):2, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),

Page 101: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 101

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901737.

Anonymous:1996:DOD

[476] Anonymous. Digital OSF/1 dxconsole

vulnerability. Network Security,1996(4):2, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901749.

Anonymous:1996:ERM

[477] Anonymous. Encryption restrictionsmay be eased. Network Security,1996(4):2–3, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901750.

Anonymous:1996:UGD

[478] Anonymous. UK Government de-bates key escrow. Network Secu-rity, 1996(4):3, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901762.

Anonymous:1996:IOB

[479] Anonymous. ITSEC and OrangeBook standards merge. Network Secu-rity, 1996(4):3, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901786.

Savarnejad:1996:NHK

[480] Atoosa Savarnejad. Netscape hiresKPMG. Network Security, 1996(4):

3, April 1996. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485896901774.

Anonymous:1996:NGJ

[481] Anonymous. Netscape and GE’s jointInternet venture. Network Security,1996(4):3–4, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901798.

Anonymous:1996:NOB

[482] Anonymous. Net opened to Britishbusinesses. Network Security, 1996(4):4, April 1996. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485896901804.

Anonymous:1996:SEL

[483] Anonymous. Secure electronic linksto cross capital. Network Secu-rity, 1996(4):4, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901816.

Anonymous:1996:URS

[484] Anonymous. Unix rejected, secu-rity found wanting. Network Secu-rity, 1996(4):4, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901828.

Page 102: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 102

Anonymous:1996:AOI

[485] Anonymous. Alliance offers integratedbusiness solution. Network Security,1996(4):4–5, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690183X.

Anonymous:1996:SIP

[486] Anonymous. Secure Internet payments.Network Security, 1996(4):5, April1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896901841.

Anonymous:1996:MSW

[487] Anonymous. More security forWindows NT. Network Security,1996(4):5, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901853.

Anonymous:1996:WMVb

[488] Anonymous. Word macro viruses de-tected and eliminated. Network Secu-rity, 1996(4):5–6, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901865.

Savarnejad:1996:IAS

[489] Atoosa Savarnejad. IDC annualsurvey reveals extent of insecurity.Network Security, 1996(4):6, April1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896836890.

Savarnejad:1996:UCO

[490] Atoosa Savarnejad. US company of-fers firewall challenge. Network Secu-rity, 1996(4):6–7, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896836907.

Hancock:1996:INS

[491] Bill Hancock. Improving network se-curity through port switching. Net-work Security, 1996(4):7–8, April1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896836919.

Cohen:1996:IHPd

[492] Fred Cohen. Internet holes —Part 8: Spam. Network Security,1996(4):8–10, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896836920.

Wood:1996:ICR

[493] Charles Cresson Wood. An InternetCurmudgeon’s rants. Network Security,1996(4):10–11, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896836932.

Osen:1996:BNB

[494] Janet Osen. Bad news for bul-letin boards. Network Security, 1996(4):11–13, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),

Page 103: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 103

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896836944.

Hancock:1996:CYS

[495] Bill Hancock. Can you social en-gineer your way into your net-work? Network Security, 1996(4):14–15, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896836956.

Anonymous:1996:Ed

[496] Anonymous. Events. Network Secu-rity, 1996(4):16, April 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901877.

Anonymous:1996:WIN

[497] Anonymous. Warning issued on newtype of Word macro virus. Network Se-curity, 1996(5):2, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901051.

Anonymous:1996:EBS

[498] Anonymous. Encryption battle seespossible break through. Network Se-curity, 1996(5):2, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901063.

Anonymous:1996:FMD

[499] Anonymous. Firewall market de-velopments. Network Security,

1996(5):2, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901075.

Anonymous:1996:ENS

[500] Anonymous. Enhanced network se-curity offered. Network Security,1996(5):2–3, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901087.

Anonymous:1996:IEB

[501] Anonymous. The Internet-enabledbackup solution. Network Secu-rity, 1996(5):3, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901099.

Anonymous:1996:PIS

[502] Anonymous. Private informationsent safely over public frame re-lay network. Network Security,1996(5):3, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901105.

Savarnejad:1996:CRW

[503] Atoosa Savarnejad. Californian rep-resentative warns against cyberfraud.Network Security, 1996(5):4, May1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896901117.

Page 104: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 104

Savarnejad:1996:PBC

[504] Atoosa Savarnejad. PGP becomesa company. Network Security,1996(5):4, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901129.

Savarnejad:1996:COF

[505] Atoosa Savarnejad. Cisco offers freeencryption technology. Network Secu-rity, 1996(5):4–5, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901130.

Cohen:1996:IHPe

[506] Fred Cohen. Internet holes — Part9: IP address forgery and howto eliminate it. Network Security,1996(5):5–12, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589681909X.

Parker:1996:RCG

[507] Tom Parker. The role of cryptogra-phy in global communications. Net-work Security, 1996(5):13–17, May1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896819106.

Peterson:1996:IAM

[508] A. Padgett Peterson. Internet at-tack mechanisms. Network Security,1996(5):17–19, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896819118.

Anonymous:1996:Ee

[509] Anonymous. Events. Network Secu-rity, 1996(5):20, May 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901142.

Anonymous:1996:ICD

[510] Anonymous. Interpreters in CGIbin directories. Network Security,1996(6):2, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901336.

Anonymous:1996:NPT

[511] Anonymous. NIS+ password ta-bles left insecure. Network Secu-rity, 1996(6):2, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901348.

Anonymous:1996:IDT

[512] Anonymous. IRIX desktop toolvulnerability. Network Security,1996(6):2, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690135X.

Anonymous:1996:SHI

[513] Anonymous. Security hole in IISsoftware. Network Security, 1996(6):2–3, June 1996. CODEN

Page 105: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 105

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901361.

Anonymous:1996:EME

[514] Anonymous. Electronic mail encryp-tion standards’ rivalry. Network Secu-rity, 1996(6):3, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901373.

Anonymous:1996:MDI

[515] Anonymous. Microsoft’s designs forInternet security. Network Secu-rity, 1996(6):3, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901385.

Anonymous:1996:MIS

[516] Anonymous. Managed Internet ser-vice. Network Security, 1996(6):4, June1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896901397.

Anonymous:1996:IIS

[517] Anonymous. Internet/intranet securityfrom Gradient and HP. Network Secu-rity, 1996(6):4, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901415.

Anonymous:1996:PRS

[518] Anonymous. Performing Right Soci-ety’s network secured. Network Secu-

rity, 1996(6):4, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901403.

Anonymous:1996:PSG

[519] Anonymous. PC Security gets invest-ment from Motorola. Network Secu-rity, 1996(6):4–5, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901427.

Anonymous:1996:OAS

[520] Anonymous. OpeN/2 authoriza-tion software. Network Security,1996(6):5, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901439.

Anonymous:1996:LDC

[521] Anonymous. LAN diagnostic con-sultancy service. Network Secu-rity, 1996(6):5, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901440.

Anonymous:1996:SSS

[522] Anonymous. Single sign-on security forenterprise-wide systems. Network Secu-rity, 1996(6):5–6, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901452.

Page 106: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 106

Anonymous:1996:FTN

[523] Anonymous. Firewall targetedfor NetWare. Network Security,1996(6):6, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901464.

Anonymous:1996:PDA

[524] Anonymous. Protection for dialaccess systems. Network Security,1996(6):6, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901488.

Anonymous:1996:SAS

[525] Anonymous. SoftID authentica-tion software. Network Security,1996(6):6, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901476.

Anonymous:1996:AVS

[526] Anonymous. Anti-virus solution fornetwork firewalls. Network Security,1996(6):6–7, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690149X.

Cohen:1996:IHPf

[527] Fred Cohen. Internet holes — Part10: UDP viruses. Network Security,1996(6):7–10, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896884510.

Peterson:1996:MSO

[528] A. Padgett Peterson. E-mail security— an oxymoron? Network Security,1996(6):10–13, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896884522.

Schultz:1996:BRF

[529] E. Eugene Schultz. Building theright firewall. Network Security,1996(6):13–17, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896884534.

Osen:1996:FIAb

[530] Janet Osen. The Freedom of Infor-mation Act and the 2600 Club. Net-work Security, 1996(6):17–19, June1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896884546.

Anonymous:1996:Ef

[531] Anonymous. Events. Network Secu-rity, 1996(6):20, June 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901506.

Anonymous:1996:VDS

[532] Anonymous. Vulnerability in DECsoftware security kits. Network Secu-rity, 1996(7):2, July 1996. CODEN

Page 107: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 107

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900896.

Anonymous:1996:VDP

[533] Anonymous. Vulnerability in thedip program. Network Security,1996(7):2, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900902.

Anonymous:1996:SV

[534] Anonymous. Suidperl vulnerability.Network Security, 1996(7):2–3, July1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900914.

Anonymous:1996:RMC

[535] Anonymous. Right mouse click couldallow in viruses. Network Secu-rity, 1996(7):3, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900926.

Anonymous:1996:SAO

[536] Anonymous. Security and authen-tication offered. Network Security,1996(7):3–4, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900938.

Anonymous:1996:BGH

[537] Anonymous. Businesses get help tobeat Internet crime. Network Secu-

rity, 1996(7):4, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690094X.

Anonymous:1996:CAI

[538] Anonymous. Companies adopt Inter-net commerce solutions. Network Se-curity, 1996(7):4, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900951.

Anonymous:1996:TSN

[539] Anonymous. Total secure networkingsolutions incorporates CyberGuard.Network Security, 1996(7):4–5, July1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900963.

Anonymous:1996:CCC

[540] Anonymous. Credit-card companyseeks strong encryption. Network Se-curity, 1996(7):5, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900975.

Anonymous:1996:BPE

[541] Anonymous. Barclays’ pilot for elec-tronic commerce. Network Secu-rity, 1996(7):5, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900987.

Page 108: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 108

Anonymous:1996:LDI

[542] Anonymous. Librarians develop In-ternet protocol. Network Security,1996(7):5–6, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900999.

Anonymous:1996:SVP

[543] Anonymous. Secure virtual pri-vate networks. Network Security,1996(7):6, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901002.

Anonymous:1996:SLN

[544] Anonymous. Serverware launches newversion of SeNTry. Network Secu-rity, 1996(7):6, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901014.

Anonymous:1996:II

[545] Anonymous. IronBridge and IronWall.Network Security, 1996(7):6–7, July1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896901026.

Anonymous:1996:CMA

[546] Anonymous. CKS MyNet, the an-swer to single sign-on? Network Se-curity, 1996(7):7, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896901038.

Sterlicchi:1996:SFM

[547] John Sterlicchi. Security frameworkfrom Microsoft. Network Security,1996(7):7–8, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896837354.

Savarnejad:1996:RSM

[548] Atoosa Savarnejad. Revisions inSET mark advances to secure cy-berspace shopping. Network Secu-rity, 1996(7):8, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896837366.

Cohen:1996:IHPg

[549] Fred Cohen. Internet holes — Part 11:Internet lightning rods. Network Secu-rity, 1996(7):9–13, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589683738X.

Kaneshige:1996:MMC

[550] Thomas Kaneshige. McAfee and Mi-crosoft clean up Internet. Network Se-curity, 1996(7):9, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896837378.

Solomon:1996:EVP

[551] Alan Solomon. The end of thevirus problem. Network Security,1996(7):13–17, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),

Page 109: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 109

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896837391.

Lindup:1996:SAW

[552] Ken Lindup. Superman is aliveand well and living in Wapping.Network Security, 1996(7):18, July1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896837408.

Anonymous:1996:Eg

[553] Anonymous. Events. Network Secu-rity, 1996(7):20, July 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690104X.

Anonymous:1996:SKP

[554] Anonymous. Solaris 2.5 KCMS pro-grams vulnerability. Network Secu-rity, 1996(8):2, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900306.

Anonymous:1996:HUV

[555] Anonymous. HP-UX vulnerabil-ities. Network Security, 1996(8):2, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900318.

Anonymous:1996:RV

[556] Anonymous. The rdist vulner-ability. Network Security, 1996(8):2–3, August 1996. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690032X.

Anonymous:1996:FVC

[557] Anonymous. First virus capable ofinfecting Excel spreadsheet. Net-work Security, 1996(8):3, August1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900331.

Anonymous:1996:JMC

[558] Anonymous. Joint marketing for Cy-berGuard and EDS. Network Secu-rity, 1996(8):3, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900343.

Anonymous:1996:EWS

[559] Anonymous. Enterprise Web so-lutions from Netscape and NeXT.Network Security, 1996(8):3, August1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900355.

Anonymous:1996:UNS

[560] Anonymous. Usenet news viasatellite. Network Security, 1996(8):3–4, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900367.

Page 110: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 110

Anonymous:1996:BFS

[561] Anonymous. Baysecure Frame-work’s security enhanced by ACE/Server. Network Security, 1996(8):4, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900379.

Anonymous:1996:NNVa

[562] Anonymous. New NT virus scanner.Network Security, 1996(8):4, August1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900380.

Anonymous:1996:CPT

[563] Anonymous. CryptoSystem protectsTCP/IP networks. Network Security,1996(8):4–5, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900392.

David:1996:IGY

[564] Jon David. The Internet —gateway to your information as-sets. Network Security, 1996(8):5–7, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896811524.

Hancock:1996:OSA

[565] Bill Hancock. Operating system at-tacks from network resources. Net-work Security, 1996(8):8–11, August1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/1353485896811536.

Cohen:1996:IHPh

[566] Fred Cohen. Internet holes —Part 12a: Internet incident re-sponse. Network Security, 1996(8):12–14, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896811548.

Peterson:1996:PSR

[567] Padgett Peterson. Providing secure,recoverable e-mail. Network Security,1996(8):15–19, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589681155X.

Anonymous:1996:Eh

[568] Anonymous. Events. Network Secu-rity, 1996(8):20, August 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900409.

Anonymous:1996:VE

[569] Anonymous. Vulnerability in expreserve.Network Security, 1996(9):2, Septem-ber 1996. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485896900161.

Anonymous:1996:SPF

[570] Anonymous. Security problem infm fls. Network Security, 1996(9):2, September 1996. CODEN

Page 111: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 111

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900173.

Anonymous:1996:VFN

[571] Anonymous. Virus fears for new op-erating systems. Network Security,1996(9):2, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900185.

Anonymous:1996:MCM

[572] Anonymous. Merge creates mega secu-rity response team. Network Security,1996(9):2–3, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900197.

Anonymous:1996:SBS

[573] Anonymous. Secure banking and shop-ping on Internet. Network Security,1996(9):3, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900203.

Anonymous:1996:ISO

[574] Anonymous. Internet security offer-ings from HP. Network Security,1996(9):3, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900215.

Anonymous:1996:ARB

[575] Anonymous. Agreement reached be-tween Microsoft and RSA. Net-work Security, 1996(9):3–4, September1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900227.

Anonymous:1996:NCD

[576] Anonymous. Name change for Dig-ital Pathways. Network Security,1996(9):4, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900239.

Anonymous:1996:LAW

[577] Anonymous. On-LAN authenticationfor Windows NT. Network Security,1996(9):4, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900252.

Anonymous:1996:DRR

[578] Anonymous. Digital resells Raptor’ssecurity products. Network Security,1996(9):4, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900240.

Anonymous:1996:EKE

[579] Anonymous. Encryption without keyexchange. Network Security, 1996(9):4–5, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),

Page 112: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 112

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900264.

Anonymous:1996:NER

[580] Anonymous. The next Eagle fromRaptor. Network Security, 1996(9):5, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896844011.

Anonymous:1996:FPM

[581] Anonymous. Further protection frome-mail viruses. Network Security,1996(9):5, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896900276.

Persyn:1996:JTH

[582] Tim Persyn. Journalists take tohacking. Network Security, 1996(9):5, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896900288.

Bee:1996:UGA

[583] Andrianne Bee. US government al-lows selling of strong encryption toUS clients. Network Security, 1996(9):6, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896844035.

Bee:1996:NPC

[584] Andrianne Bee. NCSA programmecertifies Web sites. Network Security,1996(9):6, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896844023.

Gordon:1996:GVS

[585] Sarah Gordon. Are good virus sim-ulators still a bad idea? NetworkSecurity, 1996(9):7–13, September1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896844047.

Cohen:1996:IHPi

[586] Fred Cohen. Internet holes —Part 12(b): Internet incident re-sponse. Network Security, 1996(9):13–17, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896844059.

Osen:1996:VMP

[587] Janet Osen. The Virtual Magistrate[Project]. Network Security, 1996(9):18, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896844060.

Anonymous:1996:Ei

[588] Anonymous. Events. Network Security,1996(9):20, September 1996. CODENNTSCF5. ISSN 1353-4858 (print),

Page 113: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 113

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690029X.

Anonymous:1996:TSF

[589] Anonymous. TCP SYN flooding andIP spoofing attacks. Network Security,1996(10):2, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900598.

Anonymous:1996:FSV

[590] Anonymous. Further sendmail vul-nerabilities. Network Security, 1996(10):2–3, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900604.

Anonymous:1996:IHV

[591] Anonymous. Irina, a hoax nota virus. Network Security, 1996(10):3, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900616.

Anonymous:1996:CFIa

[592] Anonymous. Corporations fear ICE Tvirus emergence. Network Security,1996(10):3, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900628.

Anonymous:1996:KEB

[593] Anonymous. Key escrow becomeskey recovery. Network Security, 1996

(10):3–4, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690063X.

Anonymous:1996:FDE

[594] Anonymous. Further doubts emergeover NT security. Network Security,1996(10):4, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900641.

Anonymous:1996:PAA

[595] Anonymous. Privacy advocates notappeased by key recovery. Net-work Security, 1996(10):4, October1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900653.

Anonymous:1996:RCM

[596] Anonymous. Reflex creates macrovirus trapper. Network Security,1996(10):4, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900665.

Anonymous:1996:AFP

[597] Anonymous. The Authorizer firewall,protection for X25 networks. Net-work Security, 1996(10):5, October1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896826493.

Page 114: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 114

Anonymous:1996:VSX

[598] Anonymous. Virus scanner for X.400messaging system. Network Security,1996(10):5, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896900677.

Savarnejad:1996:MDA

[599] Atoosa Savarnejad. Multi-discipline al-liance spans all security aspects. Net-work Security, 1996(10):5, October1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485896900689.

Savarnejad:1996:NLF

[600] Atoosa Savarnejad. Netsolve launchesfirst ISP-independent outsourcingproduct. Network Security, 1996(10):6, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/135348589682650X.

Bee:1996:SEI

[601] Adrianne Bee. Soon even theInternet will take American Ex-press. Network Security, 1996(10):6–7, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896826511.

Cohen:1996:IHPj

[602] Fred Cohen. Internet holes — Part13: The SYN flood. Network Security,1996(10):7–9, October 1996. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896826523.

David:1996:SWS

[603] Jon David. Sniffers — the wholestory. Network Security, 1996(10):9–13, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896826535.

Osen:1996:CDAa

[604] Janet Osen. The Communications De-cency Act and the karma of chaos— Part 1. Network Security, 1996(10):13–19, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485896826547.

Anonymous:1996:Ej

[605] Anonymous. Events. Network Security,1996(10):20, October 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900690.

Anonymous:1996:SDM

[606] Anonymous. Sendmail daemon modevulnerability. Network Security, 1996(11):2, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900008.

Page 115: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 115

Anonymous:1996:HDC

[607] Anonymous. Hackers not deterred bycertification scheme. Network Security,1996(11):2, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690001X.

Anonymous:1996:ISC

[608] Anonymous. Invasion of SupremeCourt’s homepage. Network Security,1996(11):2, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900021.

Anonymous:1996:NNVb

[609] Anonymous. Netscape Navigatorvirus scare. Network Security, 1996(11):2, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900033.

Anonymous:1996:SRI

[610] Anonymous. Survey reveals Internet-borne viruses on increase. Net-work Security, 1996(11):3, November1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897812226.

McCormack:1996:CSR

[611] Michael McCormack. Content self-regulation recommended. Network Se-curity, 1996(11):3, November 1996.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/1353485896900045.

Anonymous:1996:CIP

[612] Anonymous. Combatants of Inter-net porn. Network Security, 1996(11):3–4, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900057.

Anonymous:1996:ICH

[613] Anonymous. Internet commerce ham-pered by security fears. Network Se-curity, 1996(11):4, November 1996.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900069.

Anonymous:1996:SVN

[614] Anonymous. Smartcards vulnerableto new attack. Network Security,1996(11):4, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900070.

Anonymous:1996:TWS

[615] Anonymous. TV Web-surfing de-vice breaks export regulations. Net-work Security, 1996(11):4, November1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900082.

Anonymous:1996:UEM

[616] Anonymous. Users experience ma-jor problems with networks. Net-work Security, 1996(11):4–5, November

Page 116: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 116

1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900094.

Anonymous:1996:JCB

[617] Anonymous. Japanese company buysinto security market. Network Security,1996(11):5, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900100.

Anonymous:1996:SAI

[618] Anonymous. Secure access for In-ternet/intranet connectivity. Net-work Security, 1996(11):5, November1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900124.

Anonymous:1996:HPS

[619] Anonymous. Hacker-proof system fordata coding. Network Security, 1996(11):5, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900112.

Anonymous:1996:ITP

[620] Anonymous. Internet transaction pro-cessing solutions. Network Security,1996(11):5–6, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900136.

Anonymous:1996:CFIb

[621] Anonymous. Cisco’s firewall for In-ternet/intranet. Network Security,1996(11):6, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900148.

Bee:1996:HCS

[622] Adrianne Bee. How cyber-safe is yourcompany? Network Security, 1996(11):6–7, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897812238.

Bee:1996:VAA

[623] Adrianne Bee. Vendor alliancesaim to make Internet safe forbusiness. Network Security, 1996(11):7, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589781224X.

Bee:1996:CS

[624] Adrianne Bee. Cyber stamps. Net-work Security, 1996(11):7–8, November1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897812251.

Kaneshige:1996:VRA

[625] Thomas Kaneshige. Vendors rallyfor answers to Panix Attacks. Net-work Security, 1996(11):8, November1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 117: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 117

URL http://www.sciencedirect.

com/science/article/pii/S1353485897812263.

Kaneshige:1996:MCR

[626] Thomas Kaneshige. Microsoft’s cat-apult raises NT firewall bar. Net-work Security, 1996(11):8–9, November1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897812275.

David:1996:FPI

[627] Jon David. The future of PGP onthe Internet. Network Security, 1996(11):9–12, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897812287.

Osen:1996:CDAb

[628] Janet Osen. The CommunicationsDecency Act — Part 2: The lan-guage of the Communications De-cency Act. Network Security, 1996(11):12–18, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897812299.

Anonymous:1996:Ek

[629] Anonymous. Events. Network Security,1996(11):20, November 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690015X.

Anonymous:1996:HAV

[630] Anonymous. HP 9000 access vul-nerability. Network Security, 1996

(12):2, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900707.

Anonymous:1996:PBR

[631] Anonymous. Password buffer over-run vulnerability. Network Security,1996(12):2, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900719.

Anonymous:1996:FPV

[632] Anonymous. fpkg2swpkg program vul-nerability. Network Security, 1996(12):2, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900720.

Anonymous:1996:NBR

[633] Anonymous. newgrp buffer over-runvulnerability. Network Security, 1996(12):2–3, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900732.

Anonymous:1996:CSC

[634] Anonymous. Computer security con-cerns ranked low in survey. Net-work Security, 1996(12):3, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900744.

Page 118: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 118

Anonymous:1996:ISS

[635] Anonymous. Internet shopping se-cured by SET for Taiwanese. Net-work Security, 1996(12):3, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900756.

Anonymous:1996:HET

[636] Anonymous. Hardware encryptiontechnology complies with encryptionregulations. Network Security, 1996(12):4, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900768.

Anonymous:1996:ECP

[637] Anonymous. Extending copyrightprotection for the Internet. Net-work Security, 1996(12):4, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589690077X.

Anonymous:1996:IBU

[638] Anonymous. Increase in business usersneeding the Internet. Network Security,1996(12):4–5, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900781.

Anonymous:1996:EFI

[639] Anonymous. Electronic fingerprintidentifies owner of image. Net-work Security, 1996(12):5, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485896900793.

Anonymous:1996:GIC

[640] Anonymous. Global Internet com-merce. Network Security, 1996(12):5, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900811.

Anonymous:1996:PRI

[641] Anonymous. PICS recommended forInternet. Network Security, 1996(12):5, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589690080X.

Anonymous:1996:KSA

[642] Anonymous. Kane Security An-alyst assesses network virus pro-tection. Network Security, 1996(12):5, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900823.

Anonymous:1996:EPD

[643] Anonymous. Electronic privacy de-vice from Harris. Network Security,1996(12):6, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900835.

Anonymous:1996:NSS

[644] Anonymous. New software secu-rity token. Network Security, 1996

Page 119: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 119

(12):6, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900847.

Anonymous:1996:PEB

[645] Anonymous. Protection for elec-tronic business communications. Net-work Security, 1996(12):6–7, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900859.

Anonymous:1996:ISW

[646] Anonymous. Internet security forWindows NT environments. Net-work Security, 1996(12):7, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485896900860.

Madsen:1996:CCL

[647] Wayne Madsen. Congressional Com-mittee looks at US encryption pol-icy. Network Security, 1996(12):7–8, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900872.

Cohen:1996:MNS

[648] Fred Cohen. Managing network se-curity — Part 1: How good do youhave to be? Network Security, 1996(12):9–11, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900072.

David:1996:AI

[649] Jon David. Auditing the Inter-net. Network Security, 1996(12):11–14, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900084.

Gordon:1996:RWA

[650] Sarah Gordon and Richard Ford. Realworld anti-virus product reviews andevaluations — Part 1. NetworkSecurity, 1996(12):14–18, December1996. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800900096.

Anonymous:1996:El

[651] Anonymous. Events. Network Security,1996(12):20, December 1996. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485896900884.

Anonymous:1997:KSS

[652] Anonymous. Korn shell suid exec

vulnerability. Network Security,1997(1):2, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834897.

Anonymous:1997:VSI

[653] Anonymous. Vulnerabilities in SGIIRIX. Network Security, 1997(1):2, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),

Page 120: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 120

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834885.

Anonymous:1997:DSA

[654] Anonymous. Denial of service at-tack via ping. Network Security,1997(1):3, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834903.

Anonymous:1997:CAA

[655] Anonymous. Computer attacks againstWebCom. Network Security, 1997(1):3–4, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834915.

Anonymous:1997:GWS

[656] Anonymous. Government’s Web siteattacked by hackers. Network Secu-rity, 1997(1):4, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834939.

Anonymous:1997:TER

[657] Anonymous. Tightening of encryptionregulations in Japan. Network Secu-rity, 1997(1):4, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834927.

Anonymous:1997:ECR

[658] Anonymous. Encryption compromiseon rocky ground. Network Security,

1997(1):4–5, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834940.

Anonymous:1997:EPS

[659] Anonymous. Eagle provides securityfor Internet product. Network Secu-rity, 1997(1):5, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834976.

Anonymous:1997:PUB

[660] Anonymous. Panel urges bet-ter protection. Network Security,1997(1):5, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834964.

Anonymous:1997:SVHa

[661] Anonymous. The season for virushoaxes. Network Security, 1997(1):5, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834952.

Anonymous:1997:AAA

[662] Anonymous. Axent acquires As-sureNet pathways. Network Security,1997(1):5–6, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897834988.

Page 121: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 121

Anonymous:1997:WSP

[663] Anonymous. Worldwide single-point security. Network Security,1997(1):6, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897835015.

Anonymous:1997:ERA

[664] Anonymous. Enhanced remote ac-cess security. Network Security,1997(1):6, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897835003.

Anonymous:1997:PKS

[665] Anonymous. Public key smart-card available. Network Security,1997(1):6, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589783499X.

Anonymous:1997:DEU

[666] Anonymous. Desktop encryptionutility. Network Security, 1997(1):7, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897835040.

Anonymous:1997:SVHb

[667] Anonymous. Security for vulnerablehigh speed networks. Network Secu-rity, 1997(1):7, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897835039.

Huynh:1997:PCW

[668] Danthanh Huynh. Professor criti-cizes Web security. Network Secu-rity, 1997(1):7, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897835027.

Cohen:1997:MNSa

[669] Fred Cohen. Managing network secu-rity — Part 2: Where should we con-centrate protection? Network Security,1997(1):8–11, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897835052.

Gordon:1997:RWA

[670] Sarah Gordon and Richard Ford.Real world anti-virus product reviewsand evaluations — Part 2. Net-work Security, 1997(1):11–18, January1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897835064.

Anonymous:1997:Ea

[671] Anonymous. Events. Network Security,1997(1):20, January 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900350.

Page 122: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 122

Anonymous:1997:VRT

[672] Anonymous. Vulnerability in rlogin/

Term. Network Security, 1997(2):2, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866342.

Anonymous:1997:MCB

[673] Anonymous. MIME conversion bufferoverflow. Network Security, 1997(2):2–3, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866354.

Anonymous:1997:RBE

[674] Anonymous. RSA’s 40-bit encryptionalgorithm cracked. Network Security,1997(2):3, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589786638X.

Anonymous:1997:TV

[675] Anonymous. talkd vulnerability. Net-work Security, 1997(2):3, February1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897866378.

Anonymous:1997:HOS

[676] Anonymous. The holes in onlinesecurity. Network Security, 1997(2):3, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866366.

Anonymous:1997:ECH

[677] Anonymous. Electronic commercehindered by fear of crime. Net-work Security, 1997(2):3–4, February1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897866391.

Anonymous:1997:UDC

[678] Anonymous. US DoD COTSsnafu. Network Security, 1997(2):4, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866408.

Anonymous:1997:CFG

[679] Anonymous. Companies form groupto support cross-platform encryp-tion. Network Security, 1997(2):4, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485897900593.

Anonymous:1997:EIC

[680] Anonymous. Exploit intranets with-out compromising security. Net-work Security, 1997(2):4–5, February1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589786641X.

Anonymous:1997:PCI

[681] Anonymous. Power-cached Internet/intranet gateway. Network Security,1997(2):5, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),

Page 123: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 123

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866445.

Anonymous:1997:SEI

[682] Anonymous. Security for enterprise In-ternet applications. Network Security,1997(2):5, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866433.

Anonymous:1997:AVP

[683] Anonymous. Anti-virus protectionfor Office 97. Network Security,1997(2):5, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866421.

Anonymous:1997:VFL

[684] Anonymous. Virus found on Linuxsystem. Network Security, 1997(2):5–6, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866457.

Bee:1997:LE

[685] Adrianne Bee. The latest on en-cryption. Network Security, 1997(2):6–7, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866469.

Savarnejad:1997:IFS

[686] Atoosa Savarnejad. Intranet fire-walls susceptible to internal at-

tacks. Network Security, 1997(2):7, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866482.

Savarnejad:1997:WIF

[687] Atoosa Savarnejad. Warning is-sued, flaw in Unix software. Net-work Security, 1997(2):7, February1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897866470.

Schultz:1997:WFF

[688] E. Eugene Schultz. When fire-walls fail: Lessons learned from fire-wall testing. Network Security, 1997(2):8–11, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866494.

Cohen:1997:MNSb

[689] Fred Cohen. Managing network secu-rity — Part 3: Network security as acontrol issue. Network Security, 1997(2):12–15, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897866500.

Aubrey-Jones:1997:IV

[690] David Aubrey-Jones. Internet —virusnet? Network Security, 1997(2):15–19, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

Page 124: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 124

//www.sciencedirect.com/science/

article/pii/S1353485897866512.

Anonymous:1997:Eb

[691] Anonymous. Events. Network Security,1997(2):20, February 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589790060X.

Anonymous:1997:BFJ

[692] Anonymous. Bug found in JavaVirtual Machine. Network Security,1997(3):2, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830334.

Anonymous:1997:FFI

[693] Anonymous. Flaw found in In-ternet Explorer. Network Security,1997(3):2, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830322.

Anonymous:1997:HNT

[694] Anonymous. httpd nph-test-cgi

script vulnerability. Network Secu-rity, 1997(3):2, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830309.

Anonymous:1997:EKB

[695] Anonymous. Encryption key of48 bits cracked. Network Security,1997(3):2, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830310.

Anonymous:1997:FCR

[696] Anonymous. French companies re-stricted from using high-end encryp-tion. Network Security, 1997(3):3, March 1997. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S135348589783036X.

Anonymous:1997:PEH

[697] Anonymous. PGP encryption heav-ily criticized. Network Security,1997(3):3, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830358.

Anonymous:1997:VIS

[698] Anonymous. Vulnerability in Inter-NetNews server. Network Security,1997(3):3, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830346.

Szweda:1997:FIA

[699] Roy Szweda. Finjan introduces Ac-tiveX Security Manager. Network Secu-rity, 1997(3):3–4, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830371.

Page 125: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 125

Anonymous:1997:ASA

[700] Anonymous. ACE/Server access man-ager launched. Network Security,1997(3):4, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900337.

Szweda:1997:NSN

[701] Roy Szweda. NCSA supports newTIS ForceField. Network Security,1997(3):4–5, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830383.

Savarnejad:1997:ILS

[702] Atoosa Savarnejad. IBM launches Se-cureWay. Network Security, 1997(3):5, March 1997. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485897830395.

Savarnejad:1997:ERS

[703] Atoosa Savarnejad. eTrust to roll outin second quarter. Network Security,1997(3):5–6, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830401.

Hancock:1997:UCE

[704] Bill Hancock. The US crypto-graphic export debate — roundfive? Network Security, 1997(3):6–7, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830413.

Cohen:1997:MNSc

[705] Fred Cohen. Managing network se-curity — Part 4: Integrity first,usually. Network Security, 1997(3):8–10, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830425.

Osen:1997:MMM

[706] Janet Osen. The medium is themessage: a media specific anal-ysis of the Communications De-cency Act. Network Security, 1997(3):10–16, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830437.

Osen:1997:WMT

[707] Janet Osen. For whom the mo-dem tolls: The travails of Amer-ica Online. Network Security, 1997(3):17–19, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897830449.

Anonymous:1997:Ec

[708] Anonymous. Events. Network Secu-rity, 1997(3):20, March 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900349.

Page 126: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 126

Anonymous:1997:ESS

[709] Anonymous. Explorer securitystill patchy. Network Security,1997(4):2, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897899928.

Anonymous:1997:VIP

[710] Anonymous. Vulnerability in IMAPand POP. Network Security, 1997(4):2, April 1997. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485897899916.

Anonymous:1997:CAN

[711] Anonymous. Current attacks onnews servers. Network Security,1997(4):2–3, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589789993X.

Anonymous:1997:VKI

[712] Anonymous. VirusPatrol keeps Inter-net users virus free. Network Secu-rity, 1997(4):3, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897899953.

Szweda:1997:RSN

[713] Roy Szweda. Rainbow supportsNetscape’s open multi-platform secu-rity. Network Security, 1997(4):3, April1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485897899941.

Anonymous:1997:SEA

[714] Anonymous. Strong encryption avail-able worldwide. Network Security,1997(4):3–4, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897899965.

Anonymous:1997:MSJ

[715] Anonymous. MicroLan systemsjoins CSAPP. Network Security,1997(4):4, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897899977.

Szweda:1997:AMD

[716] Roy Szweda. AT&T/Mondex dealenables Web ‘micropayments’. Net-work Security, 1997(4):4, April 1997.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/1353485897900313.

Anonymous:1997:FSU

[717] Anonymous. File security uses smart-card and RSA encryption. Network Se-curity, 1997(4):5, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897899990.

Anonymous:1997:ESF

[718] Anonymous. Enhanced security fea-tures for Netscape web servers. Net-work Security, 1997(4):5, April 1997.

Page 127: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 127

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897899989.

Anonymous:1997:SVP

[719] Anonymous. Secure virtual pri-vate networking over the Internet.Network Security, 1997(4):5–6, April1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897800001.

Anonymous:1997:MRW

[720] Anonymous. MIMEsweeper redefinesweb/e-mail security. Network Secu-rity, 1997(4):6, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897800037.

Anonymous:1997:LDA

[721] Anonymous. Lotus Domino anti-virus solution. Network Security,1997(4):6, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897800025.

Anonymous:1997:EAS

[722] Anonymous. Easy authentication andsignature verification. Network Secu-rity, 1997(4):6, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897800013.

Savarnejad:1997:HYC

[723] Atoosa Savarnejad. Having your cook-ies and eating them too. Network Secu-rity, 1997(4):6–7, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897800049.

Savarnejad:1997:ITS

[724] Atoosa Savarnejad. IBM and TISstrike an agreement. Network Secu-rity, 1997(4):7–8, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897800050.

Savarnejad:1997:CAI

[725] Atoosa Savarnejad. Cisco al-lies with industry leaders for secu-rity initiative. Network Security,1997(4):8, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897800062.

Moyer:1997:EFI

[726] Philip R. Moyer. Enhanced fire-wall infrastructure testing method-ology. Network Security, 1997(4):9–15, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897800074.

Cohen:1997:MNSd

[727] Fred Cohen. Managing network se-curity — Part 5: Risk managementor risk analysis. Network Security,

Page 128: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 128

1997(4):15–19, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897800086.

Anonymous:1997:Ed

[728] Anonymous. Events. Network Secu-rity, 1997(4):20, April 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900325.

Anonymous:1997:VLa

[729] Anonymous. Vulnerability in libXt.Network Security, 1997(5):2, May1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897856875.

Anonymous:1997:NLS

[730] Anonymous. Natural language servicelibraries vulnerability. Network Secu-rity, 1997(5):2–3, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897856887.

Anonymous:1997:JAS

[731] Anonymous. Java applets that stealcomputer cycles. Network Secu-rity, 1997(5):3, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897856905.

Anonymous:1997:VPA

[732] Anonymous. Vulnerabilities in plug-gable authentication module. Net-

work Security, 1997(5):3, May 1997.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897856899.

Anonymous:1997:HPW

[733] Anonymous. High profile Web siteswarrant high security. Network Secu-rity, 1997(5):3–4, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897856917.

Anonymous:1997:NSS

[734] Anonymous. NT systems shut downby Telnet hack. Network Secu-rity, 1997(5):4, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897856930.

Anonymous:1997:SCI

[735] Anonymous. Secure e-commercefor insurers. Network Security,1997(5):4, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897856929.

Anonymous:1997:MCM

[736] Anonymous. Microsoft closes e-mail service. Network Security,1997(5):4, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485897900362.

Page 129: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 129

Anonymous:1997:CPF

[737] Anonymous. Cellular phone fraudprevention working? Network Secu-rity, 1997(5):4–5, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897856942.

Anonymous:1997:IUT

[738] Anonymous. Internet used asTrojan horse. Network Security,1997(5):5, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900374.

Anonymous:1997:PDI

[739] Anonymous. Providers divided overInternet proposal. Network Secu-rity, 1997(5):5, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900386.

Anonymous:1997:IFN

[740] Anonymous. Intranets to far out-number Internet. Network Security,1997(5):5–6, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900398.

Anonymous:1997:NFM

[741] Anonymous. Networks flooded withe-mail messages. Network Secu-rity, 1997(5):6, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900404.

Anonymous:1997:GAV

[742] Anonymous. Global anti-virus researchprogramme launched. Network Secu-rity, 1997(5):6, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900416.

Anonymous:1997:INSa

[743] Anonymous. Integrated network se-curity products. Network Secu-rity, 1997(5):6, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900428.

Anonymous:1997:MTU

[744] Anonymous. Multi-tier Unix secu-rity product offered. Network Secu-rity, 1997(5):7, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589790043X.

Anonymous:1997:NDS

[745] Anonymous. New detection systemtakes on multi-million phone fraud.Network Security, 1997(5):7–8, May1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900441.

Anonymous:1997:DRN

[746] Anonymous. Detection and repairfor new online virus. Network Secu-

Page 130: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 130

rity, 1997(5):8, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900453.

Anonymous:1997:RAS

[747] Anonymous. Remote access solu-tion to encrypt data. Network Secu-rity, 1997(5):8, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900465.

Sechrist:1997:IPC

[748] Douglas Sechrist. Internet phone callsbreaking through corporate firewalls.Network Security, 1997(5):8–9, May1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900477.

Savarnejad:1997:SFN

[749] Atoosa Savarnejad. Sparks fly overNT security. Network Security,1997(5):9–10, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900490.

Breitrose:1997:HHI

[750] Charlie Breitrose. Hackers hit ISPsby the dozens. Network Secu-rity, 1997(5):9, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900489.

Savarnejad:1997:ANS

[751] Atoosa Savarnejad. Another NT secu-rity hole discovered. Network Security,1997(5):10–11, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900507.

Capen:1997:CPA

[752] Ian Capen. Check Point announces se-curity software alliance. Network Secu-rity, 1997(5):11, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900519.

Anonymous:1997:CTL

[753] Anonymous. To catch a thief. . . unmasking the telecoms fraud-ster. Network Security, 1997(5):12–13, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900520.

Cohen:1997:MNSe

[754] Fred Cohen. Managing networksecurity — Part 6: Computergames and network security man-agement. Network Security, 1997(5):14–18, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900532.

Lindup:1997:WLM

[755] Ken Lindup. Would Lenin make agood security officer? Network Secu-rity, 1997(5):19, May 1997. CODEN

Page 131: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 131

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900544.

Anonymous:1997:Ee

[756] Anonymous. Events. Network Secu-rity, 1997(5):20, May 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900556.

Anonymous:1997:MV

[757] Anonymous. Metamail vulnerabil-ity. Network Security, 1997(6):2, June1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897895141.

Anonymous:1997:IRP

[758] Anonymous. IRIX runpriv pro-gram vulnerability. Network Secu-rity, 1997(6):2–3, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895153.

Anonymous:1997:VSX

[759] Anonymous. Vulnerability with Solaris2.x PC buffer overflow. Network Secu-rity, 1997(6):3, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895165.

Savarnejad:1997:ISC

[760] Atoosa Savarnejad. ISP securityconsortium formed. Network Secu-rity, 1997(6):4, June 1997. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895189.

Anonymous:1997:IO

[761] Anonymous. Internet is on its own.Network Security, 1997(6):4, June1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897895177.

Anonymous:1997:NSA

[762] Anonymous. NSA sued for algorithm.Network Security, 1997(6):4, June1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900076.

Anonymous:1997:ECD

[763] Anonymous. Experts claim DTI’sscheme has catastrophic flaws. Net-work Security, 1997(6):4–5, June 1997.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897895190.

Anonymous:1997:WDS

[764] Anonymous. Worldwide debut forSKIP. Network Security, 1997(6):5, June 1997. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485897895220.

Anonymous:1997:BUF

[765] Anonymous. Breakthrough for UKfirm with US encryption restrictions.Network Security, 1997(6):5, June

Page 132: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 132

1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897895219.

Anonymous:1997:LDR

[766] Anonymous. Low data rate communi-cations security improved. Network Se-curity, 1997(6):5, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895207.

Anonymous:1997:DPM

[767] Anonymous. Data protected atmost finite level. Network Security,1997(6):5–6, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895232.

Anonymous:1997:EAJ

[768] Anonymous. Encryption and authen-tication for Java. Network Secu-rity, 1997(6):6, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895256.

Anonymous:1997:NBF

[769] Anonymous. NT-based firewall formixed TCP/IP and IPX networks.Network Security, 1997(6):6, June1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897895244.

Savarnejad:1997:PTU

[770] Atoosa Savarnejad. Princeton teamuncovers flaw in Java. Network Secu-rity, 1997(6):6–7, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895268.

Savarnejad:1997:AMS

[771] Atoosa Savarnejad. AOL4FREEmakes second round as Trojanhorse infection. Network Security,1997(6):7, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895281.

Breitrose:1997:TMO

[772] Charlie Breitrose. Trend mi-cro offers free virus protectionfrom the Web. Network Security,1997(6):7, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589789527X.

Hansen:1997:NIS

[773] Lesley Hansen. Network infrastruc-ture security. Network Security,1997(6):8–12, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895293.

Cohen:1997:MNSf

[774] Fred Cohen. Managing network se-curity — Part 7: Prevent, detectand respond. Network Security,

Page 133: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 133

1997(6):13–16, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589789530X.

Saxby:1997:PCI

[775] Stephen Saxby. Policies for cy-berspace — illegal content on theInternet. Network Security, 1997(6):16–19, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897895311.

Anonymous:1997:Ef

[776] Anonymous. Events. Network Secu-rity, 1997(6):20, June 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900088.

Breitrose:1997:CHG

[777] Charlie Breitrose. Computer hackingglitch for Ramsey murder investiga-tors. Network Security, 1997(7):2, July1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897898625.

Anonymous:1997:NNS

[778] Anonymous. Netscape Navigatorsecurity problem. Network Secu-rity, 1997(7):2, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898613.

Anonymous:1997:SSA

[779] Anonymous. Solaris solstice Admin-Suite vulnerabilities. Network Secu-rity, 1997(7):3, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898637.

Anonymous:1997:VP

[780] Anonymous. Vulnerability in theat(1) program. Network Security,1997(7):3–4, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898649.

Szweda:1997:EYL

[781] Roy Szweda. Ernst & Young LLP— WheelGroup Corp. alliance. Net-work Security, 1997(7):4, July 1997.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897898662.

Anonymous:1997:SCVa

[782] Anonymous. SunOS chkey vulnerabil-ity. Network Security, 1997(7):4, July1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897898650.

Anonymous:1997:API

[783] Anonymous. Alliance provides In-ternet security to large enterprises.Network Security, 1997(7):4–5, July1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897898674.

Page 134: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 134

Savarnejad:1997:MOE

[784] Atoosa Savarnejad. Microsoft tooffer enhanced firewall features innew server. Network Security,1997(7):5, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898698.

Anonymous:1997:LTR

[785] Anonymous. Lucent Technologies toresell Raptor’s firewalls. Network Se-curity, 1997(7):5, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898686.

Anonymous:1997:AUH

[786] Anonymous. AOL users hit furtherproblems with hackers. Network Se-curity, 1997(7):6, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898716.

Szweda:1997:STF

[787] Roy Szweda. Sun takes on Feds over USencryption regulations. Network Secu-rity, 1997(7):6, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898704.

Breitrose:1997:MJW

[788] Charlie Breitrose. Microsoft joins Websecurity consortium. Network Secu-rity, 1997(7):6–7, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898728.

Szweda:1997:HFS

[789] Roy Szweda. Holographic finger-print security device. Network Secu-rity, 1997(7):7, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898741.

Anonymous:1997:UEL

[790] Anonymous. US export licence for128-bit encryption for Microsoft. Net-work Security, 1997(7):7, July 1997.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589789873X.

Szweda:1997:ESW

[791] Roy Szweda. Encryption softwarefor Windows. Network Security,1997(7):8, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898777.

Anonymous:1997:SPO

[792] Anonymous. SessionWall-3 protects or-ganizations from abuse. Network Se-curity, 1997(7):8, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898765.

Anonymous:1997:EIM

[793] Anonymous. Enhancements to im-prove model for signing Internet code.

Page 135: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 135

Network Security, 1997(7):8, July1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897898753.

Savarnejad:1997:GAD

[794] Atoosa Savarnejad. Group asksfor disclosure of travel records ofcrypto czar. Network Security,1997(7):8–9, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898789.

Breitrose:1997:ALD

[795] Charlie Breitrose. American legislatorsdebate encryption laws. Network Secu-rity, 1997(7):9–10, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898790.

Breitrose:1997:WSG

[796] Charlie Breitrose. Web securitygroup unveils certification programme.Network Security, 1997(7):10, July1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897898807.

Madsen:1997:KEE

[797] Wayne Madsen. Key Escrow En-cryption Bill hits Congress. Net-work Security, 1997(7):11–12, July1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897898819.

Cohen:1997:MNSg

[798] Fred Cohen. Managing network se-curity — Part 8: Relativistic riskassessment. Network Security, 1997(7):13–14, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898820.

Schultz:1997:BRIa

[799] Eugene Schultz. Book review: In-ternet security: Risk analysis, strate-gies, and firewalls: Othmar Kyas,International Thomson ComputerPress, 1997. Network Security,1997(7):15, July 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897898832.

Anonymous:1997:WNN

[800] Anonymous. Windows NT NtOpen-ProcessToken vulnerability. Net-work Security, 1997(8):2, August1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897832242.

Anonymous:1997:VLb

[801] Anonymous. Vulnerability in ld.so.Network Security, 1997(8):2, August1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897832230.

Anonymous:1997:SVL

[802] Anonymous. Security vulnerabil-ity in Lynx temporary files and

Page 136: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 136

LYDownload.c. Network Security,1997(8):3, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832254.

Sterlicchi:1997:ASH

[803] John Sterlicchi. Anti-spam hackersucceeds. Network Security, 1997(8):3–4, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832266.

Anonymous:1997:JBG

[804] Anonymous. Java bugs give open-ings to hackers. Network Security,1997(8):4, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589783228X.

Anonymous:1997:NFL

[805] Anonymous. Netscape fixes latestNavigator bug. Network Security,1997(8):4, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832278.

Anonymous:1997:INSb

[806] Anonymous. INN news server vul-nerabilities. Network Security, 1997(8):4–5, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832291.

Anonymous:1997:PAL

[807] Anonymous. PGP allowed lim-ited export. Network Security,1997(8):5, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832321.

Anonymous:1997:BIU

[808] Anonymous. Bank of Ireland usesSET first in Europe. Network Secu-rity, 1997(8):5, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589783231X.

Anonymous:1997:CJJ

[809] Anonymous. Cisco joins Java se-curity alliance. Network Security,1997(8):5, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832308.

Szweda:1997:CGE

[810] Roy Szweda. CyberGuard gains E3certification from Australian Gov-ernment. Network Security, 1997(8):5–6, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832333.

Anonymous:1997:NSM

[811] Anonymous. New security mo-dem announced. Network Security,1997(8):6, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),

Page 137: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 137

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832357.

Anonymous:1997:SAD

[812] Anonymous. Secure access to ded-icated Web pages. Network Secu-rity, 1997(8):6, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832345.

Anonymous:1997:SAP

[813] Anonymous. SecurlD authenti-cation protects corporate informa-tion. Network Security, 1997(8):6–7, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832369.

Anonymous:1997:GPK

[814] Anonymous. Global public key se-curity for PCs. Network Security,1997(8):7, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832382.

Szweda:1997:SCU

[815] Roy Szweda. Secure Computing un-veils NT firewall. Network Security,1997(8):7, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832370.

Hancock:1997:VPN

[816] Bill Hancock. Virtual private net-works: What, why, when, whereand how. Network Security, 1997(8):8–11, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832394.

Cohen:1997:MNSh

[817] Fred Cohen. Managing network se-curity — Part 9: Penetration test-ing? Network Security, 1997(8):12–15, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832400.

Shaw:1997:VVA

[818] Andrew Shaw. Voice verification —authenticating remote users over thetelephone. Network Security, 1997(8):16–18, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832412.

Schultz:1997:BRIb

[819] E. Eugene Schultz. Book re-view: Intranet firewalls: ScottFuller and Kevin Pagan, VentanaPress, 1997. Network Security,1997(8):19, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897832424.

Page 138: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 138

Anonymous:1997:Eg

[820] Anonymous. Events. Network Secu-rity, 1997(8):20, August 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900064.

Anonymous:1997:SCP

[821] Anonymous. Security compromisevia procfs. Network Security, 1997(9):2, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589790009X.

Anonymous:1997:SSI

[822] Anonymous. SunOS, Solaris ifconfigioctls vulnerability. Network Security,1997(9):2, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900106.

Anonymous:1997:SIW

[823] Anonymous. SGI, IRIX webdist.cgi,handler and wrap programs vulner-abilities. Network Security, 1997(9):2–3, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900118.

Szweda:1997:ASC

[824] Roy Szweda. AT&T sues Con-nect America and others for Inter-net scam. Network Security, 1997(9):3, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589790012X.

Anonymous:1997:FRE

[825] Anonymous. Further relaxing ofexport regulations makes Internetmore secure. Network Security, 1997(9):3, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900131.

Szweda:1997:CAR

[826] Roy Szweda. CNN asked to re-move Web link. Network Security,1997(9):4, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900143.

Anonymous:1997:RPR

[827] Anonymous. RSA publishes RC2specification. Network Security, 1997(9):4, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900155.

Szweda:1997:PFT

[828] Roy Szweda. Playboy files TelecomAct protest. Network Security, 1997(9):4–5, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900167.

Page 139: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 139

Anonymous:1997:CPS

[829] Anonymous. Companies providesecure Internet roaming capabili-ties. Network Security, 1997(9):5, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900179.

Anonymous:1997:CJA

[830] Anonymous. CyberGuard joins al-liance programme in Singapore. Net-work Security, 1997(9):5, September1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900180.

Anonymous:1997:MTN

[831] Anonymous. Multi-tier network secu-rity from McAfee. Network Security,1997(9):5, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900192.

Anonymous:1997:HDR

[832] Anonymous. HTML-driven remoteauthentication. Network Security,1997(9):6, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900209.

Anonymous:1997:PPN

[833] Anonymous. Product protectsnetwork from Internet-based at-tacks. Network Security, 1997(9):6, September 1997. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900210.

Savarnejad:1997:MFU

[834] Atoosa Savarnejad. E-mail firewall usesS/MIME protocol. Network Security,1997(9):6–7, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897802528.

Breitrose:1997:DEM

[835] Charlie Breitrose. Distributing en-crypted messages more securely. Net-work Security, 1997(9):7, September1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589780253X.

Cohen:1997:MNSi

[836] Fred Cohen. Managing network se-curity — Part 10: Change yourpassword. Network Security, 1997(9):8–11, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897802541.

Osen:1997:BBF

[837] Janet Osen. In the battle of thebits — final score: Internet 1,Congress 0. Network Security, 1997(9):12–16, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897802553.

Page 140: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 140

Schwartau:1997:WEIa

[838] Winn Schwartau. What exactlyis information warfare? — Part1. Network Security, 1997(9):17–19, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897802565.

Anonymous:1997:Eh

[839] Anonymous. Events. Network Security,1997(9):20, September 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900222.

Anonymous:1997:BUN

[840] Anonymous. Businesses using Netcould face blackmail. Network Security,1997(10):2, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900945.

Anonymous:1997:BOP

[841] Anonymous. Buffer overflow prob-lem in rdist. Network Security,1997(10):2, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900957.

Anonymous:1997:SIL

[842] Anonymous. SGI IRIX LOCK-OUT and login/scheme vulnera-bilities. Network Security, 1997(10):2–3, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900969.

Anonymous:1997:MEP

[843] Anonymous. Ministry’s encryptionpolicy criticized. Network Security,1997(10):3–4, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900970.

Szweda:1997:CBS

[844] Roy Szweda. CompuServe barbe-cues spam. Network Security, 1997(10):4, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900982.

Szweda:1997:ECF

[845] Roy Szweda. Encrypted communica-tions frustrate FBI. Network Security,1997(10):4, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900994.

Anonymous:1997:ESP

[846] Anonymous. Every Swede to have per-sonal e-mail address. Network Security,1997(10):4–5, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897901008.

Anonymous:1997:CSI

[847] Anonymous. Completely secure In-ternet connection on offer. Net-

Page 141: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 141

work Security, 1997(10):5, October1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589790101X.

Anonymous:1997:ISB

[848] Anonymous. Internet security for busi-ness to business applications. Net-work Security, 1997(10):5, October1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897901021.

Anonymous:1997:JAR

[849] Anonymous. Java applets run froma ‘cage’. Network Security, 1997(10):5–6, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897901033.

Anonymous:1997:MLE

[850] Anonymous. Military-level en-cryption for all data transmis-sions. Network Security, 1997(10):6, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897901045.

Breitrose:1997:VEM

[851] Charlie Breitrose. Virtual enve-lope for e-mail. Network Security,1997(10):6, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897901057.

Anonymous:1997:HPS

[852] Anonymous. High performance so-lution to IP security needs. Net-work Security, 1997(10):6–7, October1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897901069.

Anonymous:1997:JLS

[853] Anonymous. JCP launches se-cure Internet transactions proto-col. Network Security, 1997(10):7–8, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897857327.

Wehde:1997:NFB

[854] E. D. Wehde. Netscape fixesbugs. Network Security, 1997(10):8, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897857339.

Wehde:1997:MHB

[855] E. D. Wehde. Microsoft helpsbanks. Network Security, 1997(10):8–9, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897857340.

Wehde:1997:UGT

[856] E. D. Wehde. US gets tough onencryption. Network Security, 1997(10):9–10, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),

Page 142: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 142

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897857352.

Schultz:1997:HPT

[857] Eugene Schultz. Hackers and pen-etration testing. Network Security,1997(10):10, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897857364.

Lindup:1997:TOL

[858] Ken Lindup. Take one largebomb. Network Security, 1997(10):10–11, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897857376.

Schwartau:1997:WEIb

[859] Winn Schwartau. What exactlyis information warfare? — Part2. Network Security, 1997(10):12–16, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897857388.

Cohen:1997:MNSj

[860] Fred Cohen. Managing network se-curity — Part 11: To outsourceor not to outsource, that is thequestion! Network Security, 1997(10):17–19, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589785739X.

Anonymous:1997:Ei

[861] Anonymous. Events. Network Security,1997(10):20, October 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897901070.

Anonymous:1997:SCVb

[862] Anonymous. sysdef command vul-nerability. Network Security, 1997(11):2, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900611.

Anonymous:1997:FRV

[863] Anonymous. ftpd/rlogind vulner-abilities. Network Security, 1997(11):2, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900623.

Anonymous:1997:VR

[864] Anonymous. Vulnerability in rlogin.Network Security, 1997(11):2–3, Novem-ber 1997. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485897900635.

Szweda:1997:FFY

[865] Roy Szweda. Flaw found in Yahoo e-mail security . . . . Network Security,1997(11):3, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900647.

Page 143: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 143

Szweda:1997:LJE

[866] Roy Szweda. . . . and Jabadoo in Ex-plorer 4 browser. Network Security,1997(11):3, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900659.

Anonymous:1997:OGO

[867] Anonymous. Open Group OSF/DCE denial-of-service vulnerabil-ity. Network Security, 1997(11):3–4, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900660.

Anonymous:1997:WPU

[868] Anonymous. White paper urges riskassessment before connection. Net-work Security, 1997(11):4, November1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900672.

Anonymous:1997:WFS

[869] Anonymous. World’s first SETcompleted. Network Security, 1997(11):5, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900684.

Anonymous:1997:PHL

[870] Anonymous. Passive hacking, the lat-est craze. Network Security, 1997(11):5, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900696.

Anonymous:1997:MNG

[871] Anonymous. McAfee and NetworkGeneral combine. Network Security,1997(11):5, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900702.

Anonymous:1997:FCB

[872] Anonymous. Four continents bridgedby secured VPN. Network Security,1997(11):5–6, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900714.

Anonymous:1997:SSR

[873] Anonymous. SecurVPN for secure re-mote access. Network Security, 1997(11):6, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900726.

Anonymous:1997:ISM

[874] Anonymous. Industrial strength e-mailvirus protection. Network Security,1997(11):6, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900738.

Anonymous:1997:NPP

[875] Anonymous. New ‘plug and play’ cryp-tographic accelerators available. Net-

Page 144: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 144

work Security, 1997(11):6, November1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589790074X.

Anonymous:1997:EW

[876] Anonymous. Encryption for Win-dows 95. Network Security, 1997(11):7, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900751.

Anonymous:1997:AMS

[877] Anonymous. Applet ManagementSystem for secure Java implemen-tation. Network Security, 1997(11):7, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900763.

Rees:1997:AGO

[878] Frank Rees. Australian Governmentobstructs the export of revolutionaryencryption. Network Security, 1997(11):7–8, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900775.

Cohen:1997:MNSk

[879] Fred Cohen. Managing network se-curity — Part 13: The network se-curity game. Network Security, 1997(11):9–11, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589787328X.

Schwartau:1997:WEIc

[880] Winn Schwartau. What exactlyis information warfare? — Part3. Network Security, 1997(11):12–18, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897873291.

Dwan:1997:BRW

[881] Berni Dwan. Book review: Web psy-chos, stalkers and pranksters how toprotect yourself in cyberspace: Banks,Michael A., Coriolis Group Books,$24.99. Network Security, 1997(11):19–20, November 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897873308.

Anonymous:1997:SIV

[882] Anonymous. SGI IRIX vulnera-bilities. Network Security, 1997(12):2, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900787.

Anonymous:1997:VYN

[883] Anonymous. View your neighbours’data using Wave. Network Security,1997(12):2–3, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900799.

Page 145: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 145

Anonymous:1997:VGW

[884] Anonymous. Vulnerabilities inGlimpseHTTP and WebGlimpse. Net-work Security, 1997(12):3, December1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900805.

Anonymous:1997:AEA

[885] Anonymous. Attacker executes arbi-trary commands on WWW server. Net-work Security, 1997(12):3–4, December1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900817.

Szweda:1997:FMC

[886] Roy Szweda. Firewall market continuesimpressive growth. Network Security,1997(12):4, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900829.

Szweda:1997:BDP

[887] Roy Szweda. Billion dollar pro-gramme to fight cyber threats. Net-work Security, 1997(12):4–5, December1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900830.

Anonymous:1997:DHE

[888] Anonymous. Diffie–Hellman encryp-tion freely available. Network Security,1997(12):5, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900842.

Anonymous:1997:NHC

[889] Anonymous. Net hijacker caughtby FBI. Network Security, 1997(12):5, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900854.

Anonymous:1997:VPS

[890] Anonymous. VPN provides secure re-mote access. Network Security, 1997(12):5, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900866.

Anonymous:1997:SOB

[891] Anonymous. Secure online bankingsolution offered. Network Security,1997(12):6, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900878.

Anonymous:1997:PRG

[892] Anonymous. Puerto Rican Govern-ment chooses TVD. Network Security,1997(12):6, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589790088X.

Anonymous:1997:NMS

[893] Anonymous. Network monitoring withSessionWall-3. Network Security, 1997

Page 146: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 146

(12):6, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900908.

Szweda:1997:VSB

[894] Roy Szweda. VistaNet security brief-ing issued. Network Security, 1997(12):6, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900891.

Anonymous:1997:RNA

[895] Anonymous. Remote network accessvia local phone call. Network Security,1997(12):7, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589790091X.

Anonymous:1997:ASG

[896] Anonymous. ActiveX scanned atthe gateway. Network Security, 1997(12):7, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897900921.

Anonymous:1997:ESW

[897] Anonymous. Enterprise security forWeb-based applications. Network Se-curity, 1997(12):7–8, December 1997.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897900933.

Gengler:1997:EBF

[898] Barbara Gengler. EDI-based fraudprevention for cellular phones. Net-work Security, 1997(12):8, December1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897885479.

Gengler:1997:AUU

[899] Barbara Gengler. Axent upgrades UnixPrivilege Manager. Network Security,1997(12):8–9, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897885480.

Gengler:1997:BRE

[900] Barbara Gengler. Bovine RC5 Ef-fort. Network Security, 1997(12):9–10, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897885492.

Wehde:1997:WAS

[901] Ed Wehde. War against spam. Net-work Security, 1997(12):10, December1997. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897885509.

Cohen:1997:MNSl

[902] Fred Cohen. Managing network se-curity — Part 14: 50 ways to de-feat your intrusion detection sys-tem. Network Security, 1997(12):11–14, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),

Page 147: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 147

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897885510.

Hopwood:1997:CBJ

[903] David Hopwood. A comparisonbetween Java and ActiveX secu-rity. Network Security, 1997(12):15–20, December 1997. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897885522.

Anonymous:1998:EB

[904] Anonymous. Editorial board. Net-work Security, 1998(1):1, January1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901519.

Anonymous:1998:SDS

[905] Anonymous. The ‘smurf’ denial-of-service attack. Network Security,1998(1):2, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901520.

Anonymous:1998:YTH

[906] Anonymous. Yahoo! threatenedby hackers. Network Security, 1998(1):2–3, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901532.

Anonymous:1998:FBP

[907] Anonymous. The ftp bounceproblem. Network Security, 1998

(1):3, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901544.

Anonymous:1998:SBR

[908] Anonymous. statd buffer over-runvulnerability. Network Security, 1998(1):3–4, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901556.

Anonymous:1998:NEA

[909] Anonymous. No export approvals re-quired for key recovery toolkit. Net-work Security, 1998(1):4, January1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901568.

Anonymous:1998:APS

[910] Anonymous. Action plan for safeInternet use. Network Security,1998(1):4, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890157X.

Anonymous:1998:SEF

[911] Anonymous. Safety of encryptedfiles questioned. Network Security,1998(1):4–5, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901581.

Page 148: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 148

Anonymous:1998:FOA

[912] Anonymous. Firewall offers advancedfiltering capabilities. Network Secu-rity, 1998(1):5, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901593.

Anonymous:1998:SSR

[913] Anonymous. Speedy, secure remoteaccess offering. Network Security,1998(1):5–6, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890160X.

Anonymous:1998:SOP

[914] Anonymous. Suite offers protec-tion against viruses, hostile appletsand hackers. Network Security,1998(1):6, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901611.

Anonymous:1998:NGV

[915] Anonymous. New Gauntlet hasVPN capabilities. Network Security,1998(1):6, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901623.

Anonymous:1998:CCF

[916] Anonymous. Credit card fraud onInternet explodes. Network Security,1998(1):6–7, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901635.

Madsen:1998:CPU

[917] Wayne Madsen. Cryptography pro-tected under US constitution. Net-work Security, 1998(1):7–8, January1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901647.

Anonymous:1998:FII

[918] Anonymous. The future of Internet/intranet security. Network Security,1998(1):8–9, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901659.

Schultz:1998:STP

[919] E. Eugene Schultz. Securing third-party connections. Network Security,1998(1):10–13, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800875923.

Hancock:1998:AID

[920] Bill Hancock. Automated intru-sion detection systems and networksecurity. Network Security, 1998(1):14–15, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800875935.

Page 149: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 149

Cohen:1998:MNSa

[921] Fred Cohen. Managing network se-curity — Part 15: Y2K alternativesolutions. Network Security, 1998(1):16–18, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800875947.

Penman:1998:TC

[922] Ian Penman. The Tasini case. Net-work Security, 1998(1):19, January1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901660.

Anonymous:1998:Ea

[923] Anonymous. Events. Network Security,1998(1):20, January 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901672.

Anonymous:1998:VCD

[924] Anonymous. Vulnerabilities in com-mon desktop environment. Net-work Security, 1998(2):2, February1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900794.

Anonymous:1998:VSA

[925] Anonymous. Vulnerability in ssh-agent.Network Security, 1998(2):2, February1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900800.

Anonymous:1998:MVU

[926] Anonymous. Macro viruses up-dated. Network Security, 1998(2):2–3, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900812.

Anonymous:1998:SCT

[927] Anonymous. SET compliance tested.Network Security, 1998(2):3, February1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900824.

Anonymous:1998:CMG

[928] Anonymous. Companies merge to giveUK network security. Network Security,1998(2):3, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900848.

Anonymous:1998:KRH

[929] Anonymous. Key recovery heavily crit-icized by expert. Network Security,1998(2):3, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900836.

Anonymous:1998:CNJ

[930] Anonymous. C2Net and nCipherjoin forces for security’s sake. Net-work Security, 1998(2):4, February1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589890085X.

Page 150: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 150

Anonymous:1998:CASa

[931] Anonymous. Cryptographic accelera-tors support key management. Net-work Security, 1998(2):4, February1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900861.

Anonymous:1998:KUM

[932] Anonymous. Kill unwanted e-mailmessages. Network Security, 1998(2):4, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900873.

Anonymous:1998:PAA

[933] Anonymous. Preemptive action againstnetwork attacks. Network Security,1998(2):4–5, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900885.

Gengler:1998:NDT

[934] Barbara Gengler. Netect’s detec-tion tool. Network Security, 1998(2):5, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897831315.

Wehde:1998:RC

[935] Ed Wehde. RSA challenge. Net-work Security, 1998(2):5–6, February1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897831327.

Wehde:1998:HCS

[936] Ed Wehde. HP, Cisco secure. Net-work Security, 1998(2):6, February1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485897831339.

Cohen:1998:MNSb

[937] Fred Cohen. Managing networksecurity — the management offear. Network Security, 1998(2):7–9, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897831340.

Wright:1998:LPK

[938] Marie A. Wright. A look at publickey certificates. Network Security, 1998(2):10–13, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897831352.

Wood:1998:ECI

[939] Charles Cresson Wood. Essentialcontrols for Internet electronic com-merce. Network Security, 1998(2):13–18, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897831364.

Miller:1998:SSW

[940] Nigel Miller and Claire Frater. Shet-land squabbles or worldwide wran-gles? Network Security, 1998(2):18–19, February 1998. CODEN

Page 151: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 151

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485897831376.

Anonymous:1998:Ec

[941] Anonymous. Events. Network Security,1998(2):20, February 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900897.

Anonymous:1998:MWL

[942] Anonymous. Microsoft Windows longfile names exploited. Network Secu-rity, 1998(3):2, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901131.

Anonymous:1998:IAT

[943] Anonymous. IBM AIX telnet

denial-of-service. Network Security,1998(3):2, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901143.

Anonymous:1998:VPV

[944] Anonymous. volrmmount programvulnerability. Network Security,1998(3):3, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901155.

Anonymous:1998:CMS

[945] Anonymous. Confidentiality of e-mailsites in UK jeopardized. Network Secu-

rity, 1998(3):3, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901167.

Anonymous:1998:UEC

[946] Anonymous. US exports constraintsremoved for TIS. Network Security,1998(3):3–4, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901179.

Anonymous:1998:EWB

[947] Anonymous. Encryption for Web-basedbanking applications. Network Secu-rity, 1998(3):4, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901180.

Anonymous:1998:DPD

[948] Anonymous. Data protection anddisaster recovery for enterprise com-puting. Network Security, 1998(3):4, March 1998. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485898901209.

Anonymous:1998:MWC

[949] Anonymous. E-mail and Web con-tent security solution. Network Secu-rity, 1998(3):4, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901192.

Page 152: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 152

Gengler:1998:MF

[950] Barbara Gengler. Microsoft fix. Net-work Security, 1998(3):4–5, March1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901210.

Wehde:1998:SBB

[951] Ed Wehde. Security breakthroughfrom Bell Labs. Network Security,1998(3):5–6, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901222.

Wehde:1998:LMF

[952] Ed Wehde. Lotus moves to fixsecurity flaws. Network Security,1998(3):6–7, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901234.

Madsen:1998:SDM

[953] Wayne Madsen. State Departmentmisses boat on telecom snooping.Network Security, 1998(3):7, March1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901246.

Madsen:1998:USC

[954] Wayne Madsen. Uncle Sam’s cryptoroad show. Network Security, 1998(3):8–13, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800875959.

Cohen:1998:MNSc

[955] Fred Cohen. Managing network secu-rity — red teaming. Network Security,1998(3):13–15, March 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800875960.

Schultz:1998:PWN

[956] E. Eugene Schultz. Planning forWindows NT 5.0 security. Net-work Security, 1998(3):15–20, March1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800875972.

Anonymous:1998:SRC

[957] Anonymous. Solaris rpc.cmsd

vulnerability. Network Security,1998(4):2, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900915.

Anonymous:1998:TAC

[958] Anonymous. The truth about cook-ies. Network Security, 1998(4):2, April1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900903.

Anonymous:1998:ACD

[959] Anonymous. Attackers cause denial-of-service. Network Security, 1998(4):2–3, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900927.

Page 153: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 153

Anonymous:1998:SYD

[960] Anonymous. Shore up your de-fences, warns Microsoft. Network Se-curity, 1998(4):3, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900939.

Anonymous:1998:SFV

[961] Anonymous. Sun finds vacation

vulnerability. Network Security,1998(4):3, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900940.

Anonymous:1998:FMV

[962] Anonymous. FreeBSD mmap vulner-ability. Network Security, 1998(4):3, April 1998. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485898900952.

Anonymous:1998:VFD

[963] Anonymous. Vulnerability in FreeBSDderived stacks. Network Security,1998(4):3–4, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900964.

Anonymous:1998:BRA

[964] Anonymous. Buffer over-runs allowarbitrary commands. Network Secu-rity, 1998(4):4, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900976.

Anonymous:1998:ZAA

[965] Anonymous. Zergo announces acquisi-tion of PKI company. Network Secu-rity, 1998(4):4, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900988.

Anonymous:1998:IMF

[966] Anonymous. IT managers fail toreceive support for security policies.Network Security, 1998(4):5, April1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589890099X.

Anonymous:1998:CDR

[967] Anonymous. The cryptographic de-bate rages on. Network Security,1998(4):5, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901003.

Anonymous:1998:ABF

[968] Anonymous. Alliance brings fullstrength encryption to Europe. Net-work Security, 1998(4):5, April 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901015.

Anonymous:1998:DRA

[969] Anonymous. Data recovery and anti-virus companies unite. Network Secu-

Page 154: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 154

rity, 1998(4):5–6, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901027.

Anonymous:1998:FCA

[970] Anonymous. Fred Cohen & Asso-ciates introduces new NetScan service.Network Security, 1998(4):6, April1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901039.

Anonymous:1998:FSS

[971] Anonymous. File security system forbusiness networks. Network Secu-rity, 1998(4):6, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901040.

Anonymous:1998:CSI

[972] Anonymous. E-commerce security in-creased by encryption suite. Net-work Security, 1998(4):6–7, April1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901052.

Anonymous:1998:SIIa

[973] Anonymous. Solving the insecuritiesof Internet commerce. Network Secu-rity, 1998(4):7, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901064.

Anonymous:1998:ADB

[974] Anonymous. Automatic detectionfor breaches. Network Security,1998(4):7, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901076.

Anonymous:1998:HOM

[975] Anonymous. Hackers own methodsturned against them. Network Secu-rity, 1998(4):7, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901088.

Anonymous:1998:VSC

[976] Anonymous. Virus security combinedwith network security. Network Secu-rity, 1998(4):8, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890109X.

Anonymous:1998:TCS

[977] Anonymous. Threat to e-commercestill significant. Network Security,1998(4):8–9, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901106.

Gengler:1998:SS

[978] Barbara Gengler. Shredder software.Network Security, 1998(4):9, April1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901118.

Page 155: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 155

Madsen:1998:EFB

[979] Wayne Madsen. European firestormover Brussel’s report. Network Se-curity, 1998(4):10–11, April 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589890112X.

Cohen:1998:MNSd

[980] Fred Cohen. Managing networksecurity — the unpredictability ofdefence. Network Security, 1998(4):12–14, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800875984.

Osen:1998:OPI

[981] Janet Osen. Online privacy issues: Theother Tim McVeigh. Network Security,1998(4):15–18, April 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800875996.

Miller:1998:EN

[982] Nigel Miller. Employees on the net.Network Security, 1998(4):18–20, April1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580087600X.

Anonymous:1998:MVB

[983] Anonymous. Multiple vulnerabili-ties in BIND. Network Security,1998(5):2, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901684.

Anonymous:1998:OGR

[984] Anonymous. Open Group revealsvulnerabilities. Network Security,1998(5):2–3, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901696.

Anonymous:1998:CPSa

[985] Anonymous. Cell phone system weak-ened to allow surveillance. Net-work Security, 1998(5):3–4, May 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901702.

Anonymous:1998:CSCa

[986] Anonymous. Call for safe e-commerceexceeding predictions. Network Secu-rity, 1998(5):4, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901714.

Anonymous:1998:NCI

[987] Anonymous. Name change for In-tegralis. Network Security, 1998(5):4, May 1998. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485898901726.

Anonymous:1998:PSA

[988] Anonymous. Partnership to secureagainst cybercrime. Network Secu-

Page 156: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 156

rity, 1998(5):4, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901738.

Anonymous:1998:SAP

[989] Anonymous. Strong authenticationprotects Windows NT. Network Secu-rity, 1998(5):4–5, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890174X.

Anonymous:1998:CSCb

[990] Anonymous. Cryptographic solutionfor e-commerce security. Network Se-curity, 1998(5):5, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901751.

Gengler:1998:OBF

[991] Barbara Gengler. Outsiders breakinto Fortune 1000 companies. Net-work Security, 1998(5):5–6, May 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901763.

Zizzo:1998:ARS

[992] Thomas Zizzo. Ascend router se-curity concerns. Network Secu-rity, 1998(5):6, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901775.

Madsen:1998:KEF

[993] Wayne Madsen. Key escrow flawed.Network Security, 1998(5):6–7, May1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901787.

Madsen:1998:EDR

[994] Wayne Madsen. Encryption de-bate rages again. Network Secu-rity, 1998(5):8–9, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898801190.

Oosthuizen:1998:SIR

[995] Gilliaume Oosthuizen. Security is-sues related to e-commerce. Net-work Security, 1998(5):10–11, May1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898801207.

Cohen:1998:MNSe

[996] Fred Cohen. Managing network secu-rity: Risk staging. Network Security,1998(5):12–15, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898801219.

Forte:1998:JRS

[997] Dario Forte. Is Java really se-cure? Network Security, 1998(5):15–19, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898801220.

Page 157: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 157

Anonymous:1998:Ed

[998] Anonymous. Events. Network Secu-rity, 1998(5):20, May 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901799.

Anonymous:1998:SIV

[999] Anonymous. SGI, IRIX vulner-abilities. Network Security, 1998(6):2–3, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900009.

Anonymous:1998:PS

[1000] Anonymous. 3Com passwords stolen.Network Security, 1998(6):3, June1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900010.

Anonymous:1998:VFA

[1001] Anonymous. Vulnerability found inAdvanced File System Utility. Net-work Security, 1998(6):3, June 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900022.

Anonymous:1998:MWS

[1002] Anonymous. More Web sites vul-nerable to hackers. Network Secu-rity, 1998(6):3–4, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900034.

Anonymous:1998:SIIb

[1003] Anonymous. Smartcard integrationto intranet security. Network Secu-rity, 1998(6):4, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900046.

Anonymous:1998:DAS

[1004] Anonymous. Deploy applications se-curely over the Internet. Network Secu-rity, 1998(6):4–5, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900058.

Anonymous:1998:DWI

[1005] Anonymous. Discovering weaknessesin IP networks. Network Secu-rity, 1998(6):5, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890006X.

Madsen:1998:FFE

[1006] Wayne Madsen. Family feud overencryption policy. Network Security,1998(6):5–6, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900071.

Gengler:1998:BES

[1007] Barbara Gengler. Blizzard Enter-tainment sued. Network Security,1998(6):6–7, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),

Page 158: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 158

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900083.

Gengler:1998:NPF

[1008] Barbara Gengler. NetScreen playsin firewall arena. Network Secu-rity, 1998(6):7, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900095.

Hancock:1998:ISE

[1009] Bill Hancock. IPV6 security en-hancements still not everything youneed. Network Security, 1998(6):8–10, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589880007X.

Lau:1998:MFSa

[1010] Oliver Lau. Meta-firewall: a sixthgeneration firewall — Part 1. Net-work Security, 1998(6):10–16, June1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898800081.

Cohen:1998:MNSf

[1011] Fred Cohen. Managing network se-curity: Technical protection for thejoint venture. Network Security,1998(6):16–20, June 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800093.

Anonymous:1998:MIV

[1012] Anonymous. More IRIX vulner-abilities. Network Security, 1998(7):2, 3, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900320.

Anonymous:1998:BON

[1013] Anonymous. Buffer overflow in NIS+.Network Security, 1998(7):3, July1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900332.

Anonymous:1998:PER

[1014] Anonymous. Parsing error re-duces key length. Network Secu-rity, 1998(7):4, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900344.

Anonymous:1998:FOL

[1015] Anonymous. Financial organizationsleave Internet security lax. Network Se-curity, 1998(7):4, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900356.

Anonymous:1998:PMB

[1016] Anonymous. Partnership for mi-grating business securely on Internet.Network Security, 1998(7):4–5, July1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900368.

Page 159: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 159

Anonymous:1998:CFP

[1017] Anonymous. Companies focus onPKI business. Network Security,1998(7):5, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890037X.

Anonymous:1998:ASW

[1018] Anonymous. Added security for Web-based Java applications. Network Se-curity, 1998(7):5, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900393.

Anonymous:1998:SCSa

[1019] Anonymous. Shark’s cage secu-rity for NT. Network Security,1998(7):5, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900381.

Anonymous:1998:CPP

[1020] Anonymous. Crypto pack protectselectronic information. Network Secu-rity, 1998(7):6, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890040X.

Madsen:1998:ELP

[1021] Wayne Madsen. Encryption legis-lation and policy. Network Secu-rity, 1998(7):6–7, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800056.

Madsen:1998:NCK

[1022] Wayne Madsen. NAFTA has cryptokey recovery agenda. Network Secu-rity, 1998(7):7–8, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900411.

Cohen:1998:MNSg

[1023] Fred Cohen. Managing networksecurity: How does a typical ITaudit work? Network Security,1998(7):8–11, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800068.

Rawlings:1998:ECIa

[1024] Jane Rawlings. Electronic commerceon the Internet — Part 1. Net-work Security, 1998(7):11–14, July1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589880010X.

Lau:1998:MFSb

[1025] Oliver Lau. Meta-firewall: a sixthgeneration firewall — Part 2. Net-work Security, 1998(7):14–19, July1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898800111.

Page 160: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 160

Anonymous:1998:Ee

[1026] Anonymous. Events. Network Secu-rity, 1998(7):20, July 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900423.

Anonymous:1998:HUF

[1027] Anonymous. HP-UX ftp prob-lems. Network Security, 1998(8):2, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900228.

Anonymous:1998:OVL

[1028] Anonymous. OpenVMS V7.1 LOGI-NOUT security vulnerability. Net-work Security, 1998(8):2, August1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589890023X.

Anonymous:1998:CBT

[1029] Anonymous. Cracking of 56-bit DESnot a threat. Network Security,1998(8):2–3, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900241.

Anonymous:1998:SIS

[1030] Anonymous. Security integration tosimplify user access. Network Secu-rity, 1998(8):3, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900253.

Anonymous:1998:CSP

[1031] Anonymous. Certified SET pay-ment system integrated into IN-TERSHOP. Network Security, 1998(8):3, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900265.

Anonymous:1998:ESI

[1032] Anonymous. Enterprise securityand intrusion detection come to-gether. Network Security, 1998(8):3–4, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900277.

Anonymous:1998:PSF

[1033] Anonymous. Peapod and SeaChangeform new company. Network Secu-rity, 1998(8):4, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900289.

Anonymous:1998:WSB

[1034] Anonymous. Web security forbrowsers. Network Security, 1998(8):4, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900290.

Anonymous:1998:SPS

[1035] Anonymous. Smartcard providesstrong private key functions. Net-work Security, 1998(8):5, August

Page 161: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 161

1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900307.

Madsen:1998:CPH

[1036] Wayne Madsen. Crypto politics heat-ing up. Network Security, 1998(8):5–6, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800706.

Wehde:1998:MBE

[1037] Ed Wehde. Moves to break en-cryption deadlock. Network Security,1998(8):6–7, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800718.

Gengler:1998:CFA

[1038] Barbara Gengler. CIA fears Amer-ica is vulnerable. Network Security,1998(8):7, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589880072X.

Rees:1998:CCA

[1039] Frank Rees. Computer crime andairforce information systems. Net-work Security, 1998(8):7–9, August1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898800731.

Cohen:1998:MNSh

[1040] Fred Cohen. Managing networksecurity: The seedy side of se-curity. Network Security, 1998(8):9–13, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800743.

Hancock:1998:UNH

[1041] Bill Hancock. Using network hack-ing techniques to disrupt military op-erational networks. Network Security,1998(8):13–17, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800755.

Rawlings:1998:ECIb

[1042] Jane Rawlings. Electronic com-merce on the Internet — Part2. Network Security, 1998(8):17–19, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800767.

Anonymous:1998:Ef

[1043] Anonymous. Events. Network Secu-rity, 1998(8):20, August 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900319.

Anonymous:1998:SVM

[1044] Anonymous. Security vulnerabilities inMicrosoft PPTP. Network Security,1998(9):2, September 1998. CODEN

Page 162: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 162

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901258.

Anonymous:1998:WEJ

[1045] Anonymous. ‘Window external’jScript vulnerability in Internet Ex-plorer 4. Network Security, 1998(9):2–3, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890126X.

Anonymous:1998:CIR

[1046] Anonymous. Cisco IOS remoterouter crash. Network Security, 1998(9):3, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901271.

Anonymous:1998:SCSb

[1047] Anonymous. Support for child-safeWeb sites. Network Security, 1998(9):3, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901283.

Anonymous:1998:UAC

[1048] Anonymous. Unix access controlsoftware. Network Security, 1998(9):3–4, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901295.

Anonymous:1998:CASb

[1049] Anonymous. Cryptographic ac-celerator for speedy digital signa-tures. Network Security, 1998(9):4, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901301.

Anonymous:1998:SCR

[1050] Anonymous. Secure card reader forInternet security, e-commerce. Net-work Security, 1998(9):4–5, September1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901313.

Gengler:1998:INC

[1051] Barbara Gengler. IBM’s new cryp-tosystem. Network Security, 1998(9):5, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800123.

Gengler:1998:ESR

[1052] Barbara Gengler. Encryption stan-dard replaced. Network Security, 1998(9):5–6, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800135.

Cohen:1998:MNSi

[1053] Fred Cohen. Managing network se-curity: What should I report towhom? Network Security, 1998(9):6–12, September 1998. CODEN

Page 163: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 163

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800147.

Forte:1998:GSN

[1054] Dario Forte. Guaranteeing thesafety of a network beyond the fire-wall. Network Security, 1998(9):12–16, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800159.

Schultz:1998:PMN

[1055] E. Eugene Schultz and Philip C. Cox.Putting the Mime name vulnerabil-ity in outlook and messenger in per-spective. Network Security, 1998(9):16–19, September 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898800160.

Anonymous:1998:Eg

[1056] Anonymous. Events. Network Secu-rity, 1998(9):19–20, September 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901325.

Anonymous:1998:VF

[1057] Anonymous. Vulnerabilities withFTP. Network Security, 1998(10):2, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901805.

Anonymous:1998:UFR

[1058] Anonymous. US finally relaxes en-cryption policies. Network Security,1998(10):2–3, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901817.

Anonymous:1998:HSP

[1059] Anonymous. Hit squad put ontrail of hackers. Network Security,1998(10):3, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901829.

Anonymous:1998:VEE

[1060] Anonymous. VPN encouraged inEurope. Network Security, 1998(10):3, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901830.

Anonymous:1998:CAP

[1061] Anonymous. Company acquisi-tion to provide network protec-tion. Network Security, 1998(10):3–4, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901842.

Anonymous:1998:COS

[1062] Anonymous. Companies offer se-cure file delivery. Network Security,1998(10):4, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),

Page 164: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 164

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901854.

Anonymous:1998:DSR

[1063] Anonymous. Dell to sell Raptorfirewalls. Network Security, 1998(10):4, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901866.

Anonymous:1998:MMF

[1064] Anonymous. Maximize multiplefirewalls. Network Security, 1998(10):4–5, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901878.

Anonymous:1998:TMS

[1065] Anonymous. Threat managementsolution offered. Network Security,1998(10):5, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890188X.

Anonymous:1998:WRC

[1066] Anonymous. Weaknesses in RSAcombated. Network Security, 1998(10):5–6, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901891.

Anonymous:1998:NFN

[1067] Anonymous. Native firewall for NT.Network Security, 1998(10):6, October

1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901908.

Anonymous:1998:JBM

[1068] Anonymous. Java-based manage-ment solution for global networksecurity. Network Security, 1998(10):6, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589890191X.

Anonymous:1998:ESC

[1069] Anonymous. Entegrity secures cashflows. Network Security, 1998(10):6–7, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901921.

Gengler:1998:VE

[1070] Barbara Gengler. The Vulnerabil-ity Engine. Network Security, 1998(10):7, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901933.

Gengler:1998:NIS

[1071] Barbara Gengler. New Internet se-curity standard. Network Security,1998(10):7–8, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901945.

Page 165: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 165

Meears-White:1998:NI

[1072] Tristan Meears-White. [email protected] Security, 1998(10):8–9, Oc-tober 1998. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485800876011.

Cohen:1998:MNSj

[1073] Fred Cohen. Managing network secu-rity: Time-based security. NetworkSecurity, 1998(10):10–14, October1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800876023.

Wright:1998:ECC

[1074] Marie A. Wright. The ellip-tic curve cryptosystem: a synop-sis. Network Security, 1998(10):14–17, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876035.

Hancock:1998:SIN

[1075] Bill Hancock. Skills inventory fornetwork management. Network Se-curity, 1998(10):17–19, October 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800876047.

Anonymous:1998:Eh

[1076] Anonymous. Events. Network Security,1998(10):20, October 1998. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901957.

Anonymous:1998:SLH

[1077] Anonymous. Simple lessons are thehardest to learn. Network Security,1998(11):2, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900435.

Szweda:1998:CAF

[1078] Roy Szweda. China arrests first on-line bank robbers. Network Security,1998(11):2, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900447.

Anonymous:1998:USP

[1079] Anonymous. Untrusted scripted pastein Internet Explorer 4.01. Net-work Security, 1998(11):2–3, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900459.

Anonymous:1998:CIL

[1080] Anonymous. Cisco IOS login promptvulnerability. Network Security, 1998(11):3, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900460.

Anonymous:1998:BOVa

[1081] Anonymous. Buffer overflow vulner-ability in mountd. Network Security,

Page 166: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 166

1998(11):3, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900472.

Anonymous:1998:UGT

[1082] Anonymous. UK Government totoughen encryption regulations. Net-work Security, 1998(11):3–4, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900484.

Anonymous:1998:QIS

[1083] Anonymous. Quantitative informationsecurity risk study launched. Net-work Security, 1998(11):4, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900496.

Anonymous:1998:WSL

[1084] Anonymous. Web sites leave compa-nies legally exposed. Network Security,1998(11):4–5, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900502.

Anonymous:1998:CDS

[1085] Anonymous. Companies develop se-cure home banking solutions. Net-work Security, 1998(11):5, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900514.

Anonymous:1998:DSI

[1086] Anonymous. Digital signatures incor-porated into electronic forms. Net-work Security, 1998(11):5, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900526.

Anonymous:1998:PED

[1087] Anonymous. Protection for electronicdocuments. Network Security, 1998(11):5–6, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900538.

Anonymous:1998:LEE

[1088] Anonymous. Link encryptor with elec-tronically loadable algorithms. Net-work Security, 1998(11):6, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589890054X.

Anonymous:1998:NSE

[1089] Anonymous. NT security en-hanced. Network Security, 1998(11):6–7, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900551.

Szweda:1998:MMS

[1090] Roy Szweda. Micro-miniature sili-con lock makes computers ‘hacker-proof’. Network Security, 1998(11):7–8, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),

Page 167: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 167

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898900563.

Cohen:1998:MNSk

[1091] Fred Cohen. Managing network secu-rity: The real Y2K issue. NetworkSecurity, 1998(11):8–11, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800876059.

Hancock:1998:INS

[1092] Bill Hancock. Improving net-work security through port switch-ing. Network Security, 1998(11):12–13, November 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876060.

Osen:1998:TSJ

[1093] Janet Osen. The thorny side of ju-risdiction and the Internet. NetworkSecurity, 1998(11):13–17, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800876072.

Osen:1998:SBC

[1094] Janet Osen. Singing the blues: Thecase of the ‘little’ Blue Note. NetworkSecurity, 1998(11):18–19, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900575.

Anonymous:1998:Ei

[1095] Anonymous. Events. NetworkSecurity, 1998(11):19–20, November1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898900587.

Szweda:1998:USF

[1096] Roy Szweda. University switchesto financial security system. Net-work Security, 1998(12):2, December1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901337.

Anonymous:1998:BOVb

[1097] Anonymous. Buffer overflow vulner-abilities in rdist. Network Security,1998(12):2, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901349.

Anonymous:1998:RGB

[1098] Anonymous. Reactor glitches blamedon software. Network Security, 1998(12):2, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901350.

Anonymous:1998:MSS

[1099] Anonymous. E-mail security sur-vey. Network Security, 1998(12):3,December 1998. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485898901362.

Page 168: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 168

Anonymous:1998:IHT

[1100] Anonymous. IRC hit by Tro-jan horse. Network Security, 1998(12):3, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901374.

Anonymous:1998:IOP

[1101] Anonymous. Internet outages pre-dicted at COMDEX. Network Security,1998(12):3–4, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901386.

Anonymous:1998:CEC

[1102] Anonymous. Coming explosion in e-commerce. Network Security, 1998(12):4, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901398.

Anonymous:1998:AAV

[1103] Anonymous. Alphabetic anti-virusguide. Network Security, 1998(12):4, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901404.

Anonymous:1998:BIB

[1104] Anonymous. Brokat is Internetbanking leader says report. Net-work Security, 1998(12):4, December1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485898901416.

Anonymous:1998:BPL

[1105] Anonymous. Baltimore partners log-ica for net security. Network Security,1998(12):4–5, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901428.

Anonymous:1998:TDP

[1106] Anonymous. Tritheim defender pro-vides affordable security. NetworkSecurity, 1998(12):5, December 1998.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589890143X.

Anonymous:1998:VCP

[1107] Anonymous. VLSI chip provides se-cure e-commerce. Network Security,1998(12):5, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901441.

Anonymous:1998:CPSb

[1108] Anonymous. Commercial phonescanner. Network Security, 1998(12):5, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901453.

Anonymous:1998:CHS

[1109] Anonymous. COMDEX highlights Se-cureZone. Network Security, 1998(12):5–6, December 1998. CODEN

Page 169: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 169

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901465.

Szweda:1998:CEM

[1110] Roy Szweda. Cyberflex enables mo-bile smart services via GSM. Net-work Security, 1998(12):6, December1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485898901477.

Gengler:1998:CHT

[1111] Barbara Gengler. Controversy hitsTristrata. Network Security, 1998(12):7, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901489.

Wehde:1998:SCW

[1112] Ed Wehde. Security companies worktogether. Network Security, 1998(12):7–8, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901490.

Hancock:1998:NSM

[1113] Bill Hancock. Network security:Monitoring is the first step. Net-work Security, 1998(12):8–9, December1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800876084.

Cohen:1998:MNSl

[1114] Fred Cohen. Managing network se-curity: Balancing risk. NetworkSecurity, 1998(12):10–14, December1998. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800876096.

Piper:1998:CSV

[1115] Fred Piper and Michael Walker. Cryp-tographic solutions for voice telephonyand GSM. Network Security, 1998(12):14–19, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876102.

Anonymous:1998:Ej

[1116] Anonymous. Events. Network Security,1998(12):20, December 1998. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485898901507.

Anonymous:1999:EB

[1117] Anonymous. Editorial board. Net-work Security, 1999(1):OFC, January1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899901861.

Anonymous:1999:SIF

[1118] Anonymous. SGI IRIX fcagent dae-mon vulnerability. Network Security,1999(1):2, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901873.

Page 170: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 170

Anonymous:1999:CISa

[1119] Anonymous. Cisco IOS syslog denial-of-service. Network Security, 1999(1):2–3, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901885.

Anonymous:1999:HUVa

[1120] Anonymous. HP-UX vulnerabil-ities. Network Security, 1999(1):3, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901897.

Anonymous:1999:SVS

[1121] Anonymous. Security vulnerabil-ity in sendmail. Network Security,1999(1):3, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901903.

Anonymous:1999:SSD

[1122] Anonymous. Sun Solaris dtmail,passwd vulnerabilities. Network Se-curity, 1999(1):3–4, January 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899901915.

Anonymous:1999:THV

[1123] Anonymous. Trojan horse version ofTCP wrappers. Network Security,1999(1):4, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901927.

Anonymous:1999:WNR

[1124] Anonymous. Windows NT remoteexplorer. Network Security, 1999(1):4–5, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901939.

Anonymous:1999:EGC

[1125] Anonymous. Entrust gets contract toprovide authenticity. Network Secu-rity, 1999(1):5, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901940.

Anonymous:1999:ITP

[1126] Anonymous. ICL/TimeStep partner-ship produces VPN. Network Security,1999(1):5–6, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901952.

Anonymous:1999:INH

[1127] Anonymous. Integrated networkand host-based intrusion detectionsolution. Network Security, 1999(1):6, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901964.

Page 171: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 171

Anonymous:1999:HAF

[1128] Anonymous. High availability fire-wall server solution. Network Security,1999(1):6–7, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901976.

Anonymous:1999:IPSa

[1129] Anonymous. Intelligent probe simu-lates hacking and potential damage.Network Security, 1999(1):7, January1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899901988.

Gengler:1999:SGR

[1130] Barbara Gengler. Security guide-lines released. Network Security,1999(1):7–8, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990199X.

Hancock:1999:ANR

[1131] Bill Hancock. Attacking networkrouters. Network Security, 1999(1):8–9, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899800014.

Tantum:1999:LRIa

[1132] Mark Tantum and Touche Ross. Le-gal responsibility of Internet serviceproviders: Part 1. Network Security,1999(1):10–15, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899800026.

Cohen:1999:MNSa

[1133] Fred Cohen. Managing network se-curity: Anatomy of a successful so-phisticated attack. Network Security,1999(1):16–19, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899800038.

Anonymous:1999:Ea

[1134] Anonymous. Events. Network Security,1999(1):19–20, January 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902003.

Anonymous:1999:WFM

[1135] Anonymous. W97M.Footprint macrovirus discovered. Network Security,1999(2):2, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900387.

Anonymous:1999:FPP

[1136] Anonymous. FTP PASV ‘pizza thief’exploit. Network Security, 1999(2):2–3, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900399.

Anonymous:1999:NVC

[1137] Anonymous. Network video conferenc-ing needs security. Network Security,

Page 172: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 172

1999(2):3, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900405.

Anonymous:1999:BFA

[1138] Anonymous. Budgets fail to addresssecurity needs. Network Security,1999(2):3, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900417.

Anonymous:1999:SRA

[1139] Anonymous. Security research al-liance to promote network secu-rity. Network Security, 1999(2):3–4, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900429.

Anonymous:1999:PDP

[1140] Anonymous. Partnership to distributePKI solutions. Network Security,1999(2):4, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900430.

Anonymous:1999:TPS

[1141] Anonymous. Turnkey PI solutionfor VPN-1. Network Security, 1999(2):4, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900442.

Anonymous:1999:TCF

[1142] Anonymous. Tool centralizes fire-wall configuration. Network Security,1999(2):5, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900454.

Anonymous:1999:FIR

[1143] Anonymous. Fraud on the In-ternet reduced. Network Security,1999(2):5, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900466.

Gengler:1999:NAG

[1144] Barbara Gengler. Network Associatesgets contract. Network Security, 1999(2):5–6, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900478.

Wehde:1999:ASG

[1145] Ed Wehde. ATM security getsbetter. Network Security, 1999(2):6, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990048X.

Hancock:1999:ARN

[1146] Bill Hancock. Assessing and reduc-ing network risk. Network Security,1999(2):7–8, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),

Page 173: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 173

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800239.

Hancock:1999:NSU

[1147] Bill Hancock. Network security: Theunsolved mystery. Network Security,1999(2):9–11, February 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800240.

Cohen:1999:MNSb

[1148] Fred Cohen. Managing network se-curity: Returning fire. Network Se-curity, 1999(2):11–15, February 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800800252.

Tantum:1999:LRIb

[1149] Mark Tantum and Touche Ross. Le-gal responsibility of Internet serviceproviders: Part 2. Network Secu-rity, 1999(2):15–19, February 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800800264.

Anonymous:1999:Ec

[1150] Anonymous. Events. Network Se-curity, 1999(2):19–20, February 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900491.

Anonymous:1999:BOF

[1151] Anonymous. Buffer overflows inFTP servers. Network Security,

1999(3):2, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900119.

Anonymous:1999:SSV

[1152] Anonymous. Sun Solaris vul-nerabilities. Network Security,1999(3):2, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900120.

Anonymous:1999:MBV

[1153] Anonymous. Microsoft BackOf-fice vulnerability. Network Security,1999(3):2–3, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900132.

Anonymous:1999:DLS

[1154] Anonymous. Debian Linux ‘Super’package buffer overflow. Network Secu-rity, 1999(3):3, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900144.

Anonymous:1999:DUV

[1155] Anonymous. Digital Unix vulner-abilities. Network Security, 1999(3):3–4, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900156.

Page 174: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 174

Anonymous:1999:VSU

[1156] Anonymous. Virus sends users’ detailsto virus exchange site. Network Secu-rity, 1999(3):4, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900168.

Anonymous:1999:ECP

[1157] Anonymous. EU called to peti-tion against unwanted e-mail. Net-work Security, 1999(3):4–5, March1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589990017X.

Anonymous:1999:UGH

[1158] Anonymous. UK to get a head start inthe digital marketplace. Network Secu-rity, 1999(3):5, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900181.

Anonymous:1999:PSM

[1159] Anonymous. PKI solution for theMicrosoft commerce platform. Net-work Security, 1999(3):5–6, March1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900193.

Anonymous:1999:SST

[1160] Anonymous. Security simplifiedthrough integration of adaptive se-curity. Network Security, 1999(3):6, March 1999. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371

(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S135348589990020X.

Anonymous:1999:BPE

[1161] Anonymous. Baltimore to PKI en-able Adobe Acrobat. Network Secu-rity, 1999(3):6, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900211.

Anonymous:1999:PCE

[1162] Anonymous. Product checks and en-forces security best practices. Net-work Security, 1999(3):7, March 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900223.

Gengler:1999:TPT

[1163] Barbara Gengler. Total privacy tech-nology. Network Security, 1999(3):7, March 1999. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485899900235.

Gengler:1999:FMS

[1164] Barbara Gengler. Free e-mail ser-vices or disservices? Network Secu-rity, 1999(3):8, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900247.

Gengler:1999:CSC

[1165] Barbara Gengler. E-commerce start-uphas cash in its wallet. Network Secu-

Page 175: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 175

rity, 1999(3):8–9, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900259.

Madsen:1999:NCO

[1166] Wayne Madsen. NSA contin-ues to oppose crypto export con-trol relief. Network Security, 1999(3):9–10, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900260.

Hancock:1999:NSM

[1167] Bill Hancock. Network security:Monitoring is the first step. Net-work Security, 1999(3):10–11, March1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800800215.

Cohen:1999:MNSc

[1168] Fred Cohen. Managing network se-curity: The millisecond fantasy. Net-work Security, 1999(3):12–19, March1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800800227.

Anonymous:1999:Ed

[1169] Anonymous. Events. Network Secu-rity, 1999(3):20, March 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900272.

Anonymous:1999:MSW

[1170] Anonymous. Melissa spreadingwidely in USA. Network Secu-rity, 1999(4):2, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901794.

Hancock:1999:MAC

[1171] Bill Hancock. Melissa’s authorcaught. Network Security, 1999(4):2–3, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901800.

Anonymous:1999:HUVb

[1172] Anonymous. HP-UX vulnerabil-ities. Network Security, 1999(4):3–4, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901812.

Gengler:1999:ELM

[1173] Barbara Gengler. Encryption lawsmay slacken. Network Security,1999(4):4, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901824.

Gengler:1999:MQN

[1174] Barbara Gengler. Microsoft questionsNovell’s NDS security. Network Secu-rity, 1999(4):4–5, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),

Page 176: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 176

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901836.

Madsen:1999:NRE

[1175] Wayne Madsen. NSA recommendedfor expanded Infosec and Infowarresponsibilities. Network Security,1999(4):5–6, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901848.

Cohen:1999:MNSd

[1176] Fred Cohen. Managing networksecurity: Simulating network se-curity. Network Security, 1999(4):6–13, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800094.

Miller:1999:MAC

[1177] Nigel Miller. E-mail abuse and cor-porate policies. Network Security,1999(4):13–17, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800100.

Schultz:1999:BRF

[1178] E. Eugene Schultz. Book re-view: Fighting computer crime: Au-thor: Donn Parker, ISBN 0-471-16378-3, Publisher: John Wiley andSons, 1998. Network Security, 1999(4):17–19, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800112.

Anonymous:1999:Ee

[1179] Anonymous. Events. Network Security,1999(4):19–20, April 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990185X.

Anonymous:1999:BOS

[1180] Anonymous. Buffer overflow in SGIX server’s font path. Network Secu-rity, 1999(5):2, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902799.

Anonymous:1999:VCTa

[1181] Anonymous. Vulnerabilities of Cisco7xx TCP and HTTP. Network Secu-rity, 1999(5):2–3, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902805.

Anonymous:1999:IFL

[1182] Anonymous. Implementation flawin the Linux TCP/IP stack. Net-work Security, 1999(5):3–4, May 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899902817.

Anonymous:1999:EPR

[1183] Anonymous. Entrust PKI receivesvalidation to new global standard.Network Security, 1999(5):4, May

Page 177: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 177

1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899902829.

Anonymous:1999:PSI

[1184] Anonymous. PKI solution inte-grated with Web security software.Network Security, 1999(5):4–5, May1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899902830.

Anonymous:1999:UCB

[1185] Anonymous. UK companies ben-efit from VPNs. Network Secu-rity, 1999(5):5, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902842.

Anonymous:1999:EPFa

[1186] Anonymous. Encryptors provideframe relay security. Network Secu-rity, 1999(5):5, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902854.

Madsen:1999:BBG

[1187] Wayne Madsen. Big brother goesglobal. Network Security, 1999(5):6, May 1999. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485899902866.

Madsen:1999:MBF

[1188] Wayne Madsen. McCain’s billfurther ‘Balkanizes’ US crypto ex-port policy. Network Security,1999(5):6–7, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902878.

Cohen:1999:MNSe

[1189] Fred Cohen. Managing network se-curity: Watching the world. Net-work Security, 1999(5):8–13, May1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800800197.

Miller:1999:YMS

[1190] Nigel Miller. Y2K mediation suc-cess stories. Network Security,1999(5):13, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990288X.

Miller:1999:PCC

[1191] Nigel Miller. Pirates and casualcopiers: how to protect the contentof your Web site. Network Security,1999(5):13–14, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902891.

Miller:1999:MDD

[1192] Nigel Miller. $107 million damagesfor disseminating unlawful informationon a Web site. Network Security,

Page 178: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 178

1999(5):14–15, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902908.

Miller:1999:UCB

[1193] Nigel Miller. UK e-commerce bill— summary. Network Security,1999(5):15–16, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990291X.

Miller:1999:LIL

[1194] Nigel Miller. Liability for infringementson linked sites? Network Security,1999(5):16–17, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902921.

Miller:1999:TDP

[1195] Nigel Miller. The telecommuni-cations (data protection and pri-vacy) (direct marketing) regula-tions 1998. Network Security,1999(5):17, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902933.

Hancock:1999:ECI

[1196] Bill Hancock. Export of cryptographicinformation from the USA: A brief lookat the problems. Network Security,1999(5):17–19, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800203.

Anonymous:1999:Ef

[1197] Anonymous. Events. Network Security,1999(5):19–20, May 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902945.

Anonymous:1999:HUS

[1198] Anonymous. HP-UX sendmail — de-nial of service failures. Network Secu-rity, 1999(6):2, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900508.

Anonymous:1999:CISb

[1199] Anonymous. Cisco IOS softwarevulnerability. Network Security,1999(6):2–3, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990051X.

Anonymous:1999:TIE

[1200] Anonymous. Telecommunications in-frastructure to expand in Latin Amer-ica. Network Security, 1999(6):3, June1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900521.

Anonymous:1999:PDS

[1201] Anonymous. Partnership deliv-ers server-based anti-virus solu-tion. Network Security, 1999(6):3–4, June 1999. CODEN

Page 179: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 179

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900533.

Anonymous:1999:IIV

[1202] Anonymous. IPSec/IKE VPN andX.509 CA device secures networks.Network Security, 1999(6):4, June1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900545.

Anonymous:1999:CSS

[1203] Anonymous. Compact solution tosimplified firewall deployment. Net-work Security, 1999(6):4–5, June 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900557.

Anonymous:1999:LCV

[1204] Anonymous. Low-cost VPN solutionfor the remote office. Network Secu-rity, 1999(6):5, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900569.

Gengler:1999:NCW

[1205] Barbara Gengler. Networking com-panies won’t make kit Y2K com-pliant. Network Security, 1999(6):5–6, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900570.

Gengler:1999:NCG

[1206] Barbara Gengler. Now cryptogra-phy gets the ‘open source’ treatment.Network Security, 1999(6):6, June1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900582.

Gengler:1999:CPO

[1207] Barbara Gengler. Check point out-lines VPN strategy. Network Secu-rity, 1999(6):6–7, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900594.

Gengler:1999:FAS

[1208] Barbara Gengler. Federal agency sitesstill lack privacy notices. Network Se-curity, 1999(6):7, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900600.

Cohen:1999:MNSf

[1209] Fred Cohen. Managing networksecurity: The limits of aware-ness. Network Security, 1999(6):8–10, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580080015X.

Forte:1999:FAE

[1210] Dario Forte. The future of the Ad-vanced Encryption Standard. Net-work Security, 1999(6):10–13, June1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 180: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 180

URL http://www.sciencedirect.

com/science/article/pii/S1353485800800161.

Arden:1999:YWY

[1211] Michelle J. Arden. “Are you whoyou say you are?” the finan-cial market is finding out withPKI. Network Security, 1999(6):13–16, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800173.

David:1999:VAPa

[1212] Jon David. Vulnerabilities as-sessment — Part 1. Vulnerabilitybasics. Network Security, 1999(6):16–18, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800185.

Anonymous:1999:Eg

[1213] Anonymous. Events. Network Security,1999(6):19–20, June 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900612.

Anonymous:1999:VCTb

[1214] Anonymous. Vulnerability in Com-paq’s Tru64/DIGITAL UNIX soft-ware. Network Security, 1999(7):2, July1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900004.

Anonymous:1999:RSA

[1215] Anonymous. rpc.statd and automountd

vulnerabilities allow intruder access.Network Security, 1999(7):2, July1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900016.

Anonymous:1999:TSI

[1216] Anonymous. TROJ XPLOREZIP— stripping it from your system.Network Security, 1999(7):2–3, July1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900028.

Anonymous:1999:EUD

[1217] Anonymous. EU-US data privacydispute to continue. Network Secu-rity, 1999(7):3–4, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990003X.

Anonymous:1999:OWD

[1218] Anonymous. Online Web do-main registration protects againstcybersquatting. Network Security,1999(7):4, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900041.

Anonymous:1999:CTS

[1219] Anonymous. Companies team upto secure e-commerce in Hong Kong.Network Security, 1999(7):4, July1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 181: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 181

URL http://www.sciencedirect.

com/science/article/pii/S1353485899900053.

Anonymous:1999:EPFb

[1220] Anonymous. Entrust provide freePKI and multi-platform toolkitsfor download. Network Security,1999(7):4–5, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900065.

Gengler:1999:IFC

[1221] Barbara Gengler. Internet Fraud Coun-cil. Network Security, 1999(7):5, July1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900077.

Gengler:1999:T

[1222] Barbara Gengler. Twinkle. Net-work Security, 1999(7):5–6, July 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900089.

Wehde:1999:MSE

[1223] Ed Wehde. Military strength encryp-tion for consumers. Network Secu-rity, 1999(7):6–7, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900090.

Cohen:1999:MNSg

[1224] Fred Cohen. Managing network se-curity: Attack and defence strate-gies. Network Security, 1999(7):7–11, July 1999. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800124.

Webb:1999:ANPa

[1225] Alison Webb. Auditing NT —Part 1. Network Security, 1999(7):11–15, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800136.

Forte:1999:PSA

[1226] Dario Forte. Postfix — a se-cure alternative to Sendmail: Anew frontier in the realm of freemailers. Network Security, 1999(7):16–18, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800148.

Anonymous:1999:Eh

[1227] Anonymous. Events. Network Security,1999(7):19–20, July 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900107.

Anonymous:1999:NES

[1228] Anonymous. Netscape enterpriseserver fails to properly processsome URL’s. Network Security,1999(8):2, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900284.

Page 182: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 182

Anonymous:1999:MHR

[1229] Anonymous. Malformed .HTR re-quest vulnerability. Network Secu-rity, 1999(8):2, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900296.

Anonymous:1999:DSV

[1230] Anonymous. Denial-of-service vulner-abilities in Windows NT 4.0. Net-work Security, 1999(8):2–3, August1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899900302.

Anonymous:1999:FPW

[1231] Anonymous. Finland paves the wayfor a digital society. Network Secu-rity, 1999(8):3, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900314.

Anonymous:1999:GMS

[1232] Anonymous. Global market for se-curity products to grow to $8 bil-lion in 2003. Network Security,1999(8):3–4, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900326.

Anonymous:1999:CDC

[1233] Anonymous. Companies develop Chi-nese language CA. Network Secu-rity, 1999(8):4, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900338.

Anonymous:1999:CEV

[1234] Anonymous. Cylink expands its VPNofferings with ATM encryptor. Net-work Security, 1999(8):4–5, August1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589990034X.

Anonymous:1999:EDB

[1235] Anonymous. Encrypt data at 6.7 bil-lion bits per second. Network Secu-rity, 1999(8):5, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900351.

Anonymous:1999:SSF

[1236] Anonymous. Secure solution for framerelay networks. Network Security,1999(8):5, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900363.

Wehde:1999:TVC

[1237] Ed Wehde. Third voice causesproblems. Network Security, 1999(8):5–6, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800070.

Wehde:1999:SRM

[1238] Ed Wehde. Sniffing out roguemodems. Network Security, 1999

Page 183: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 183

(8):6–7, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800082.

Wehde:1999:CLJ

[1239] Ed Wehde. Crime lab just forthe Internet. Network Security,1999(8):7, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800331.

Cohen:1999:MNSh

[1240] Fred Cohen. Managing networksecurity: What’s happening outthere. Network Security, 1999(8):8–11, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800343.

David:1999:VAPb

[1241] Jon David. Vulnerabilities assess-ment — Part 2. Getting in throughthe ‘Net’. Network Security, 1999(8):11–14, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800355.

Webb:1999:ANPb

[1242] Alison Webb. Auditing NT —Part 2. Network Security, 1999(8):14–18, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800367.

Madsen:1999:BOC

[1243] Wayne Madsen. Barr offers Con-gressional oversight amendment onECHELON. Network Security, 1999(8):18–19, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800379.

Anonymous:1999:Ei

[1244] Anonymous. Events. Network Secu-rity, 1999(8):20, August 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899900375.

Anonymous:1999:MWE

[1245] Anonymous. Microsoft Web enginevulnerability. Network Security, 1999(9):2, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902490.

Anonymous:1999:WNT

[1246] Anonymous. Windows NT Termi-nal Servers DOS vulnerability. Net-work Security, 1999(9):2, September1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899902507.

Anonymous:1999:IAV

[1247] Anonymous. IBM AIX vulnerabil-ity in ptrace() system call. Net-work Security, 1999(9):2, September1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 184: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 184

URL http://www.sciencedirect.

com/science/article/pii/S1353485899902519.

Anonymous:1999:FSC

[1248] Anonymous. Free smart card soft-ware for digital certificates. Net-work Security, 1999(9):2–3, September1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899902520.

Anonymous:1999:WDE

[1249] Anonymous. Wireless data encryp-tion for handhelds. Network Security,1999(9):3, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902532.

Anonymous:1999:IPSb

[1250] Anonymous. Internet postage systemlaunched in the United States. Net-work Security, 1999(9):3, September1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899902544.

Anonymous:1999:CAC

[1251] Anonymous. Clinton administra-tion calls for network monitor-ing. Network Security, 1999(9):3, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902556.

Anonymous:1999:SMB

[1252] Anonymous. Six million Brazilians filetaxes over the Net. Network Security,

1999(9):4, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902568.

Anonymous:1999:AEH

[1253] Anonymous. ADSL enables hackeraccess. Network Security, 1999(9):4, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990257X.

Anonymous:1999:FYI

[1254] Anonymous. Face your image on abar code. Network Security, 1999(9):4–5, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902581.

Anonymous:1999:PYN

[1255] Anonymous. Protect your networkswith data-security chips. NetworkSecurity, 1999(9):5, September 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899902593.

Gengler:1999:ARI

[1256] Barbara Gengler. Alarm raised overintrusion detection network. Net-work Security, 1999(9):5–6, September1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348589990260X.

Page 185: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 185

Gengler:1999:HPS

[1257] Barbara Gengler. Hewlett Packardsecurity strategy. Network Security,1999(9):6–7, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902611.

Gengler:1999:CSS

[1258] Barbara Gengler. E-commerce secu-rity study. Network Security, 1999(9):7, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899902623.

Cohen:1999:MNSi

[1259] Fred Cohen. Managing network se-curity: In your face information war-fare. Network Security, 1999(9):8–10, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800276.

Madsen:1999:SBA

[1260] Wayne Madsen. SAFE Bill “am-bushed”. Network Security, 1999(9):10–11, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800288.

Madsen:1999:JDP

[1261] Wayne Madsen. Justice Depart-ment, PCCIP ex-staffers offer criti-cal infrastructure assurance propos-als. Network Security, 1999(9):

11–12, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580080029X.

Madsen:1999:SBC

[1262] Wayne Madsen. SAFE Bill clearsTelecommunications Subcommitteewith amendments. Network Secu-rity, 1999(9):13–14, September 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800800306.

Wright:1999:OP

[1263] Marie A. Wright. An overview ofPKI. Network Security, 1999(9):14–17, September 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800318.

Heath:1999:WSE

[1264] Guy Heath. WIPO serves evictionnotice on cyber-squatters. NetworkSecurity, 1999(9):18–19, September1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580080032X.

Anonymous:1999:Ej

[1265] Anonymous. Events. Network Secu-rity, 1999(9):19–20, September 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899902635.

Page 186: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 186

Anonymous:1999:ACS

[1266] Anonymous. ActiveX controls not‘safe for scripting’. Network Security,1999(10):2, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901708.

Anonymous:1999:NVG

[1267] Anonymous. Netscape vulnerabil-ity gives attackers full control. Net-work Security, 1999(10):2, October1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899901691.

Anonymous:1999:UGR

[1268] Anonymous. Users gain root privi-lege with wu-ftpd. Network Security,1999(10):2–3, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990171X.

Anonymous:1999:ULE

[1269] Anonymous. US lifts export curbson encryption. Network Security,1999(10):3, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901721.

Anonymous:1999:JGS

[1270] Anonymous. Japanese group simpli-fies hacker detection. Network Security,1999(10):3, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901733.

Anonymous:1999:CCL

[1271] Anonymous. Continuous compli-ance with legislation for UK com-panies. Network Security, 1999(10):3–4, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901745.

Anonymous:1999:IPB

[1272] Anonymous. IBM’s PC 300PL tobecome standard technology. Net-work Security, 1999(10):4, October1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800882690.

Anonymous:1999:ISS

[1273] Anonymous. IP service switch pre-vents fragmentation. Network Security,1999(10):4, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800882707.

Gengler:1999:UAT

[1274] Barbara Gengler. US Army thinksdifferent. Network Security, 1999(10):5, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800882719.

Page 187: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 187

Wehde:1999:VWT

[1275] Ed Wehde. Vendors work towardsLAN security. Network Security, 1999(10):5–6, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800882720.

Gengler:1999:PSC

[1276] Barbara Gengler. Politicians speak outon cyberterrorism. Network Security,1999(10):6, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800882732.

Cohen:1999:MNSj

[1277] Fred Cohen. Managing network secu-rity: Security education in the infor-mation age. Network Security, 1999(10):7–10, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800882744.

Forte:1999:FST

[1278] Dario Forte. Free security tools: Prosand cons: a review of free secu-rity tools. Network Security, 1999(10):10–13, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901757.

Hancock:1999:ANE

[1279] Bill Hancock. Auditing the net-work environment at a technical level:Why’s, how’s and aha!’s. Network

Security, 1999(10):13–17, October1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899901769.

Hancock:1999:HCN

[1280] Bill Hancock. Health care and net-work security: Protecting patientprivacy. Network Security, 1999(10):17–19, October 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901770.

Anonymous:1999:Ek

[1281] Anonymous. Events. Network Se-curity, 1999(10):19–20, October 1999.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899901782.

Anonymous:1999:WNV

[1282] Anonymous. Windows NT 4.0 vul-nerability. Network Security, 1999(11):2, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901253.

Anonymous:1999:MID

[1283] Anonymous. Microsoft IE5: ‘down-load behaviour’ vulnerability. Net-work Security, 1999(11):2, November1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899901265.

Page 188: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 188

Anonymous:1999:JDE

[1284] Anonymous. Jet database engine vul-nerability. Network Security, 1999(11):2–3, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901277.

Anonymous:1999:MPC

[1285] Anonymous. Microsoft and Protekcollaboration meets NATO messagingstandards. Network Security, 1999(11):3, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901289.

Anonymous:1999:SGS

[1286] Anonymous. Secure e-governmentfor Spain. Network Security, 1999(11):3, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901290.

Anonymous:1999:TUP

[1287] Anonymous. Tripwire 2.2 for theUnix platform. Network Security, 1999(11):3–4, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901307.

Anonymous:1999:FOS

[1288] Anonymous. Free open-source codeto result in global private net-work. Network Security, 1999(11):4, November 1999. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901319.

Anonymous:1999:SSW

[1289] Anonymous. Secure solution for thewireless market. Network Security,1999(11):4–5, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901320.

Gengler:1999:IS

[1290] Barbara Gengler. IPSec specifica-tion. Network Security, 1999(11):5–6, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580080001X.

Gengler:1999:SU

[1291] Barbara Gengler. SNMP up-date. Network Security, 1999(11):6, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800021.

Cohen:1999:MNSk

[1292] Fred Cohen. Managing networksecurity: The limits of cryptogra-phy. Network Security, 1999(11):7–11, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800033.

Page 189: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 189

Wright:1999:EAE

[1293] Marie A. Wright. The evolutionof the Advanced Encryption Stan-dard. Network Security, 1999(11):11–14, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800045.

David:1999:IR

[1294] Jon David. Incident response. NetworkSecurity, 1999(11):15–18, November1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800800057.

Madsen:1999:TC

[1295] Wayne Madsen. Trust in cy-berspace. Network Security, 1999(11):18–19, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800800069.

Anonymous:1999:El

[1296] Anonymous. Events. Network Security,1999(11):20, November 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899901332.

Anonymous:1999:MII

[1297] Anonymous. Microsoft improves ISNgeneration. Network Security, 1999(12):2, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899903239.

Anonymous:1999:MVM

[1298] Anonymous. Microsoft virtual ma-chine vulnerability. Network Security,1999(12):2, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899903240.

Anonymous:1999:CPS

[1299] Anonymous. Companies promotesecure wireless e-commerce. Net-work Security, 1999(12):2, December1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899903252.

Anonymous:1999:FSM

[1300] Anonymous. Fraud screening for e-merchants. Network Security, 1999(12):3, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899903264.

Anonymous:1999:SPSa

[1301] Anonymous. Survey places securityas top barrier to e-commerce. Net-work Security, 1999(12):3, December1999. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485899903288.

Anonymous:1999:CPP

[1302] Anonymous. Companies providePKI SSO integration for securebusiness. Network Security, 1999(12):3, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),

Page 190: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 190

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899903276.

Anonymous:1999:ANZ

[1303] Anonymous. Australia and NewZealand join global security stan-dard. Network Security, 1999(12):3–4, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348589990329X.

Anonymous:1999:DOO

[1304] Anonymous. Distributor offers one stopshop for smart cards. Network Security,1999(12):4, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872414.

Anonymous:1999:FCP

[1305] Anonymous. Flexible copyright protec-tion for Web content. Network Security,1999(12):4, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/1353485899903306.

Anonymous:1999:ARN

[1306] Anonymous. Automatic repair for net-work security holes. Network Security,1999(12):4, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872426.

Anonymous:1999:SPSb

[1307] Anonymous. Secure payment solu-tion for e-commerce. Network Security,1999(12):4–5, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872438.

Gengler:1999:FPP

[1308] Barbara Gengler. The future of thepalm print. Network Security, 1999(12):5, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580087244X.

Gengler:1999:EEL

[1309] Barbara Gengler. Encryption ex-port laws. Network Security, 1999(12):5–6, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872451.

Wehde:1999:DHP

[1310] Ed Wehde. DVD hack programon Web. Network Security, 1999(12):6–7, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872463.

Cohen:1999:MNSl

[1311] Fred Cohen. Managing networksecurity: Why it was done thatway. Network Security, 1999(12):7–9, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),

Page 191: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 191

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872475.

Webb:1999:UAO

[1312] Alison Webb. User authentication: Op-tions in Oracle. Network Security, 1999(12):10–14, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872487.

Miller:1999:DLD

[1313] Nigel Miller. Deep linking — deeptrouble. Network Security, 1999(12):15–16, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872499.

Miller:1999:ILC

[1314] Nigel Miller. Internet lotteries con-sidered — taking a spanner to themicrochip. Network Security, 1999(12):16–19, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800872505.

Anonymous:1999:Em

[1315] Anonymous. Events. Network Security,1999(12):20, December 1999. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485899903318.

Anonymous:2000:EB

[1316] Anonymous. Editorial board. Net-work Security, 2000(1):1, January

2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800900230.

Anonymous:2000:PESa

[1317] Anonymous. PGP encryption soft-ware granted global export license.Network Security, 2000(1):1, January2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800900242.

Anonymous:2000:AET

[1318] Anonymous. Alliance enhances trustin PCs. Network Security, 2000(1):2, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900254.

Anonymous:2000:SMP

[1319] Anonymous. Secure mobile e-paymentsystem for Europe. Network Secu-rity, 2000(1):2, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900266.

Anonymous:2000:PSM

[1320] Anonymous. PKI solution forMicrosoft smart card for Win-dows. Network Security, 2000(1):2–3, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900278.

Page 192: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 192

Anonymous:2000:PAI

[1321] Anonymous. Protect against Internetintruders and hackers. Network Secu-rity, 2000(1):3, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580090028X.

Anonymous:2000:USV

[1322] Anonymous. Unix server vulner-ability. Network Security, 2000(1):3, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900308.

Anonymous:2000:SSV

[1323] Anonymous. Solaris snoop vul-nerability. Network Security, 2000(1):3, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580090031X.

Anonymous:2000:NTI

[1324] Anonymous. New tool identifiesthe root cause of network vulner-ability. Network Security, 2000(1):3, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800900291.

Sterlicchi:2000:SCD

[1325] John Sterlicchi. Software com-panies disappointed by encryptiondraft. Network Security, 2000(1):4, January 2000. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800866477.

Gengler:2000:JBM

[1326] Barbara Gengler. JavaScript banmay happen. Network Security,2000(1):4, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800866489.

Townsend:2000:CLL

[1327] Kevin Townsend. Carraig Ltd: Latchesfor Windows. Network Security, 2000(1):5–7, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800866490.

Blatchford:2000:ISBa

[1328] Clive Blatchford. Information secu-rity, business and the Internet —Part 1. Network Security, 2000(1):8–12, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800866507.

Humphreys:2000:SW

[1329] Ted Humphreys. Signing the e-word. Network Security, 2000(1):13, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800866519.

Page 193: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 193

Barnett:2000:TCS

[1330] Steve Barnett. Top 10 challenges tosecuring a network. Network Security,2000(1):14–16, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800866520.

Boni:2000:NMO

[1331] Bill Boni. New means — oldcrimes. Network Security, 2000(1):17, January 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800866532.

Cohen:2000:DF

[1332] Fred Cohen. Digital forensics. Net-work Security, 2000(1):18–20, January2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800866544.

Anonymous:2000:ECa

[1333] Anonymous. Events calendar. Net-work Security, 2000(1):20, January2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800900321.

Anonymous:2000:TCD

[1334] Anonymous. TFN2K causes denial-of-service attack. Network Security, 2000(2):1–2, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800020018.

Anonymous:2000:SSG

[1335] Anonymous. Security scanning guide-lines for Singapore ISPs. Net-work Security, 2000(2):2, February 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580002002X.

Scarrott:2000:CDC

[1336] Paul Scarrott. Consortium to definecommon standards. Network Security,2000(2):2, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800020031.

Anonymous:2000:NAP

[1337] Anonymous. Network Associates plansto divide. Network Security, 2000(2):3, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800020043.

Anonymous:2000:RSW

[1338] Anonymous. Radicchio to secure wire-less e-commerce. Network Security,2000(2):3, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800020055.

Hough:2000:AHE

[1339] Jill Hough. Adapters help to enableLAN security. Network Security, 2000(2):3, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

Page 194: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 194

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800020079.

Anonymous:2000:HPS

[1340] Anonymous. HP provides securityfor Microsoft Web servers. Net-work Security, 2000(2):3, February 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800020067.

Wehde:2000:MBS

[1341] Ed Wehde. Microsoft to beef up SQLserver security. Network Security, 2000(2):4, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876515.

Gengler:2000:UIR

[1342] Barbara Gengler. US ISP requirespassword changes. Network Security,2000(2):4, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876527.

Gengler:2000:CPC

[1343] Barbara Gengler. Check Pointcreates broadband Internet com-pany. Network Security, 2000(2):4–5, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876539.

Wehde:2000:IME

[1344] Ed Wehde. IBM, Microsoft in encryp-tion effort. Network Security, 2000(2):5, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876540.

Schultz:2000:IDR

[1345] E. Eugene Schultz. Intrusion detec-tion revisited. Network Security, 2000(2):6–9, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876552.

Blatchford:2000:ISBb

[1346] Clive Blatchford. Information secu-rity, business and the Internet —Part 2. Network Security, 2000(2):10–14, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876564.

Boni:2000:RC

[1347] Bill Boni. The Russian connec-tion. Network Security, 2000(2):15–16, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876576.

Anonymous:2000:CSS

[1348] Anonymous. E-commerce surveyshows that security is the greatestconcern. Network Security, 2000(2):16, February 1, 2000. CODEN

Page 195: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 195

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800020158.

Cohen:2000:WM

[1349] Fred Cohen. Worker monitor-ing. Network Security, 2000(2):17–19, February 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800876588.

Anonymous:2000:DSP

[1350] Anonymous. Denial-of-service withPMTU strategy. Network Security,2000(3):1, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030014.

Anonymous:2000:VMR

[1351] Anonymous. Vulnerability in Mi-crosoft RTF files. Network Security,2000(3):2, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030026.

Anonymous:2000:SFR

[1352] Anonymous. Service failure result-ing from attack. Network Security,2000(3):2, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030038.

Anonymous:2000:PA

[1353] Anonymous. Prevention of DoSattacks. Network Security, 2000(3):2–3, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580003004X.

Anonymous:2000:EES

[1354] Anonymous. European encryption stillsafer than US versions. Network Secu-rity, 2000(3):3, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030051.

Dierickx:2000:EGD

[1355] Juergen Dierickx. European guide-lines for digital signatures. Net-work Security, 2000(3):3–4, March 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800030063.

Anonymous:2000:CPF

[1356] Anonymous. Companies provide fire-wall and VPN solution. Network Secu-rity, 2000(3):4, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030075.

Anonymous:2000:NEF

[1357] Anonymous. National extranet fur-ther secured. Network Security, 2000(3):4, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

Page 196: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 196

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030087.

Anonymous:2000:ALS

[1358] Anonymous. Aussies lack security fore-commerce. Network Security, 2000(3):4–5, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030099.

Anonymous:2000:FSM

[1359] Anonymous. Further security for mo-bile transactions. Network Security,2000(3):5, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030117.

Anonymous:2000:MCL

[1360] Anonymous. Mobile e-commerce linkssecured. Network Security, 2000(3):5, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030105.

Anonymous:2000:WCS

[1361] Anonymous. Wireless e-commerce se-curity strengthened. Network Security,2000(3):5–6, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030129.

Anonymous:2000:VOS

[1362] Anonymous. VPN offers secure In-ternet connectivity. Network Security,

2000(3):6, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030142.

Bunker:2000:SOS

[1363] Lucy Bunker. Symantec offers saferInternet. Network Security, 2000(3):6, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030154.

Crenshaw:2000:SPK

[1364] Scott Crenshaw. Speedy public keycryptography system. Network Secu-rity, 2000(3):6, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800030130.

Wehde:2000:ATT

[1365] Ed Wehde. AOL in trouble ontwo fronts. Network Security, 2000(3):7, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800880228.

Sterlicchi:2000:BCA

[1366] John Sterlicchi. BugNet confirms Ac-tive Directory bug. Network Security,2000(3):7–8, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580088023X.

Page 197: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 197

Madsen:2000:RDU

[1367] Wayne Madsen. Revised draft UScrypto export regulations leaked. Net-work Security, 2000(3):8, March 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800880241.

Townsend:2000:RML

[1368] Kevin Townsend. Reflex MagneticsLtd: MailSafe. Network Security, 2000(3):9–11, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800880253.

Forte:2000:ASP

[1369] Dario Forte. Auditing and security pol-icy: The cornerstone of company infor-mation protection. Network Security,2000(3):12–13, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800880265.

Hughes:2000:ECT

[1370] John Hughes. Enabling e-commercethrough PKI. Network Security, 2000(3):14–16, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800880277.

Cohen:2000:CDa

[1371] Fred Cohen. Collaborative de-fence. Network Security, 2000(3):17–20, March 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800880289.

Anonymous:2000:SMW

[1372] Anonymous. ‘Screen-melting’ wormon the loose. Network Security,2000(4):1, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040010.

Anonymous:2000:THD

[1373] Anonymous. Teenage hacker de-nies Web attacks. Network Security,2000(4):2, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040022.

Anonymous:2000:CCS

[1374] Anonymous. Credit cards stolenthrough known weakness. NetworkSecurity, 2000(4):2, April 1, 2000.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800040034.

Anonymous:2000:USR

[1375] Anonymous. Unsafe sites re-ported. Network Security, 2000(4):2–3, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040046.

Anonymous:2000:SAE

[1376] Anonymous. Sophos attempts to ed-ucate Internet users. Network Secu-

Page 198: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 198

rity, 2000(4):3, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040058.

Anonymous:2000:EVA

[1377] Anonymous. Exploitable vulnera-bility in atsar. Network Security,2000(4):3, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040071.

Anonymous:2000:CAB

[1378] Anonymous. Clip Art buffer over-flow vulnerability. Network Security,2000(4):3, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580004006X.

Anonymous:2000:WLR

[1379] Anonymous. wmcdplay local rootcompromise. Network Security, 2000(4):3–4, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040083.

Anonymous:2000:MTF

[1380] Anonymous. Managing traffic flow tostop DOS attack. Network Security,2000(4):4, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040101.

Anonymous:2000:VF

[1381] Anonymous. Vulnerability in FireWall-1. Network Security, 2000(4):4, April 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800040095.

Anonymous:2000:CRR

[1382] Anonymous. China relaxes rules on en-cryption products. Network Security,2000(4):4–5, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040113.

Anonymous:2000:CWSa

[1383] Anonymous. Chinese Web sitehacked. Network Security, 2000(4):5, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040149.

Anonymous:2000:BBS

[1384] Anonymous. Baltimore buys stake inJapanese market. Network Security,2000(4):5, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040125.

Curran:2000:RID

[1385] John Curran. Rapid integration ofdigital certificates. Network Security,2000(4):5, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040137.

Page 199: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 199

Anonymous:2000:CPSa

[1386] Anonymous. Companies provide secureonline brokering. Network Security,2000(4):5–6, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040150.

Anonymous:2000:FVT

[1387] Anonymous. Firewall vendors targetsmaller companies. Network Security,2000(4):6, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800040162.

Anonymous:2000:VSM

[1388] Anonymous. Virus scanner for e-mail as it arrives. Network Security,2000(4):6, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800886183.

Anonymous:2000:GSA

[1389] Anonymous. Gigabit security ap-pliance launched. Network Security,2000(4):6, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800886195.

Anonymous:2000:JBS

[1390] Anonymous. Java-based secure ap-plication environment created. Net-work Security, 2000(4):6, April 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485800886201.

Hickson:2000:GSS

[1391] Nigel Hickson. Government sup-port for secure electronic com-merce. Network Security, 2000(4):7–10, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800886213.

Anonymous:2000:WWY

[1392] Anonymous. Where will your e-commerce disputes be resolved? Net-work Security, 2000(4):11–12, April 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800886225.

Landrok:2000:CCV

[1393] Peter Landrok. Challenging the con-ventional view of PKI: Will it re-ally work? Network Security, 2000(4):12–15, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800886237.

Cohen:2000:CDb

[1394] Fred Cohen. Countering DCAs. Net-work Security, 2000(4):15–19, April 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800886249.

Boni:2000:HCL

[1395] Bill Boni. Hackers, crackers, lawyersand other dangers. Network Security,

Page 200: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 200

2000(4):19–20, April 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800886250.

Anonymous:2000:MCG

[1396] Anonymous. Malicious codes getmore mobility. Network Security,2000(5):1, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050017.

Anonymous:2000:BCS

[1397] Anonymous. Bug could slow downservers. Network Security, 2000(5):1–2, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050029.

Anonymous:2000:TPW

[1398] Anonymous. Tighter permissions forWindows Registry key. Network Secu-rity, 2000(5):2, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050030.

Anonymous:2000:CAR

[1399] Anonymous. Cyber attacks re-ported by 90% of survey respon-dents. Network Security, 2000(5):2–3, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050042.

McCathie:2000:ISF

[1400] Andy McCathie. Internet secu-rity fears prompt IT security mea-sures. Network Security, 2000(5):3, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050054.

Anonymous:2000:IAW

[1401] Anonymous. Internet attacks will re-place military conflicts. Network Secu-rity, 2000(5):3, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050078.

Anonymous:2000:CLS

[1402] Anonymous. 2:20% of companies liableto suffer DoS attacks. Network Secu-rity, 2000(5):3, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050066.

Anonymous:2000:GBE

[1403] Anonymous. Governments back downon encryption regulations. Net-work Security, 2000(5):3–4, May 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580005008X.

Smith:2000:CES

[1404] Tim Smith. Company expands to sup-port PKI demands. Network Secu-rity, 2000(5):4, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

Page 201: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 201

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050108.

Anonymous:2000:PTD

[1405] Anonymous. Privacy threatened bydigital signatures. Network Security,2000(5):4, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050091.

Zafar:2000:ACB

[1406] Naeem Zafar. Authentication com-pany buys smart card firm. Net-work Security, 2000(5):4–5, May 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580005011X.

Decaux:2000:EOS

[1407] Christophe Decaux. European on-line stores secured. Network Secu-rity, 2000(5):5, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050121.

Bridson:2000:CFB

[1408] David Bridson. Companies form e-business alliance. Network Security,2000(5):5, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050133.

Anonymous:2000:CPSb

[1409] Anonymous. E-commerce portals se-curely managed. Network Security,

2000(5):5–6, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050145.

StPierre:2000:TFA

[1410] Jim St.Pierre. Two-factor au-thentication added to PKI solu-tions. Network Security, 2000(5):6, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050182.

Anonymous:2000:SES

[1411] Anonymous. Signing and encryp-tion software system launched. Net-work Security, 2000(5):6, May 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800050170.

Anonymous:2000:EPS

[1412] Anonymous. Enhancement for PKIsecurity. Network Security, 2000(5):6, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050169.

Anonymous:2000:VPS

[1413] Anonymous. Visitor’s PC scannedbefore trading. Network Security,2000(5):6, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050157.

Page 202: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 202

Anonymous:2000:SEW

[1414] Anonymous. Security enhance-ments for wireless VPN connec-tions. Network Security, 2000(5):6–7, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050194.

Ott:2000:C

[1415] Rachael Ott. Cybersquatting. Net-work Security, 2000(5):7, May 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800050212.

Anonymous:2000:PGO

[1416] Anonymous. Product guarantees ori-gin of e-mail. Network Security,2000(5):7, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050200.

Helmich:2000:PKI

[1417] Paul Helmich. Public key infrastruc-tures: a panacea solution? Net-work Security, 2000(5):8–11, May 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800050224.

Corell:2000:TRP

[1418] Simon Corell. Ten risks of PKI: Infavour of smart card-based PKI. Net-work Security, 2000(5):12–14, May 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485800050236.

Cohen:2000:EIA

[1419] Fred Cohen. Eliminating IP addressforgery — five years old and go-ing strong. Network Security, 2000(5):15–18, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800050248.

Boni:2000:MTC

[1420] Bill Boni. The more things change, themore they stay the same!: Headline:“DTI Survey Finds Most UK Compa-nies Experienced Security Breaches.”Headline: “FBI Study Finds U.S.Losses to Computer Crime Increased100%.”. Network Security, 2000(5):18–19, May 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580005025X.

Anonymous:2000:NVC

[1421] Anonymous. NewLove virus changesto avoid detection. Network Secu-rity, 2000(6):1, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060013.

Anonymous:2000:VSU

[1422] Anonymous. Virus spreads un-opened. Network Security, 2000(6):1–2, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

Page 203: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 203

//www.sciencedirect.com/science/

article/pii/S1353485800060025.

Anonymous:2000:BAC

[1423] Anonymous. Bugs allow compromis-ing of SSL sessions. Network Secu-rity, 2000(6):2, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060037.

Anonymous:2000:SFH

[1424] Anonymous. Server forced to haltand then reload. Network Security,2000(6):2–3, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060049.

Anonymous:2000:EFP

[1425] Anonymous. Experts find potentialfor cookie stealing. Network Secu-rity, 2000(6):3, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060050.

Anonymous:2000:IFR

[1426] Anonymous. IP fragment reassem-bly vulnerability. Network Security,2000(6):3–4, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060062.

Moore:2000:ZLP

[1427] Carol Moore. Zaxus launches PKI so-lution for e-commerce. Network Secu-rity, 2000(6):4, June 1, 2000. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060086.

Parker:2000:CUS

[1428] Sara Parker. Companies unite to se-cure EBPP market. Network Secu-rity, 2000(6):4, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060098.

Anonymous:2000:UIS

[1429] Anonymous. UK initiative to se-cure e-commerce. Network Security,2000(6):4, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060074.

Anonymous:2000:CLI

[1430] Anonymous. Convenience lost for in-creased security. Network Security,2000(6):4–5, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060104.

Smith:2000:ABS

[1431] Tim Smith. Authentication by bio-metric smart card. Network Secu-rity, 2000(6):5, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060116.

Page 204: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 204

Anonymous:2000:BSF

[1432] Anonymous. Backup to save filesfrom virus. Network Security, 2000(6):5, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580006013X.

Anonymous:2000:CVT

[1433] Anonymous. Creation of VPN tun-nels simplified. Network Security,2000(6):5, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060128.

Bunker:2000:AVT

[1434] Lucy Bunker. Anti-virus technol-ogy for Yahoo! Network Security,2000(6):5–6, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060141.

Anonymous:2000:LB

[1435] Anonymous. Love bugged! Net-work Security, 2000(6):6, June 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800060153.

Spalding:2000:DWU

[1436] Michael Spalding. Deciding whetheror not to use a third party certifi-cate authority. Network Security,2000(6):7–8, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060165.

Tobias:2000:LBD

[1437] Henk Tobias. To be or not tobe — legally binding digital cer-tificates. Network Security, 2000(6):9–11, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060177.

Venter:2000:NSI

[1438] H. S. Venter and J. H. P. Eloff.Network security: Important is-sues. Network Security, 2000(6):12–16, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060189.

Cohen:2000:WCW

[1439] Fred Cohen. Why can’t we do DNSright? Network Security, 2000(6):17–18, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060190.

Boni:2000:ODD

[1440] Bill Boni. Ode to ‘digital de-fenders’. Network Security, 2000(6):19, June 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800060207.

Page 205: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 205

Anonymous:2000:FFC

[1441] Anonymous. Flaw in firewall couldlead to DoS attack. Network Secu-rity, 2000(7):1, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580007001X.

Anonymous:2000:SBT

[1442] Anonymous. The Serbian BadmanTrojan. Network Security, 2000(7):1–2, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070021.

Anonymous:2000:IDS

[1443] Anonymous. IPCS denial-of-serviceattack. Network Security, 2000(7):2, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070033.

Anonymous:2000:KRA

[1444] Anonymous. Kerberos at risk fromDoS attacks. Network Security,2000(7):3, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070045.

Anonymous:2000:SCV

[1445] Anonymous. SSL certificate valida-tion vulnerability. Network Security,2000(7):3, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070057.

Anonymous:2000:ACV

[1446] Anonymous. AIX cdmount vul-nerability. Network Security, 2000(7):3–4, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070069.

Anonymous:2000:NVR

[1447] Anonymous. New viruses run with-out being opened. Network Security,2000(7):4, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070070.

Anonymous:2000:PVP

[1448] Anonymous. Powerful virus protectionthrough partnership. Network Secu-rity, 2000(7):4, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070082.

Anonymous:2000:BGA

[1449] Anonymous. BT gives anti-virus con-tract to NAI. Network Security,2000(7):4, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070094.

Anonymous:2000:APE

[1450] Anonymous. Alliance provides en-hanced Internet security. Network

Page 206: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 206

Security, 2000(7):4–5, July 1, 2000.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800070100.

Anonymous:2000:ULC

[1451] Anonymous. UK launches code of bestpractice for e-business. Network Secu-rity, 2000(7):5, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070112.

Anonymous:2000:PESb

[1452] Anonymous. Product enhances se-cure file transfers. Network Security,2000(7):5, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070124.

Anonymous:2000:ANT

[1453] Anonymous. Attempt number twoto protect against ILOVEYOU. Net-work Security, 2000(7):5, July 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800070136.

Anonymous:2000:AVT

[1454] Anonymous. Anti-virus technology forthe Palm OS platform. Network Secu-rity, 2000(7):6, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070148.

Anonymous:2000:BUP

[1455] Anonymous. Businesses urged to pro-tect performance. Network Security,2000(7):6, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580007015X.

Anonymous:2000:ICF

[1456] Anonymous. Intelligent content fil-tering offering. Network Security,2000(7):6, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070161.

Webb:2000:AEM

[1457] Alison Webb. Auditing electronicmail. Network Security, 2000(7):7–10, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070173.

Wright:2000:VPN

[1458] Marie A. Wright. Virtual private net-work security. Network Security, 2000(7):11–14, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070185.

Cohen:2000:WDI

[1459] Fred Cohen. What does it do be-hind your back? Network Security,2000(7):15–17, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

Page 207: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 207

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070197.

Boni:2000:WDW

[1460] Bill Boni. What to do when theworst happens! Network Security,2000(7):18–19, July 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800070203.

Dwan:2000:TBS

[1461] Berni Dwan. Time-based security.Network Security, 2000(7):19, July 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800070215.

Anonymous:2000:DUC

[1462] Anonymous. Don’t use the ‘Crayonof Doom’. Network Security, 2000(8):1–2, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080016.

Anonymous:2000:ASD

[1463] Anonymous. “Active Setup Down-load” vulnerability. Network Security,2000(8):2, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080028.

Anonymous:2000:LWA

[1464] Anonymous. LISTSERV Web archiveremote overflow. Network Security,2000(8):2, August 1, 2000. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580008003X.

Anonymous:2000:OUS

[1465] Anonymous. OpenSSH UseLogin se-curity risk. Network Security, 2000(8):2–3, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080041.

Anonymous:2000:PFT

[1466] Anonymous. PIX firewall TCP re-set vulnerability. Network Security,2000(8):3, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080053.

Anonymous:2000:PCF

[1467] Anonymous. Powergen customer findsdebit card details. Network Security,2000(8):3, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080065.

Anonymous:2000:HVC

[1468] Anonymous. Hackers/viruses cost busi-nesses $1.6 trillion. Network Security,2000(8):3–4, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080077.

Page 208: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 208

Anonymous:2000:IPS

[1469] Anonymous. Internet poses seriousthreat to national security. Net-work Security, 2000(8):4, August 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800080089.

Anonymous:2000:IWH

[1470] Anonymous. Investigation into wire-less hacks. Network Security, 2000(8):4, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080090.

Anonymous:2000:MCB

[1471] Anonymous. Mission-critical e-businesssecurity. Network Security, 2000(8):4, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080107.

Anonymous:2000:SWA

[1472] Anonymous. Secure wireless accessto applications. Network Security,2000(8):4, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080119.

Anonymous:2000:MIU

[1473] Anonymous. Microsoft and ISS uniteto secure ISA Server 2000. Net-work Security, 2000(8):5, August 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485800080120.

Anonymous:2000:NWS

[1474] Anonymous. New Web securitysolution. Network Security, 2000(8):5, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080132.

Anonymous:2000:TPE

[1475] Anonymous. Tool prevents employeecomputer misuse. Network Security,2000(8):5, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080144.

Anonymous:2000:FSL

[1476] Anonymous. Firewall suitable forlarge data centres. Network Security,2000(8):5, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080156.

Wheeler:2000:DSC

[1477] Graham Wheeler. Denial-of-service:courting disaster. Network Security,2000(8):6, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080168.

Madsen:2000:WUN

[1478] Wayne Madsen. Whitehouse un-veils new cyber-crime, crypto ex-port policies. Network Security, 2000

Page 209: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 209

(8):7, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580008017X.

Cox:2000:EWI

[1479] Peter Cox. Exactly what it says on theTin . . . says who? Network Security,2000(8):8–10, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080181.

Cohen:2000:UVB

[1480] Fred Cohen. Understanding virusesbio-logically. Network Security, 2000(8):11–16, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080193.

Boni:2000:UMG

[1481] Bill Boni. The US mob gets savvy tocyber crime. Network Security, 2000(8):17–18, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580008020X.

Schultz:2000:BRI

[1482] E. Eugene Schultz. Book review:Intrusion Detection: Rebecca Bace[Macmillan Technical Publishing, In-dianapolis, IN, USA, ISBN 1-57870-185-6]. Network Security, 2000(8):19, August 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800080211.

Anonymous:2000:BIW

[1483] Anonymous. 32-bit Internet worm‘Sysid.exe’. Network Security, 2000(9):1, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090012.

Anonymous:2000:MPT

[1484] Anonymous. Mobile phone targeted byvirus writers. Network Security, 2000(9):1–2, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090024.

Anonymous:2000:TGH

[1485] Anonymous. Trojan gives hackerscontrol. Network Security, 2000(9):2, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090036.

Anonymous:2000:WSC

[1486] Anonymous. Weak security for e-commerce servers. Network Secu-rity, 2000(9):2–3, September 1, 2000.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800090048.

Anonymous:2000:JAR

[1487] Anonymous. Java applets read pro-tected resources. Network Security,2000(9):3, September 1, 2000. CODEN

Page 210: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 210

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580009005X.

Anonymous:2000:IOM

[1488] Anonymous. IE opens Microsoft Accessand executes code. Network Security,2000(9):3, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090061.

Anonymous:2000:RLC

[1489] Anonymous. Remote and local compro-mise allowed. Network Security, 2000(9):3–4, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090073.

Anonymous:2000:LCV

[1490] Anonymous. Linux capability vul-nerability. Network Security, 2000(9):4, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090085.

Anonymous:2000:PAV

[1491] Anonymous. PGP ADKs vulnera-bility. Network Security, 2000(9):4, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090097.

Anonymous:2000:WWV

[1492] Anonymous. WorldView Wnn vul-nerability. Network Security, 2000(9):4, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090103.

Anonymous:2000:FWG

[1493] Anonymous. FBI wants global Inter-net security organization. NetworkSecurity, 2000(9):4–5, September 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800090115.

Anonymous:2000:BNS

[1494] Anonymous. Banking on network se-curity basics. Network Security, 2000(9):5, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090127.

Anonymous:2000:OSH

[1495] Anonymous. Online shopping hinderedby security fears. Network Security,2000(9):5, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090139.

Anonymous:2000:USI

[1496] Anonymous. Ultimo secures insur-ance group. Network Security, 2000(9):5, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

Page 211: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 211

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090140.

Anonymous:2000:BNW

[1497] Anonymous. Bolero.net and WISekeyjoin forces. Network Security, 2000(9):5, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090152.

Anonymous:2000:VPM

[1498] Anonymous. Virus protection formobile phones and handheld com-puters. Network Security, 2000(9):5–6, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090164.

Anonymous:2000:SMT

[1499] Anonymous. Secure e-mail technol-ogy unveiled. Network Security, 2000(9):6, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090176.

Anonymous:2000:PPV

[1500] Anonymous. Plug-and-play VPN se-curity box. Network Security, 2000(9):6, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090188.

Anonymous:2000:AIH

[1501] Anonymous. AES IP hardware encryp-tor introduced. Network Security, 2000(9):6–7, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580009019X.

Anonymous:2000:UAS

[1502] Anonymous. User authentication viasmart card. Network Security, 2000(9):7, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090206.

Anonymous:2000:MSSa

[1503] Anonymous. Managed security ser-vice enables outsourcing of secu-rity. Network Security, 2000(9):7, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090218.

Anonymous:2000:ICO

[1504] Anonymous. iSolve clamp downon online credit card fraud. Net-work Security, 2000(9):7, September 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580009022X.

Gengler:2000:UPC

[1505] Barbara Gengler. US President Clin-ton signs Digital Signature Bill. Net-work Security, 2000(9):7–8, September1, 2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 212: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 212

URL http://www.sciencedirect.

com/science/article/pii/S1353485800090231.

Donnelly:2000:UNL

[1506] Allan Donnelly. US national labfights viruses. Network Security, 2000(9):8, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090243.

Kaliski:2000:CNP

[1507] Burt Kaliski. Considerations for newpublic-key algorithms. Network Se-curity, 2000(9):9–10, September 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800090255.

Syed:2000:CLA

[1508] Furqan Syed. Children of DES: alook at the Advanced Encryption Stan-dard. Network Security, 2000(9):11–12, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090267.

Wright:2000:IQC

[1509] Marie A. Wright. The impact ofquantum computing on cryptogra-phy. Network Security, 2000(9):13–15, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090279.

Cohen:2000:C

[1510] Fred Cohen. Chipping. Network Se-curity, 2000(9):16–17, September 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800090280.

Boni:2000:CPC

[1511] Bill Boni. Carnivores, predators andcivil liberties. Network Security, 2000(9):18–19, September 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800090292.

Anonymous:2000:FSF

[1512] Anonymous. Federal security foundlacking. Network Security, 2000(10):1, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100017.

Anonymous:2000:IIR

[1513] Anonymous. Indian IT out ofreach. Network Security, 2000(10):2, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100029.

Anonymous:2000:ILL

[1514] Anonymous. International legisla-tion at last. Network Security, 2000(10):2, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100030.

Page 213: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 213

Anonymous:2000:PSA

[1515] Anonymous. Privacy suit againstAbout.com. Network Security, 2000(10):2, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100042.

Anonymous:2000:CWSb

[1516] Anonymous. Czech W2K.Stream virusdiscovered. Network Security, 2000(10):2–3, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100054.

Anonymous:2000:VIS

[1517] Anonymous. Virus inoculation bysatellite. Network Security, 2000(10):3, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100066.

Anonymous:2000:HNI

[1518] Anonymous. Home networking onincrease. Network Security, 2000(10):3, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100078.

Anonymous:2000:EPE

[1519] Anonymous. Equant provides ex-tranet. Network Security, 2000(10):3–4, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580010008X.

Anonymous:2000:MIE

[1520] Anonymous. Music industry enlistshelp of hackers. Network Security,2000(10):4, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100091.

Anonymous:2000:CP

[1521] Anonymous. Crime pays. Net-work Security, 2000(10):4, October 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800100108.

Anonymous:2000:CCF

[1522] Anonymous. 43% of credit card fraudnot reported. Network Security, 2000(10):4, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580010011X.

Anonymous:2000:AID

[1523] Anonymous. Advanced intrusion de-tection. Network Security, 2000(10):4, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100121.

Anonymous:2000:MSD

[1524] Anonymous. E-mail scanner detectsporn. Network Security, 2000(10):4–5, October 1, 2000. CODEN

Page 214: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 214

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100133.

Anonymous:2000:VAS

[1525] Anonymous. Voice authenticationsmart card. Network Security, 2000(10):5, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100145.

Anonymous:2000:SCA

[1526] Anonymous. Security a competitiveadvantage? Network Security, 2000(10):5–6, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100157.

Madsen:2000:CVA

[1527] Wayne Madsen. Carnivore’s vora-cious appetite. Network Security, 2000(10):6–7, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100169.

Wheeler:2000:RB

[1528] Graham Wheeler. RIP Bill. Net-work Security, 2000(10):7–8, October1, 2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800100170.

Madsen:2000:EMA

[1529] Wayne Madsen. Employer Monitor-ing Act proposed. Network Security,

2000(10):8, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100182.

Bond:2000:BBB

[1530] Colin L. Bond. Big Brother has beenhere all along. Network Security, 2000(10):9, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100194.

McDermott:2000:BTO

[1531] Paul McDermott. Building trust intoonline business. Network Security, 2000(10):10–12, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100200.

Osen:2000:TSJ

[1532] Janet Osen. The thorny side of ju-risdiction and the Internet. NetworkSecurity, 2000(10):13–16, October 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800100212.

Cohen:2000:RR

[1533] Fred Cohen. Revisiting risk. NetworkSecurity, 2000(10):17–18, October 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800100224.

Page 215: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 215

Boni:2000:LD

[1534] Bill Boni. Lights in the dark-ness. Network Security, 2000(10):19–20, October 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800100236.

Anonymous:2000:MHL

[1535] Anonymous. Microsoft hacked . . .twice. Network Security, 2000(11):1–2, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850011.

Anonymous:2000:HBI

[1536] Anonymous. Hackers boycott indus-try olive-branch. Network Security,2000(11):2, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850023.

Anonymous:2000:CKC

[1537] Anonymous. Curiosity killed theCueCat. Network Security, 2000(11):2, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850035.

Anonymous:2000:AHU

[1538] Anonymous. Anti-hackers to be un-leashed. Network Security, 2000(11):2–3, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850047.

Anonymous:2000:CMI

[1539] Anonymous. China muzzles In-ternet. Network Security, 2000(11):3, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850059.

Anonymous:2000:MTG

[1540] Anonymous. Mexicans have trou-ble getting online. Network Security,2000(11):3, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850060.

Anonymous:2000:B

[1541] Anonymous. In brief. Network Se-curity, 2000(11):3, November 2000.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800850084.

Anonymous:2000:IWC

[1542] Anonymous. Ireland wins cyber cham-pion award. Network Security, 2000(11):3–4, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850072.

Anonymous:2000:CUH

[1543] Anonymous. Columbia University hostcrystal ball gazing. Network Security,2000(11):4, November 2000. CODEN

Page 216: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 216

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850096.

Anonymous:2000:BKF

[1544] Anonymous. Branding key to fi-nancial services. Network Security,2000(11):4, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850102.

Anonymous:2000:CWA

[1545] Anonymous. CA warns about e-mail interception. Network Security,2000(11):4, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850114.

Anonymous:2000:CWSc

[1546] Anonymous. Consumers want se-curity. Network Security, 2000(11):4, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850126.

Anonymous:2000:FWB

[1547] Anonymous. Free Web-based secu-rity assessment. Network Security,2000(11):4, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850138.

Anonymous:2000:WPI

[1548] Anonymous. Working patterns im-pact security. Network Security, 2000(11):4–5, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580085014X.

Anonymous:2000:BPD

[1549] Anonymous. BIND 9 plugs DNS. Net-work Security, 2000(11):5, November2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800850151.

Anonymous:2000:XMM

[1550] Anonymous. Xinetica monitormodems. Network Security, 2000(11):5, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850163.

Anonymous:2000:PPE

[1551] Anonymous. Plug-and-play eTo-ken. Network Security, 2000(11):5,November 2000. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485800850175.

Anonymous:2000:CCW

[1552] Anonymous. Cost-cutting Webserver. Network Security, 2000(11):5, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850187.

Page 217: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 217

Madsen:2000:FRC

[1553] Wayne Madsen. FBI releases Carni-vore documents. Network Security,2000(11):6, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850199.

Donnelly:2000:CBF

[1554] Allan Donnelly. Consumers bom-bard fraud reporting centre. Net-work Security, 2000(11):6–7, November2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800850205.

Gengler:2000:CS

[1555] Barbara Gengler. Cisco’s SAFE. Net-work Security, 2000(11):7, November2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800850217.

David:2000:VF

[1556] Jon David. The vanishing fire-wall. Network Security, 2000(11):8–11, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850230.

Roberts:2000:TWT

[1557] Graham Roberts. Tangled Web —tales of digital crime from the shad-ows of cyberspace: Richard Power, QueCorporation, 2000. Network Security,2000(11):8, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850229.

McDermott:2000:PFL

[1558] Paul McDermott. Personal firewalls. . . one more step towards comprehen-sive security. Network Security, 2000(11):11–14, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850242.

Zieger:2000:BEC

[1559] Melissa Zieger. Boost in electroniccourier traffic — traditional UK couri-ers left stranded in petrol shortage:Internet proved to be best vehiclefor secure and trackable documenttransfer. Network Security, 2000(11):14–15, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850254.

Cohen:2000:WEK

[1560] Fred Cohen. Why everything keepsfailing. Network Security, 2000(11):16–18, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800850266.

Boni:2000:MM

[1561] Bill Boni. Meteors and man-agers. Network Security, 2000(11):18–19, November 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

Page 218: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 218

//www.sciencedirect.com/science/

article/pii/S1353485800850278.

Anonymous:2000:ECb

[1562] Anonymous. Events calendar. Net-work Security, 2000(11):20, November2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580085028X.

Anonymous:2000:HHI

[1563] Anonymous. Hybris hits interna-tional scene. Network Security, 2000(12):1, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580012001X.

Anonymous:2000:PMC

[1564] Anonymous. PKI may carry viruses.Network Security, 2000(12):2, Decem-ber 1, 2000. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485800120021.

Anonymous:2000:IAO

[1565] Anonymous. IBM to adopt opensource. Network Security, 2000(12):2, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120033.

Anonymous:2000:SLH

[1566] Anonymous. Standards lobby onhold. Network Security, 2000(12):2, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120045.

Anonymous:2000:NCS

[1567] Anonymous. Non-contact smartcards for M-commerce. Network Se-curity, 2000(12):2–3, December 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800120057.

Anonymous:2000:MSSb

[1568] Anonymous. M-spam, spam, spam.Network Security, 2000(12):3, Decem-ber 1, 2000. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485800120069.

Anonymous:2000:GGT

[1569] Anonymous. Graffiti growing trend.Network Security, 2000(12):3, Decem-ber 1, 2000. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485800120070.

Anonymous:2000:GLR

[1570] Anonymous. German land registrygoes electronic. Network Security, 2000(12):3, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120082.

Anonymous:2000:CCC

[1571] Anonymous. Cyber crime can hitdirectors. Network Security, 2000

Page 219: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 219

(12):4, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120094.

Anonymous:2000:CYT

[1572] Anonymous. Can you trust yourbank? Network Security, 2000(12):4, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120100.

Anonymous:2000:BSN

[1573] Anonymous. Biometric screensaverfor notebook. Network Security, 2000(12):4, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120112.

Anonymous:2000:LSP

[1574] Anonymous. Layered system pre-ferred. Network Security, 2000(12):4, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120124.

Madsen:2000:HCI

[1575] Wayne Madsen. Health care indus-try debate: Electronic versus digitalsignatures. Network Security, 2000(12):5, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120136.

Wales:2000:DEP

[1576] Elspeth Wales. DNSSEC emerges toprotect Internet infrastructure. Net-work Security, 2000(12):5, December 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800120148.

Madsen:2000:DPC

[1577] Wayne Madsen. Data protec-tion commissioners explore newground. Network Security, 2000(12):6, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580012015X.

McDermott:2000:SIN

[1578] Paul McDermott. Security in IP net-works. Network Security, 2000(12):7–9, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120161.

Pemble:2000:WYL

[1579] Matthew Pemble. Washing yourlaundry in public — an analysis ofrecent high-publicity security inci-dents. Network Security, 2000(12):10–12, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120173.

Kakalik:2000:PSW

[1580] John S. Kakalik and Marie A. Wright.Privacy and security in wireless com-puting. Network Security, 2000(12):

Page 220: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 220

12–15, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120185.

Cohen:2000:MAY

[1581] Fred Cohen. The Millennium ar-ticle — yet again!: The bots arecoming!!! The bots are com-ing!!! Network Security, 2000(12):15–18, December 1, 2000. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485800120197.

Boni:2000:TTH

[1582] Bill Boni. Tricks and treats from thehacker underground! Network Se-curity, 2000(12):18–19, December 1,2000. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485800120203.

Anonymous:2001:TMC

[1583] Anonymous. Three million creditcards compromised. Network Security,2001(1):1, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001015.

Anonymous:2001:SBM

[1584] Anonymous. Singapore backs e-money. Network Security, 2001(1):2, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001027.

Anonymous:2001:PSL

[1585] Anonymous. Port scanning legalin US. Network Security, 2001(1):2, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001039.

Anonymous:2001:CPL

[1586] Anonymous. Canadian privacy lawworries US. Network Security, 2001(1):2, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001040.

Anonymous:2001:CLN

[1587] Anonymous. Cybercrime laws needoverhaul. Network Security, 2001(1):3, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001052.

Anonymous:2001:Ba

[1588] Anonymous. In brief. Network Se-curity, 2001(1):3, January 1, 2001.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801001076.

Anonymous:2001:NWA

[1589] Anonymous. NIPC worried aboutDoS. Network Security, 2001(1):3–4, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001064.

Page 221: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 221

Anonymous:2001:ITP

[1590] Anonymous. Indian teens to po-lice Net. Network Security, 2001(1):4, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001088.

Anonymous:2001:SS

[1591] Anonymous. Security on scale of1 to 10. Network Security, 2001(1):4, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100109X.

Anonymous:2001:FIW

[1592] Anonymous. FTC investigates wire-less privacy. Network Security, 2001(1):4, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001106.

Madsen:2001:CDR

[1593] Wayne Madsen. Carnivore docu-ments reveal enhanced tapping abil-ities. Network Security, 2001(1):5, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001118.

Wales:2001:MTC

[1594] Elspeth Wales. McAfee targets cor-porates with its ASP security soft-ware. Network Security, 2001(1):5–6, January 1, 2001. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100112X.

Groves:2001:SAS

[1595] Jackie Groves. Security for applicationservice providers. Network Security,2001(1):6–9, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001131.

Pemble:2001:ATC

[1596] Matthew Pemble. Always trustcontent from Microsoft Corpora-tion? Network Security, 2001(1):10–12, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001143.

Brown:2001:VOP

[1597] Arlene Brown. VPNs: Only partof the remote access security solu-tion. Network Security, 2001(1):12–14, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001155.

Cohen:2001:MHF

[1598] Fred Cohen. Marketing hyperbole atits finest. Network Security, 2001(1):15–17, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001167.

Page 222: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 222

Boni:2001:YJP

[1599] Bill Boni. The year just past and theone ahead. Network Security, 2001(1):18–19, January 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801001179.

Anonymous:2001:ECa

[1600] Anonymous. Events calendar. Net-work Security, 2001(1):20, January 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801001180.

Anonymous:2001:TSB

[1601] Anonymous. TV station blasts hackedsmartcards. Network Security, 2001(2):1, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100201X.

Anonymous:2001:CM

[1602] Anonymous. Champagne is onMIS. Network Security, 2001(2):2, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002021.

Anonymous:2001:MBR

[1603] Anonymous. More businesses report-ing piracy. Network Security, 2001(2):2–3, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002033.

Anonymous:2001:CPM

[1604] Anonymous. CPRM to protect moviesand music. Network Security, 2001(2):3, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002045.

Anonymous:2001:Bb

[1605] Anonymous. In brief. Network Se-curity, 2001(2):3, February 1, 2001.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801002070.

Anonymous:2001:PPN

[1606] Anonymous. PDA policy needed. Net-work Security, 2001(2):3, February 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801002057.

Anonymous:2001:MCS

[1607] Anonymous. Marconi cracks secureM-commerce. Network Security, 2001(2):3–4, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002069.

Anonymous:2001:BPS

[1608] Anonymous. Buchanan to provide se-curity blanket. Network Security, 2001(2):4, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002082.

Page 223: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 223

Anonymous:2001:ESM

[1609] Anonymous. Entercept secures $33million. Network Security, 2001(2):4, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002094.

Anonymous:2001:UAB

[1610] Anonymous. Unisys acquires Bal-ance. Network Security, 2001(2):4, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002100.

Anonymous:2001:SGE

[1611] Anonymous. SCM get EMV sealof approval. Network Security, 2001(2):4, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002112.

Donnelly:2001:HRR

[1612] Allan Donnelly. How to reduce riskswith ActiveX. Network Security, 2001(2):5, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002124.

Gengler:2001:WMT

[1613] Barbara Gengler. Workplace mon-itoring tops privacy hit-list. Net-work Security, 2001(2):5–6, February 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485801002136.

Madsen:2001:CSB

[1614] Wayne Madsen. Computer securityboard criticized. Network Security,2001(2):6, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002148.

Gengler:2001:HNS

[1615] Barbara Gengler. HP and Nokiasecure wireless transactions. Net-work Security, 2001(2):7, February 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580100215X.

Anonymous:2001:AVV

[1616] Anonymous. Anti-virus vendors urgeValentine’s day caution. Network Se-curity, 2001(2):7, February 1, 2001.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801002161.

Roberts:2001:BRI

[1617] Graham Roberts. Book review: In-side Internet Security — What Hack-ers Don’t Want You To Know: JeffCrume, Pearson Education Limited,£29.95. Network Security, 2001(2):8, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002173.

Page 224: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 224

Forte:2001:PPF

[1618] Dario Forte. Peer-to-peer file sharingis here to stay: Napster’s definitiveshift to a pay service means more prob-lems for system administrators. Mean-while, other similar systems are gain-ing a foothold. Network Security, 2001(2):9–11, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002185.

Pemble:2001:WHI

[1619] Matthew Pemble. W(h)ither regu-lation? Network Security, 2001(2):11–12, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002197.

Hruska:2001:VPG

[1620] Jan Hruska. Is the virus problem get-ting worse? Network Security, 2001(2):13–16, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002203.

Cohen:2001:TYS

[1621] Fred Cohen. Testing your secu-rity defence by breaking in?: Maybenot. Network Security, 2001(2):16–18, February 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801002215.

Boni:2001:BS

[1622] Bill Boni. Balancing the scales. Net-work Security, 2001(2):19–20, February1, 2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801002227.

Anonymous:2001:ECb

[1623] Anonymous. Events calendar. Net-work Security, 2001(2):20, February 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801002239.

Anonymous:2001:USC

[1624] Anonymous. US says 2600 can’t linkto DeCSS. Network Security, 2001(3):1–2, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003014.

Anonymous:2001:ULA

[1625] Anonymous. UK legislates againsthackers as cyber-terrorists. Net-work Security, 2001(3):2, March 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801003026.

Anonymous:2001:SPA

[1626] Anonymous. Swiss police arrest sus-pect in WEF hack. Network Security,2001(3):2–3, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003038.

Page 225: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 225

Anonymous:2001:MBE

[1627] Anonymous. McDonalds in BIND ex-ploitation. Network Security, 2001(3):3, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100304X.

Anonymous:2001:Bc

[1628] Anonymous. In brief. Network Secu-rity, 2001(3):3, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003063.

Anonymous:2001:BPC

[1629] Anonymous. BT profits from cy-bercrime. Network Security, 2001(3):3–4, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003051.

Anonymous:2001:SMS

[1630] Anonymous. Stock-market sensitivedata not secured. Network Security,2001(3):4, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003075.

Anonymous:2001:ESF

[1631] Anonymous. EU says fraud hasdoubled. Network Security, 2001(3):4, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003087.

Anonymous:2001:UCN

[1632] Anonymous. Users click on NakedWife. Network Security, 2001(3):4, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003099.

Donnelly:2001:DSH

[1633] Allan Donnelly. DNS software hole al-lows Web attacks. Network Security,2001(3):5, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003105.

Anonymous:2001:SLI

[1634] Anonymous. Security left out of in-vestment decisions. Network Security,2001(3):5–6, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003117.

Gengler:2001:TCP

[1635] Barbara Gengler. Trusted computingplatform alliance. Network Security,2001(3):6, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003129.

Silver:2001:AFA

[1636] Oscar Silver. AOL files another law-suit to stop junk e-mail. Network Secu-rity, 2001(3):7, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),

Page 226: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 226

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003130.

Anonymous:2001:POE

[1637] Anonymous. Post Office enabled PKIhelps kids shop online. Network Secu-rity, 2001(3):7, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003142.

Madsen:2001:TWN

[1638] Wayne Madsen. Troubled Watersat NSA. Network Security, 2001(3):8–10, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003154.

Pemble:2001:PBI

[1639] Matthew Pemble. Poking at theborders: The internationally-mindedtoad. Network Security, 2001(3):10–11, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801003166.

Cohen:2001:CSI

[1640] Fred Cohen. Corporate security in-telligence: An oxymoron? Net-work Security, 2001(3):12–17, March 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801003178.

Boni:2001:TCS

[1641] Bill Boni. The threat of cyber-sabotage: The new Internet economyhas recently seen a spate of layoffs. E-business had better watch out for theirex-technical employees — and guardagainst the potentially crippling effectsof cyber-sabotage. Network Security,2001(3):18–19, March 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100318X.

Anonymous:2001:ECc

[1642] Anonymous. Events calendar. Net-work Security, 2001(3):20, March 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801003191.

Anonymous:2001:VDI

[1643] Anonymous. VeriSign duped into is-suing fraudulent certificates. Net-work Security, 2001(4):1–2, April 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801004019.

Anonymous:2001:MIT

[1644] Anonymous. Massive identity theftby NY dish washer. Network Secu-rity, 2001(4):2, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004020.

Anonymous:2001:PFE

[1645] Anonymous. Processes at fault inextortion scam. Network Security,

Page 227: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 227

2001(4):2–3, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004032.

Anonymous:2001:Bd

[1646] Anonymous. In brief. Network Secu-rity, 2001(4):3, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004056.

Anonymous:2001:OSM

[1647] Anonymous. Open source move-ment turns tables on IP laws. Net-work Security, 2001(4):3–4, April 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801004044.

Anonymous:2001:DPE

[1648] Anonymous. Defamatory posterexposed. Network Security, 2001(4):4, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004068.

Anonymous:2001:GRI

[1649] Anonymous. Germany to require ISPsto monitor Web. Network Security,2001(4):4, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100407X.

Anonymous:2001:UTF

[1650] Anonymous. UK trials first mobileelectronic signatures. Network Secu-rity, 2001(4):4, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004081.

Anonymous:2001:WWS

[1651] Anonymous. Wireless WAN standardgets industry backing. Network Secu-rity, 2001(4):5, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004093.

Anonymous:2001:LEP

[1652] Anonymous. Lion eats penguin. Net-work Security, 2001(4):5, April 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580100410X.

Anonymous:2001:VCH

[1653] Anonymous. Virus can hit Linuxor Windows. Network Security,2001(4):5, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004111.

Silver:2001:WNV

[1654] Oscar Silver. Wireless networks vul-nerable to attack. Network Security,2001(4):6, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004123.

Page 228: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 228

Gengler:2001:NSS

[1655] Barbara Gengler. Network so-lutions selling database informa-tion. Network Security, 2001(4):6–7, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004135.

Madsen:2001:ECE

[1656] Wayne Madsen. EU and Council ofEurope showdown looming on Inter-net surveillance. Network Security,2001(4):7–8, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004147.

Anonymous:2001:CBFa

[1657] Anonymous. Cisco e-business forum‘scared to death’. Network Security,2001(4):8–9, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004159.

Kirkby:2001:CCW

[1658] Andrea Kirkby. Cryptographyand e-commerce: a Wiley techbrief. Network Security, 2001(4):9, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004160.

Pemble:2001:CEW

[1659] Matthew Pemble. Confidentiality:From encryption, to where? Net-work Security, 2001(4):10–11, April 1,

2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801004172.

Pohlmann:2001:SCA

[1660] Norbert Pohlmann. Smart cards:The authenticated solution for e-business user. Network Security, 2001(4):12–15, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004184.

Cohen:2001:PP

[1661] Fred Cohen. To prosecute or not toprosecute? Network Security, 2001(4):15–18, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004196.

Boni:2001:BB

[1662] Bill Boni. E-biz blitz. Network Se-curity, 2001(4):18–19, April 1, 2001.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801004202.

Anonymous:2001:MKS

[1663] Anonymous. My kingdom for asandbox. Network Security, 2001(4):20, April 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801004214.

Page 229: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 229

Anonymous:2001:ECd

[1664] Anonymous. Events calendar. Net-work Security, 2001(4):20, April 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801004226.

Anonymous:2001:UCF

[1665] Anonymous. US and China fightit out online. Network Security,2001(5):1–2, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005013.

Anonymous:2001:MPB

[1666] Anonymous. Microsoft plasters bighole in W2K. Network Security,2001(5):2, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005025.

Anonymous:2001:HGP

[1667] Anonymous. Hacking group playsPeekabooty with censorship. Net-work Security, 2001(5):2–3, May 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801005037.

Anonymous:2001:LVL

[1668] Anonymous. L0phtCrack v. 3.0at large. Network Security, 2001(5):3, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005049.

Anonymous:2001:Be

[1669] Anonymous. In brief. Network Secu-rity, 2001(5):3, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005074.

Anonymous:2001:VGA

[1670] Anonymous. Vigilantes to go af-ter hackers. Network Security, 2001(5):3, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005050.

Anonymous:2001:MOW

[1671] Anonymous. Microsoft offers worm tobest US customers. Network Security,2001(5):3–4, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005062.

Anonymous:2001:FSS

[1672] Anonymous. FBI sting sets dan-gerous precedent. Network Security,2001(5):4, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005086.

Anonymous:2001:MRO

[1673] Anonymous. Medical records openbook in UK. Network Security,2001(5):4, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005098.

Page 230: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 230

Gengler:2001:GE

[1674] Barbara Gengler. UN global e security.Network Security, 2001(5):5, May 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801005104.

Anonymous:2001:DLA

[1675] Anonymous. DeCSS linking ap-peal update. Network Security,2001(5):5, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005116.

Madsen:2001:CCS

[1676] Wayne Madsen. Cybercrime conven-tion steams ahead. Network Secu-rity, 2001(5):6, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005128.

Pemble:2001:IBT

[1677] Matthew Pemble. The importanceof being timely. Network Security,2001(5):7–8, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100513X.

Barber:2001:MXC

[1678] Richard Barber. Managing X-commerce: The importance ofa security-based architecture whenpreparing for e-commerce. Net-work Security, 2001(5):9–12, May 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485801005141.

Franklin:2001:SOS

[1679] Iain Franklin. Securing the operatingsystem: Does lesser-known mean less atrisk? Is the OS an example of securitythough obscurity? Network Security,2001(5):12–13, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005153.

Anscombe:2001:OSE

[1680] Tony Anscombe. Online secure en-terprises and the Linux effect. Net-work Security, 2001(5):14, May 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801005165.

Cohen:2001:NCG

[1681] Fred Cohen. The new cyber gang —a real threat profile. Network Security,2001(5):15–17, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005177.

Boni:2001:BBS

[1682] Bill Boni. Building bridges, stand-ing guard. Network Security, 2001(5):18–19, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005189.

Page 231: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 231

Anonymous:2001:SSSa

[1683] Anonymous. SOAPBOX: Spidersquishing. Network Security, 2001(5):20, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005190.

Anonymous:2001:E

[1684] Anonymous. Events. Network Secu-rity, 2001(5):20, May 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801005207.

Anonymous:2001:ADM

[1685] Anonymous. Attrition discontinuesmirroring service. Network Security,2001(6):1, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006018.

Anonymous:2001:NUU

[1686] Anonymous. NIPC is understaffedand under-performing. Network Secu-rity, 2001(6):2, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100602X.

Anonymous:2001:MMA

[1687] Anonymous. Microsoft make anti-hacker film. Network Security, 2001(6):2, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006031.

Anonymous:2001:PKN

[1688] Anonymous. Protecting kids on the Netis political magnet. Network Security,2001(6):2–3, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006043.

Anonymous:2001:GPR

[1689] Anonymous. GlobalSign to provideroot signatures online. Network Secu-rity, 2001(6):3, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006055.

Anonymous:2001:Bf

[1690] Anonymous. In brief. Network Secu-rity, 2001(6):3, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006080.

Anonymous:2001:FIP

[1691] Anonymous. Free international privacyguide out on Internet. Network Secu-rity, 2001(6):3, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006067.

Anonymous:2001:ACC

[1692] Anonymous. Amazon cleared ofcustomer privacy violations. Net-work Security, 2001(6):3, June 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801006079.

Page 232: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 232

Anonymous:2001:WLC

[1693] Anonymous. Worm launched tocrash Echelon. Network Security,2001(6):4, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006092.

Anonymous:2001:SSSb

[1694] Anonymous. Security spending setto soar. Network Security, 2001(6):4, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006110.

Anonymous:2001:FSC

[1695] Anonymous. 70% fail to secure con-fidential data. Network Security,2001(6):4, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006122.

Anonymous:2001:DIF

[1696] Anonymous. DERA issues freevirus protection. Network Security,2001(6):4, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006109.

Gengler:2001:USI

[1697] Barbara Gengler. US set to im-prove Federal Websites, establishCIO. Network Security, 2001(6):5, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006134.

Sterlicchi:2001:CSS

[1698] John Sterlicchi. CERT to sell secu-rity alerts. Network Security, 2001(6):5–6, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006146.

Donnelly:2001:FMP

[1699] Allan Donnelly. Flawed mobileprotocol delays release of stan-dard. Network Security, 2001(6):6, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006158.

Anonymous:2001:VDT

[1700] Anonymous. Vulnerability databasetops 1000 flaws. Network Security,2001(6):6, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100616X.

Anonymous:2001:LC

[1701] Anonymous. The lowdown onCISSP. Network Security, 2001(6):7, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006171.

Page 233: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 233

Pemble:2001:TIS

[1702] Matthew Pemble. In theory, itshouldn’t be difficult in practice. Net-work Security, 2001(6):7–8, June 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801006183.

Forte:2001:VTH

[1703] Dario Forte. Vampire techniques andhow to escape them. Network Security,2001(6):9–11, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006195.

Graham:2001:FCB

[1704] Rob Graham. The fifth column:The biggest security threats to fi-nancial institutions may come fromwithin — whether employees cooper-ate or not. Network Security, 2001(6):12–15, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006201.

Cohen:2001:WR

[1705] Fred Cohen. The wireless revolu-tion. Network Security, 2001(6):16–17, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006213.

Boni:2001:CCC

[1706] Bill Boni. Corporations caught in thecrossfire? Network Security, 2001

(6):18–19, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006225.

Anonymous:2001:ECe

[1707] Anonymous. Events calender. Net-work Security, 2001(6):20, June 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801006249.

Anonymous:2001:PPV

[1708] Anonymous. A partly political virusproblem. Network Security, 2001(6):20, June 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801006237.

Anonymous:2001:SOD

[1709] Anonymous. SANS.org defaced, downfor three days. Network Security,2001(7):1, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007012.

Anonymous:2001:ATS

[1710] Anonymous. Attrition team sharesmirror’s insights. Network Security,2001(7):2, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007024.

Page 234: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 234

Anonymous:2001:WS

[1711] Anonymous. White hat sent down.Network Security, 2001(7):2–3, July 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801007036.

Anonymous:2001:NFV

[1712] Anonymous. New free vulnerabil-ity list launched. Network Security,2001(7):3, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007048.

Anonymous:2001:Bg

[1713] Anonymous. In brief. Network Secu-rity, 2001(7):3, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007085.

Anonymous:2001:PPS

[1714] Anonymous. Privacy private sayUS firms. Network Security, 2001(7):3, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100705X.

Anonymous:2001:MLS

[1715] Anonymous. Mac losing squeaky-clean image. Network Security,2001(7):3, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007061.

Anonymous:2001:EAU

[1716] Anonymous. EC asks US tokeep its spying ECHR compli-ant. Network Security, 2001(7):3–4, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007073.

Anonymous:2001:ESS

[1717] Anonymous. EU set to secure In-ternet. Network Security, 2001(7):4, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007097.

Anonymous:2001:IFP

[1718] Anonymous. Infosec feeling thepinch. Network Security, 2001(7):4, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007103.

Anonymous:2001:EMB

[1719] Anonymous. Encryption market bol-stered by hackers. Network Security,2001(7):4, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007115.

Gengler:2001:CVT

[1720] Barbara Gengler. CERT victimof three day denial-of-service at-tack. Network Security, 2001(7):5, July 1, 2001. CODEN

Page 235: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 235

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007127.

Wales:2001:TPM

[1721] Elspeth Wales. Tap-proof mobilephone is launched. Network Security,2001(7):5–6, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007139.

Gengler:2001:MRL

[1722] Barbara Gengler. Micron–Rambuslawsuit delayed. Network Security,2001(7):6, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007140.

Pemble:2001:SPA

[1723] Matthew Pemble. A sceptical pi-geon amongst the crypto cats: Re-port on the Edinburgh FinancialCryptographic Engineering Confer-ence, 2001. Network Security, 2001(7):7–9, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007152.

Barber:2001:SEP

[1724] Richard Barber. Social engineering: apeople problem? Network Security,2001(7):9–11, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007164.

Webb:2001:WAWa

[1725] Alison Webb. Why audit a Webserver?: Auditing Web servers: IIS4.0 — Part 1. Network Security, 2001(7):11–14, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007176.

Madsen:2001:PON

[1726] Wayne Madsen. Pentagon orders NSAto monitor US citizens: DoD panelrecommends Echelon be turned onUS citizens, increased domestic rolefor NSA. Network Security, 2001(7):14–16, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007188.

Cohen:2001:MP

[1727] Fred Cohen. A matter of power. Net-work Security, 2001(7):16–18, July 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580100719X.

Boni:2001:PA

[1728] Bill Boni. The price of admis-sion. Network Security, 2001(7):18–19, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007206.

Anonymous:2001:DBS

[1729] Anonymous. Don’t buy securityproducts. Network Security, 2001

Page 236: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 236

(7):20, July 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801007218.

Anonymous:2001:ECf

[1730] Anonymous. Events calendar. Net-work Security, 2001(7):20, July 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580100722X.

Anonymous:2001:BAC

[1731] Anonymous. Browser attacks “canwipe out almost anything”. Net-work Security, 2001(8):1, August 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801008017.

Anonymous:2001:EER

[1732] Anonymous. Encryption expert re-leased on bail. Network Security,2001(8):2, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008029.

Anonymous:2001:CRH

[1733] Anonymous. Code Red — hype orhorror? Network Security, 2001(8):2–3, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008030.

Anonymous:2001:SSM

[1734] Anonymous. SirCam stampedes mailservers. Network Security, 2001(8):3, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008042.

Anonymous:2001:Bh

[1735] Anonymous. In brief. Network Se-curity, 2001(8):3, August 1, 2001.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801008066.

Anonymous:2001:PNL

[1736] Anonymous. PDF no longer quiteso Peachy. Network Security, 2001(8):3–4, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008054.

Anonymous:2001:WRM

[1737] Anonymous. WEP: ready in 15minutes. Network Security, 2001(8):4, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008078.

Anonymous:2001:AUC

[1738] Anonymous. AI used to catch pi-rates on Net. Network Security, 2001(8):4, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100808X.

Page 237: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 237

Anonymous:2001:PCS

[1739] Anonymous. Port cloaking saveszombies. Network Security, 2001(8):4, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008091.

Gengler:2001:PVS

[1740] Barbara Gengler. PoizonB0x vandal-izes security sites. Network Security,2001(8):5, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008108.

Sterlicchi:2001:CEN

[1741] John Sterlicchi. California energy net-work under attack. Network Security,2001(8):5–6, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100811X.

Johns:2001:WHH

[1742] Gerald Johns. Watching hackers inthe honeynet. Network Security, 2001(8):6, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008121.

Pemble:2001:YAP

[1743] Matthew Pemble. Yet anotherparadigm!: Trust: a web, a hierarchy,or something else? Network Security,2001(8):7–9, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008133.

Forte:2001:WFW

[1744] Dario Forte. Web filtering: Where, howand why: Control of Internet use: someconsiderations about the implicationsof this type of control in the light of theItalian experience. Network Security,2001(8):9–10, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008145.

Schwartau:2001:NSA

[1745] Winn Schwartau. Network secu-rity: It’s about time: An offer fora metric. Network Security, 2001(8):11–13, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008157.

Madsen:2001:FCS

[1746] Wayne Madsen. FBI at centre stageof Code Red. Network Security, 2001(8):14–15, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008169.

Boni:2001:FCW

[1747] Bill Boni. Fish, CHIPS andworms. Network Security, 2001(8):15–17, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008170.

Page 238: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 238

Cohen:2001:BC

[1748] Fred Cohen. Bootable CDs. Net-work Security, 2001(8):17–19, August1, 2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801008182.

Anonymous:2001:TTP

[1749] Anonymous. It’s time to take pornseriously! Network Security, 2001(8):20, August 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801008194.

Anonymous:2001:ECg

[1750] Anonymous. Events calendar. Net-work Security, 2001(8):20, August 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801008200.

Anonymous:2001:WDT

[1751] Anonymous. War declared on ter-rorism. Network Security, 2001(9):1, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009011.

Anonymous:2001:HFN

[1752] Anonymous. Hole found in NAI’sGauntlet. Network Security, 2001(9):2, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009023.

Anonymous:2001:HCR

[1753] Anonymous. Hackers carry out re-venge attacks on Islamic sites. Net-work Security, 2001(9):2, September 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801009035.

Anonymous:2001:MGE

[1754] Anonymous. Mafiaboy gets eightmonths. Network Security, 2001(9):2–3, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009047.

Anonymous:2001:LTW

[1755] Anonymous. Linux Trojan in thewild. Network Security, 2001(9):3, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009059.

Anonymous:2001:Bi

[1756] Anonymous. In brief. NetworkSecurity, 2001(9):3, September 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801009072.

Anonymous:2001:CBFb

[1757] Anonymous. Code Blue fights backagainst Red. Network Security, 2001(9):3–4, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009060.

Page 239: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 239

Anonymous:2001:AKA

[1758] Anonymous. Anna Kournikova authorstands trial. Network Security, 2001(9):4, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009084.

Anonymous:2001:NVH

[1759] Anonymous. Nimda virus hits. Net-work Security, 2001(9):4, September 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801009096.

Anonymous:2001:ESB

[1760] Anonymous. Email survives, build-ings crash. Network Security, 2001(9):4, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009102.

Anonymous:2001:MRC

[1761] Anonymous. Military remote controlsfoil highjackers. Network Security, 2001(9):4, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009114.

Anonymous:2001:LUD

[1762] Anonymous. Legal update: DMCAhappenings. Network Security, 2001(9):5–6, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009126.

Kirkby:2001:BRI

[1763] Andrea Kirkby. Book review: Inter-net Trust And Security: James Es-singer, Addison Wesley, £31.99. Net-work Security, 2001(9):6, September 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801009138.

Farrell:2001:XPW

[1764] Stephen Farrell and Michael Zolotarev.XML and PKI — What’s thestory? Network Security, 2001(9):7–10, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580100914X.

Webb:2001:WAWb

[1765] Alison Webb. Why audit a Webserver?: Auditing Web servers: IIS 4.0— Part 2. Network Security, 2001(9):11–14, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009151.

Pemble:2001:CHC

[1766] Matthew Pemble. Crying ‘havoc’,crying ‘wolf’ or just howling at theMoon? Network Security, 2001(9):14–16, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009163.

Cohen:2001:BSB

[1767] Fred Cohen. The best security bookever written. Network Security, 2001

Page 240: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 240

(9):17–18, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009175.

Boni:2001:CGC

[1768] Bill Boni. Creating a global consen-sus against cybercrime. Network Se-curity, 2001(9):18–19, September 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801009187.

Anonymous:2001:WIB

[1769] Anonymous. When ignorance is notbliss! Network Security, 2001(9):20, September 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801009199.

Anonymous:2001:ECh

[1770] Anonymous. Events calendar. Net-work Security, 2001(9):20, September1, 2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801009205.

Anonymous:2001:GS

[1771] Anonymous. Going for a song? Net-work Security, 2001(10):1, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801010017.

Anonymous:2001:NBC

[1772] Anonymous. Napster back incourt. Network Security, 2001(10):

2, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010029.

Anonymous:2001:CST

[1773] Anonymous. Cyber-security timeand people poor, Science Commit-tee told. Network Security, 2001(10):2, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010030.

Anonymous:2001:BAI

[1774] Anonymous. Bush abandons infras-tructure order. Network Security, 2001(10):2–3, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010042.

Anonymous:2001:MRB

[1775] Anonymous. Microsoft to rate bugseverity. Network Security, 2001(10):3, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010054.

Anonymous:2001:Bj

[1776] Anonymous. In brief. NetworkSecurity, 2001(10):3, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801010078.

Page 241: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 241

Anonymous:2001:NRS

[1777] Anonymous. NSA release SecureLinux. Network Security, 2001(10):3–4, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010066.

Anonymous:2001:SIS

[1778] Anonymous. Security incidents setto double. Network Security, 2001(10):4, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580101008X.

Anonymous:2001:NFM

[1779] Anonymous. Nimda fix is mal-ware. Network Security, 2001(10):4, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010091.

Anonymous:2001:FGS

[1780] Anonymous. Finance to get securepayments. Network Security, 2001(10):4, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010108.

Anonymous:2001:CCA

[1781] Anonymous. Censoring crypto notthe answer says Schneier. Net-work Security, 2001(10):4, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S135348580101011X.

Anonymous:2001:NWS

[1782] Anonymous. Netherlands to watchstrong crypto. Network Security, 2001(10):4, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010121.

Madsen:2001:BCO

[1783] Wayne Madsen. Bush creates Of-fice of Homeland Security. NetworkSecurity, 2001(10):5–6, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801010133.

Gengler:2001:PRS

[1784] Barbara Gengler. PDAs at risk,says report. Network Security, 2001(10):6, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010145.

Palmer:2001:CCR

[1785] Chloe Palmer. Cracker court to ruleon computer misuse. Network Security,2001(10):6, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010157.

Pemble:2001:LLW

[1786] Matthew Pemble. Licensed to. . . well, to what? And, bywhom? Network Security, 2001(10):

Page 242: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 242

7–9, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010169.

Gray:2001:WWC

[1787] J. J. Gray. What we can learnabout malicious mobile code. NetworkSecurity, 2001(10):9–10, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801010170.

Wright:2001:AES

[1788] Marie A. Wright. The AdvancedEncryption Standard. Network Se-curity, 2001(10):11–13, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801010182.

David:2001:IOI

[1789] Jon David. The ins and outs of intru-sion detection. Network Security, 2001(10):13–15, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010194.

Cohen:2001:DWI

[1790] Fred Cohen. The DMCA: Whyit is bad for InfoSec profession-als. Network Security, 2001(10):16–18, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010200.

Boni:2001:TFW

[1791] Bill Boni. The towers fall and warbegins. Network Security, 2001(10):18–19, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010212.

Anonymous:2001:ARL

[1792] Anonymous. Abstracts of recent lit-erature. Network Security, 2001(10):20, October 31, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801010224.

Anonymous:2001:ECi

[1793] Anonymous. Events calendar. NetworkSecurity, 2001(10):20, October 31,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801010236.

Anonymous:2001:DLR

[1794] Anonymous. DeCSS legal, rules Cali-fornian court. Network Security, 2001(11):1–2, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011011.

Anonymous:2001:SNS

[1795] Anonymous. Security news site de-faced twice. Network Security, 2001(11):2, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011023.

Page 243: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 243

Anonymous:2001:DBG

[1796] Anonymous. Dutch bank goes mo-bile. Network Security, 2001(11):2, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011035.

Anonymous:2001:ETM

[1797] Anonymous. Email trust is madecheaper. Network Security, 2001(11):2–3, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011047.

Anonymous:2001:IAF

[1798] Anonymous. Internet attracts fraudcompliants. Network Security, 2001(11):3, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011059.

Anonymous:2001:Bk

[1799] Anonymous. In brief. NetworkSecurity, 2001(11):3, November 30,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801011072.

Anonymous:2001:VBA

[1800] Anonymous. Visa buys in AI tech tofight fraud. Network Security, 2001(11):3–4, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011060.

Anonymous:2001:NFS

[1801] Anonymous. Negligent firms supportterrorism. Network Security, 2001(11):4, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011084.

Anonymous:2001:IIJ

[1802] Anonymous. IAAC and ICAF joinup thinking. Network Security, 2001(11):4, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011096.

Anonymous:2001:WFL

[1803] Anonymous. What have firms learntpost 9/11? Network Security, 2001(11):4, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011102.

Gengler:2001:XNT

[1804] Barbara Gengler. XP a nationalthreat? Network Security, 2001(11):5, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011114.

Gengler:2001:PPS

[1805] Barbara Gengler. Princeton pollshows 56% favour crypto regula-tions. Network Security, 2001(11):5–6, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),

Page 244: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 244

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011126.

Gengler:2001:CGI

[1806] Barbara Gengler. CATT — gov-ernment and industry team up inUS. Network Security, 2001(11):6, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011138.

Szerszen:2001:WNN

[1807] Dennis Szerszen. Wireless network-ing: Nirvana or nightmare? NetworkSecurity, 2001(11):7, November 30,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580101114X.

Pemble:2001:MR

[1808] Matthew Pemble. A Moment’s re-flection. Network Security, 2001(11):8–10, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011151.

Hunter:2001:BBP

[1809] Philip Hunter. Barclays Bank pros-ecutes rather than covering up.Network Security, 2001(11):10–11,November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011163.

Lang:2001:WWY

[1810] Katherine Lang. Who’s watchingyou? Network Security, 2001(11):11–13, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011175.

Forte:2001:CWG

[1811] Dario Forte. Can worms begood? Network Security, 2001(11):14–15, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011187.

White:2001:FPW

[1812] Ben White. Fighting the porn war:The rise of email pornography in theworkplace. Network Security, 2001(11):16–17, November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011199.

Cohen:2001:SWU

[1813] Fred Cohen. Should we use de-ception as an InfoSec defence?Network Security, 2001(11):18–19,November 30, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011205.

Anonymous:2001:DWH

[1814] Anonymous. Do women hack?: Haxorchicks are go. Network Security, 2001(11):20, November 30, 2001. CODEN

Page 245: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 245

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801011217.

Anonymous:2001:ECj

[1815] Anonymous. Events calendar. NetworkSecurity, 2001(11):20, November 30,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801011229.

Anonymous:2001:CTS

[1816] Anonymous. Cybercrime treaty signed,Budapest. Network Security, 2001(12):1, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012016.

Anonymous:2001:MLF

[1817] Anonymous. Magic Lantern friescrypto keys. Network Security, 2001(12):2, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012028.

Anonymous:2001:CSC

[1818] Anonymous. China shuts down 18000cyber-cafes. Network Security, 2001(12):2, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580101203X.

Anonymous:2001:GBO

[1819] Anonymous. Germany backs opensource. Network Security, 2001(12):

2, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012041.

Anonymous:2001:PCD

[1820] Anonymous. playboy.com data probedby hackers. Network Security, 2001(12):2–3, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012053.

Anonymous:2001:SDA

[1821] Anonymous. DoS set to double againin 2002. Network Security, 2001(12):3, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012065.

Anonymous:2001:TSD

[1822] Anonymous. ‘Tis the season to de-fraud. Network Security, 2001(12):3, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012077.

Anonymous:2001:Bl

[1823] Anonymous. In brief. NetworkSecurity, 2001(12):3, December 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801012090.

Page 246: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 246

Anonymous:2001:MDW

[1824] Anonymous. MS doesn’t want to‘cry wolf’. Network Security, 2001(12):3–4, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012089.

Anonymous:2001:IIB

[1825] Anonymous. IBM invests in bio-metrics. Network Security, 2001(12):4, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012107.

Anonymous:2001:CTY

[1826] Anonymous. CCTV through yourPC or PDA. Network Security, 2001(12):4, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012119.

Gengler:2001:UGB

[1827] Barbara Gengler. US Government tobuild own Net. Network Security, 2001(12):5, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012120.

Gengler:2001:NPP

[1828] Barbara Gengler. Network print-ers pose security risk, CERT. Net-work Security, 2001(12):5, December 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485801012132.

Sterlicchi:2001:IED

[1829] John Sterlicchi. IBM establishes dataprivacy groups. Network Security, 2001(12):6, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012144.

Madsen:2001:PPN

[1830] Wayne Madsen. Pentagon pushes na-tional identification card for US. Net-work Security, 2001(12):6, December 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801012156.

Duke:2001:HM

[1831] David Duke. Hack of the month. Net-work Security, 2001(12):7, December 1,2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801012168.

Pemble:2001:NDN

[1832] Matthew Pemble. Nightmare on theDot-NET, Part II (Bill’s back). Net-work Security, 2001(12):8–9, December1, 2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580101217X.

Packer:2001:PNN

[1833] Ryon Packer. Protecting thenetwork: NIDS: the logical firststep in intrusion detection deploy-ment. Network Security, 2001(12):

Page 247: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 247

10–11, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012181.

Forte:2001:FAP

[1834] Dario Forte. Fragmentation at-tacks: Protection tools and tech-niques: Called “true preliminariesto denial-of-service”, IpFrags are atough nut to crack for some fire-walls and intrusion detection sys-tems. Network Security, 2001(12):12–13, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012193.

Jones:2001:WHS

[1835] Deri Jones. Web hosting — the secu-rity risks. Network Security, 2001(12):14–15, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580101220X.

Palmer:2001:RYP

[1836] Chloe Palmer. Review of theyear, Part I: 2001: a game of twohalves. Network Security, 2001(12):15–17, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012211.

Boni:2001:CTC

[1837] Bill Boni. Cyber-terrorists and counterspies. Network Security, 2001(12):17–18, December 1, 2001. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012223.

Cohen:2001:WDW

[1838] Fred Cohen. The world doesn’t wantto be fixed. Network Security, 2001(12):19, December 1, 2001. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485801012235.

Anonymous:2001:EH

[1839] Anonymous. ‘Ethical’ hacking. Net-work Security, 2001(12):20, December1, 2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801012247.

Anonymous:2001:ECk

[1840] Anonymous. Events calendar. Net-work Security, 2001(12):20, December1, 2001. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485801012259.

Anonymous:2002:LYU

[1841] Anonymous. Lock up your UPnPsays Microsoft. Network Security,2002(1):1, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001010.

Anonymous:2002:SHC

[1842] Anonymous. Sklyarov home forChristmas. Network Security, 2002(1):2, January 1, 2002. CODEN

Page 248: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 248

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001022.

Anonymous:2002:MLS

[1843] Anonymous. Magic Lantern snoop-ing update. Network Security, 2002(1):2, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001034.

Anonymous:2002:BFH

[1844] Anonymous. Bid farewell to HTMLin email. Network Security, 2002(1):2–3, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001046.

Anonymous:2002:BBNa

[1845] Anonymous. Bunni bates newssite. Network Security, 2002(1):3, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001058.

Anonymous:2002:USC

[1846] Anonymous. US “somewhat con-cerned” about Web security. Net-work Security, 2002(1):3, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580200106X.

Anonymous:2002:Ba

[1847] Anonymous. In brief. Network Se-curity, 2002(1):3, January 1, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001083.

Anonymous:2002:IGT

[1848] Anonymous. IDSs generate too manyfalse alarms. Network Security, 2002(1):3–4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001071.

Anonymous:2002:BBW

[1849] Anonymous. Biometrics boom in wakeof terror. Network Security, 2002(1):4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001095.

Anonymous:2002:IMW

[1850] Anonymous. IT managers work toohard say Intel. Network Security,2002(1):4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001101.

Anonymous:2002:BFS

[1851] Anonymous. Baltimore founder suesold firm. Network Security, 2002(1):4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001113.

Page 249: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 249

Anonymous:2002:SSF

[1852] Anonymous. Supermarket has securityfree e-warehouse. Network Security,2002(1):4, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001125.

Gengler:2002:UVV

[1853] Barbara Gengler. Unix vendors vul-nerable to malicious attacks. Net-work Security, 2002(1):5, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001137.

Gengler:2002:UAC

[1854] Barbara Gengler. US Army choosesSmartcard technology. Network Se-curity, 2002(1):5–6, January 1, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001149.

Palmer:2002:TMQ

[1855] Chloe Palmer. Toshiba makes quan-tum crypto breakthrough. Net-work Security, 2002(1):6, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001150.

Duke:2002:HM

[1856] David Duke. Hack of the month. Net-work Security, 2002(1):7, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001162.

Palmer:2002:RYP

[1857] Chloe Palmer. Review of the year,Part II: 2001: a game of twohalves. Network Security, 2002(1):8–10, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001174.

Pemble:2002:HSI

[1858] Matthew Pemble. Be happy? Share in-formation?? Network Security, 2002(1):10–11, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001186.

Pollino:2002:HSO

[1859] David Pollino. How to secure anOffice wireless network. NetworkSecurity, 2002(1):12–13, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001198.

Anonymous:2002:RCS

[1860] Anonymous. Ringing the changesin the security cupboard. NetworkSecurity, 2002(1):14–16, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001204.

Cohen:2002:EIW

[1861] Fred Cohen. The end of the Internetas we know it. Network Security, 2002(1):16–18, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),

Page 250: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 250

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802001216.

Boni:2002:GR

[1862] Bill Boni. The Golden Rule? Net-work Security, 2002(1):18–19, January1, 2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001228.

Anonymous:2002:POC

[1863] Anonymous. 2002: a privacy odyssey:Customer: Hello, I’d like to up-grade my life. Can I have some pri-vacy please?”. Network Security, 2002(1):20, January 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580200123X.

Anonymous:2002:ECa

[1864] Anonymous. Events calendar. Net-work Security, 2002(1):20, January 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802001241.

Anonymous:2002:HH

[1865] Anonymous. Hackers on holi-day? Network Security, 2002(2):1–2, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002015.

Anonymous:2002:GAW

[1866] Anonymous. Gates admits: we needto improve our security. Network

Security, 2002(2):2–3, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802002027.

Anonymous:2002:GWR

[1867] Anonymous. Gigger wants to refor-mat C drives. Network Security, 2002(2):3, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002039.

Anonymous:2002:Bb

[1868] Anonymous. In brief. Network Se-curity, 2002(2):3, February 28, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802002052.

Anonymous:2002:LIR

[1869] Anonymous. Linux infected by RemoteShell Trojan b. Network Security, 2002(2):3–4, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002040.

Anonymous:2002:SHA

[1870] Anonymous. Shock horror — an-other virus. Network Security, 2002(2):4, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002064.

Page 251: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 251

Anonymous:2002:IMV

[1871] Anonymous. Instant messaging vul-nerability. Network Security, 2002(2):4, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002076.

Anonymous:2002:OIE

[1872] Anonymous. Online intruders enterthrough Solaris hole. Network Security,2002(2):4, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002088.

Anonymous:2002:CSS

[1873] Anonymous. Cross-site scripting closede-commerce site. Network Security,2002(2):4, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580200209X.

Anonymous:2002:UUD

[1874] Anonymous. Users unable to downloadsecurity patches. Network Security,2002(2):4, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002106.

Sellors:2002:VH

[1875] Nick Sellors. Viral hoaxes. Net-work Security, 2002(2):5, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802002118.

Anonymous:2002:PLU

[1876] Anonymous. Passwords linked to user‘obsessions’. Network Security, 2002(2):6–7, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580200212X.

White:2002:DSB

[1877] Paul White. Data security: the backupbackdoor. Network Security, 2002(2):8–9, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002131.

Anonymous:2002:SSG

[1878] Anonymous. Security spending togrow in 2002. Network Security, 2002(2):9, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002143.

Forte:2002:NWE

[1879] Dario Forte. New worm experiments —a real danger? Network Security, 2002(2):10–11, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002155.

Kinsella:2002:SBW

[1880] Richard Kinsella. Securing e-businessin a wireless environment. NetworkSecurity, 2002(2):12–13, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 252: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 252

URL http://www.sciencedirect.

com/science/article/pii/S1353485802002167.

Anonymous:2002:UAA

[1881] Anonymous. Update on Amster-dam airport biometric project. Net-work Security, 2002(2):13, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802002179.

Cohen:2002:SSI

[1882] Fred Cohen. Strategic security intelli-gence — embedded security. NetworkSecurity, 2002(2):14–15, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802002180.

Anonymous:2002:ASV

[1883] Anonymous. Another SMS vulnerabil-ity discovered. Network Security, 2002(2):15, February 28, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802002192.

Anonymous:2002:DTE

[1884] Anonymous. Does trust exist? Net-work Security, 2002(2):16, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802002209.

Anonymous:2002:ECb

[1885] Anonymous. Events calendar. Net-work Security, 2002(2):16, February 28,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485802002210.

Anonymous:2002:SSA

[1886] Anonymous. SNMP security alarmsringing– is your enterprise awake andready? Network Security, 2002(3):1–2, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580200301X.

Anonymous:2002:VPA

[1887] Anonymous. Virus poses as anti-virus program! Network Security,2002(3):2, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003021.

Anonymous:2002:WLU

[1888] Anonymous. Wireless LANs unpro-tected in London. Network Security,2002(3):2, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003033.

Anonymous:2002:EHC

[1889] Anonymous. Ethical hackers — canwe trust them? Network Security,2002(3):3, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003045.

Anonymous:2002:DFP

[1890] Anonymous. Don’t forget to pro-tect your custom applications. Net-

Page 253: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 253

work Security, 2002(3):4–5, March 31,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802003057.

Anonymous:2002:IHB

[1891] Anonymous. The importance ofhardware-based cryptography foradded security. Network Security,2002(3):5, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003069.

Anonymous:2002:ATM

[1892] Anonymous. It’s about time: a metricfor InfoSecurity 1. Network Security,2002(3):6–9, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003070.

Anonymous:2002:HTH

[1893] Anonymous. Hidden threats —how much goes on inside yourLAN? Network Security, 2002(3):9–11, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003082.

Anonymous:2002:BBNb

[1894] Anonymous. Behaviour blockers— a new dimension in protec-tion. Network Security, 2002(3):11–13, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003094.

Anonymous:2002:SAN

[1895] Anonymous. Semantic attacks — anew wave of cyber-terrorism. NetworkSecurity, 2002(3):13–15, March 31,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802003100.

Anonymous:2002:CIT

[1896] Anonymous. The cost of internalthreats. Network Security, 2002(3):15–16, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003112.

Anonymous:2002:HGA

[1897] Anonymous. ‘How to get aroundyour ISP’. Network Security, 2002(3):17–18, March 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802003124.

Anonymous:2002:CDH

[1898] Anonymous. A cool day in Hades? Net-work Security, 2002(3):18–19, March31, 2002. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485802003136.

Anonymous:2002:ECc

[1899] Anonymous. Events calendar. Net-work Security, 2002(3):20, March 31,

Page 254: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 254

2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802003148.

Anonymous:2002:OHH

[1900] Anonymous. Oracle holes hide inthe shade of SNMP limelight. Net-work Security, 2002(3):20, March 31,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580200315X.

Anonymous:2002:MLR

[1901] Anonymous. Microsoft: the latestround of vulnerabilities. Network Secu-rity, 2002(4):1, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004014.

Anonymous:2002:TCD

[1902] Anonymous. ‘Trustworthy comput-ing’ — delivers a new vulnerabilityscanner to trust! Network Security,2002(4):2, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004026.

Anonymous:2002:RDN

[1903] Anonymous. Remote dial-up numbersfree for all to see. Network Security,2002(4):2, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004038.

Anonymous:2002:NWS

[1904] Anonymous. New Web services spec-ifications from Microsoft, IBM andVeriSign. Network Security, 2002(4):2–3, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580200404X.

Anonymous:2002:SEU

[1905] Anonymous. Security embarrassmentfor UK business. Network Security,2002(4):3, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004051.

Anonymous:2002:NFI

[1906] Anonymous. New fingerprint iden-tification technology for wireless de-vices. Network Security, 2002(4):3, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004063.

Anonymous:2002:HCV

[1907] Anonymous. HP CEO voicemailleaked to press. Network Security,2002(4):3, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004075.

Duke:2002:IE

[1908] David Duke. Image is every-thing! Network Security, 2002(4):4–5, April 1, 2002. CODEN

Page 255: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 255

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004087.

Gengler:2002:WPN

[1909] Barbara Gengler. Wireless PANsnew standard. Network Security,2002(4):5, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004099.

Forte:2002:ORD

[1910] Dario Forte. Onion routers: adangerous response to traffic anal-ysis? Network Security, 2002(4):6–7, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004105.

Laurie:2002:MVA

[1911] Bruce Laurie. Managed Vulnerabil-ity Assessment (MVA) — improvesecurity by understanding your ownvulnerabilities! Network Security,2002(4):8–9, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004117.

Hunter:2002:CPV

[1912] Philip Hunter. Canal Plus versusNDS case. Network Security, 2002(4):9–11, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004129.

Davis:2002:B

[1913] Dai Davis. Bluetooth. Network Se-curity, 2002(4):11–12, April 1, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802004130.

Cohen:2002:MWN

[1914] Fred Cohen. Misimpressions we needto extinguish. Network Security, 2002(4):12–17, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004142.

Boni:2002:DSC

[1915] Bill Boni. The dark side of e-commerce— cracking the code or passing theBuck? Network Security, 2002(4):18–19, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004154.

Anonymous:2002:ECd

[1916] Anonymous. Events calendar. Net-work Security, 2002(4):20, April 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802004166.

Anonymous:2002:UAO

[1917] Anonymous. US Army opts forvulnerability assessment softwareto defend its global network ter-rain. Network Security, 2002(4):20, April 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),

Page 256: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 256

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802004178.

Anonymous:2002:TSB

[1918] Anonymous. Telecom securitybreaches. Network Security, 2002(5):1–2, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050018.

Anonymous:2002:KB

[1919] Anonymous. Klez is back. Net-work Security, 2002(5):2, May 31,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580205002X.

Anonymous:2002:UFH

[1920] Anonymous. US FAA — hack-ers demonstrate what could hap-pen . . . . Network Security, 2002(5):2–3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050031.

Anonymous:2002:URG

[1921] Anonymous. US retail giant closeswireless registers as data beams athackers. Network Security, 2002(5):3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050043.

Anonymous:2002:LTA

[1922] Anonymous. Linux is target for at-tacks in Germany. Network Security,2002(5):3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050055.

Anonymous:2002:DSS

[1923] Anonymous. DHCP servers subjectto remote takeover. Network Secu-rity, 2002(5):3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050067.

Anonymous:2002:NNI

[1924] Anonymous. New network IDS solu-tions from Cisco. Network Security,2002(5):3, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050079.

Duke:2002:WDB

[1925] David Duke. What is the dif-ference between Denial-of-Service(DoS) and Distributed-Denial-of-Service (DDoS)? Network Security,2002(5):4, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050080.

Anonymous:2002:WSW

[1926] Anonymous. Wireless security — whatis out there? Network Security,2002(5):5–6, May 31, 2002. CODEN

Page 257: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 257

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050092.

Jervis:2002:WCA

[1927] Julie Jervis. Worldwide cyber-attacks. Network Security, 2002(5):6, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050109.

Wilson:2002:BHL

[1928] Piers Wilson. Biometrics: Here’s look-ing at you . . . . Network Security,2002(5):7–9, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050110.

Ionescu:2002:SDP

[1929] Ionut Ionescu. Secondary data —the poor relative of business con-tinuity. Network Security, 2002(5):9–11, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050122.

Forte:2002:VMO

[1930] Dario Forte. Vulnerability manage-ment: One problem, several potentialapproaches. Network Security, 2002(5):11–13, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050134.

Webb:2002:SWPa

[1931] Alison Webb. Security and Windows2000: Part 1. Network Security, 2002(5):13–16, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050146.

Cohen:2002:TC

[1932] Fred Cohen. Terrorism and cy-berspace. Network Security, 2002(5):17–19, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050158.

Anonymous:2002:ECe

[1933] Anonymous. Events calendar. Net-work Security, 2002(5):20, May 31,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580205016X.

Anonymous:2002:IMS

[1934] Anonymous. Instant Messaging — se-rious and secure? Network Security,2002(5):20, May 31, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802050171.

Anonymous:2002:LS

[1935] Anonymous. Linux — to be ornot to be secure. Network Security,2002(6):1–2, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802060014.

Page 258: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 258

Anonymous:2002:PAS

[1936] Anonymous. Privacy activists schemeto dodge government monitoring. Net-work Security, 2002(6):2, June 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802060026.

Anonymous:2002:CSB

[1937] Anonymous. Cisco switches be-come even more intelligent. Net-work Security, 2002(6):2–3, June 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802060038.

Anonymous:2002:RPD

[1938] Anonymous. Rogue protocol detec-tion now possible. Network Security,2002(6):3, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580206004X.

Anonymous:2002:NVC

[1939] Anonymous. New virus can tar-get more than one operating sys-tem. Network Security, 2002(6):3, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802060051.

Anonymous:2002:MNV

[1940] Anonymous. More new virus tac-tics — JPEGS. Network Security,2002(6):3, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802060063.

Duke:2002:HW

[1941] David Duke. Hybrid worms. Net-work Security, 2002(6):4, June 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802060075.

Webb:2002:SWPb

[1942] Alison Webb. Security and Win-dows 2000: Part 2. Network Security,2002(6):5–8, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802060087.

Watson:2002:HSY

[1943] David Watson. How to secure yourwireless network. Network Security,2002(6):8–11, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802060099.

Davies:2002:WNR

[1944] Kerry Davies. What next? —A response to security for businessleaders. Network Security, 2002(6):12–13, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802060105.

Hone:2002:WME

[1945] Karin Hone and J. H. P. Eloff. Whatmakes an effective information secu-

Page 259: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 259

rity policy? Network Security, 2002(6):14–16, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802060117.

Boni:2002:CFM

[1946] Bill Boni. Card fraud — more seriousthan given credit for. Network Security,2002(6):16–17, June 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802060129.

Cohen:2002:AVR

[1947] Fred Cohen. Academia’s vital rolein information protection. Net-work Security, 2002(6):17–20, June 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802060130.

Anonymous:2002:ECf

[1948] Anonymous. Events calendar. Net-work Security, 2002(6):20, June 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802060142.

Anonymous:2002:HDN

[1949] Anonymous. Hackers demonstratea new show of strength. Net-work Security, 2002(7):1–2, July 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802070010.

Anonymous:2002:CCW

[1950] Anonymous. Changing the computer,as we know it. Network Security,2002(7):2, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070022.

Anonymous:2002:MSH

[1951] Anonymous. Major satellite hackedin China. Network Security, 2002(7):2–3, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070034.

Anonymous:2002:AFA

[1952] Anonymous. Apache flaws — an-other premature leak. Network Secu-rity, 2002(7):3, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070046.

Anonymous:2002:SAT

[1953] Anonymous. Symantec acquire threemore security companies. NetworkSecurity, 2002(7):3, July 1, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802070058.

Duke:2002:PPS

[1954] David Duke. Peer-to-peer sharing.Network Security, 2002(7):4, July 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580207006X.

Page 260: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 260

Midian:2002:GMI

[1955] Paul Midian. Getting the mostout of Intrusion Detection Sys-tems. Network Security, 2002(7):5–7, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070071.

Asenjo:2002:AES

[1956] Juan C. Asenjo. The Advanced En-cryption Standard — implementa-tion and transition to a new crypto-graphic benchmark. Network Security,2002(7):7–9, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070083.

Abimbola:2002:SHP

[1957] Abiola Abimbola, David Gresty, andQi Shi. SubSeven’s honey pot pro-gram. Network Security, 2002(7):10–14, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070095.

Mitrakas:2002:CCI

[1958] Andreas Mitrakas. Citizen cen-tric identity management: Chiptricks? Network Security, 2002(7):15–16, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070101.

Cohen:2002:OSM

[1959] Fred Cohen. Is open source moreor less secure? Network Security,2002(7):17–19, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070113.

Anonymous:2002:ECN

[1960] Anonymous. Event: CSI NetSec,2002, San Francisco. Network Secu-rity, 2002(7):19, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070125.

Anonymous:2002:ECg

[1961] Anonymous. Event calendar. Net-work Security, 2002(7):20, July 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802070137.

Anonymous:2002:UGR

[1962] Anonymous. US Government releasesecurity benchmarks. Network Secu-rity, 2002(7):20, July 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802070149.

Anonymous:2002:LWH

[1963] Anonymous. At last, a wirelesshoneypot. Network Security, 2002(8):1–2, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080017.

Page 261: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 261

Anonymous:2002:SJD

[1964] Anonymous. Security job descrip-tions in disarray. Network Security,2002(8):2, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080029.

Anonymous:2002:HCP

[1965] Anonymous. Hollywood crack downon piracy. Network Security, 2002(8):2–3, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080030.

Anonymous:2002:UHS

[1966] Anonymous. US Homeland Secu-rity Bill. Network Security, 2002(8):3, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080042.

Anonymous:2002:HPR

[1967] Anonymous. Hewlett Packard —rage after Tru64 disclosure. Net-work Security, 2002(8):3, August 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802080054.

Anonymous:2002:Bc

[1968] Anonymous. In brief. Network Se-curity, 2002(8):3, August 1, 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802080066.

Anonymous:2002:ZDV

[1969] Anonymous. Zero day vulnera-bilities. Network Security, 2002(8):4, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080078.

Anonymous:2002:PPT

[1970] Anonymous. Perspectives on penetra-tion testing — what’s the deal withWeb security? Network Security, 2002(8):5–8, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580208008X.

Anonymous:2002:AV

[1971] Anonymous. Adventures in virus-land. Network Security, 2002(8):8–10, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080091.

Anonymous:2002:AGF

[1972] Anonymous. Alexander Galitsky,Founder & Co-Chairman, Trust-Works. Network Security, 2002(8):10–12, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080108.

Anonymous:2002:MSN

[1973] Anonymous. Mobile security — newneeds on new devices. NetworkSecurity, 2002(8):13–14, August 1,

Page 262: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 262

2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580208011X.

Anonymous:2002:QCR

[1974] Anonymous. Quantum cryptographyrevisited. Network Security, 2002(8):14–16, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080121.

Anonymous:2002:AQV

[1975] Anonymous. All quiet on the virusfront? Network Security, 2002(8):16–18, August 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080133.

Anonymous:2002:YB

[1976] Anonymous. You’re in a Bind! Net-work Security, 2002(8):18–19, August1, 2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802080145.

Anonymous:2002:ECh

[1977] Anonymous. Events calendar. Net-work Security, 2002(8):20, August 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802080157.

Anonymous:2002:NTW

[1978] Anonymous. New trends but the worldkeeps spinning. Network Security,2002(8):20, August 1, 2002. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802080169.

Anonymous:2002:SLA

[1979] Anonymous. Security landscape anal-ysis. Network Security, 2002(9):1–2, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802090013.

Anonymous:2002:NSD

[1980] Anonymous. NASA secret datahacked. Network Security, 2002(9):2–3, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802090025.

Anonymous:2002:SVM

[1981] Anonymous. Security vendors moveinto the peer-2-peer space. Net-work Security, 2002(9):3, September 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802090037.

Anonymous:2002:WBH

[1982] Anonymous. Who has been hit by thebig bad DDoS? Network Security, 2002(9):3, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802090049.

Page 263: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 263

Anonymous:2002:EMI

[1983] Anonymous. EU to monitor Inter-net communications. Network Security,2002(9):3, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802090050.

Anonymous:2002:SAS

[1984] Anonymous. Spyware, adware, sys-temware and cookies. Network Se-curity, 2002(9):4–5, September 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802090062.

Anonymous:2002:PFQ

[1985] Anonymous. Promise from the fu-ture — quantum cryptography. Net-work Security, 2002(9):6, September 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802090074.

Anonymous:2002:ASS

[1986] Anonymous. Application security — aserious pitfall. Network Security, 2002(9):7, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802090086.

Anonymous:2002:FID

[1987] Anonymous. Firewalls, intrusiondetection systems and vulnerabil-ity assessment: a superior conjunc-tion? Network Security, 2002(9):8–11, September 1, 2002. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802090098.

Anonymous:2002:MSS

[1988] Anonymous. Managed security ser-vices — a buyer’s guide. NetworkSecurity, 2002(9):12–15, September 1,2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802090104.

Anonymous:2002:VVV

[1989] Anonymous. Virtual vigilantes vs digi-tal desperados. Network Security, 2002(9):15–16, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802090116.

Anonymous:2002:PD

[1990] Anonymous. Protection by decep-tion. Network Security, 2002(9):17–19, September 1, 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802090128.

Anonymous:2002:ECi

[1991] Anonymous. Events calendar. Net-work Security, 2002(9):20, September1, 2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580209013X.

Anonymous:2002:HP

[1992] Anonymous. The hacker preacher. Net-work Security, 2002(10):1–2, October

Page 264: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 264

2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802100018.

Anonymous:2002:WNS

[1993] Anonymous. The Whitehouse nationalstrategy to secure cyberspace. Net-work Security, 2002(10):2–3, October2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580210002X.

Anonymous:2002:NCT

[1994] Anonymous. New cybersecurity task-force from EC. Network Security,2002(10):3–4, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100031.

Anonymous:2002:SLB

[1995] Anonymous. A slap for Linux, abug for Windows. Network Security,2002(10):4, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100043.

Anonymous:2002:NOA

[1996] Anonymous. New organization to al-leviate vulnerability slip-ups. Net-work Security, 2002(10):4, October2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802100055.

Anonymous:2002:ONV

[1997] Anonymous. Out with the oldand in with the new vulnera-bilities. Network Security, 2002(10):4, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100067.

Anonymous:2002:SGS

[1998] Anonymous. SUN guru shineson Linux security and Web ser-vices. Network Security, 2002(10):5, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100079.

Anonymous:2002:PW

[1999] Anonymous. The political worm. Net-work Security, 2002(10):5, October2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802100080.

Anonymous:2002:CNS

[2000] Anonymous. Compsec — net-work security and disaster sur-vival. Network Security, 2002(10):6, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100092.

Anonymous:2002:GNS

[2001] Anonymous. GPRS network secu-rity: Welcome to life on the fron-tier! Network Security, 2002

Page 265: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 265

(10):7, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100109.

Anonymous:2002:HCI

[2002] Anonymous. HTML code injection andcross-site scripting. Network Security,2002(10):8–12, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100110.

Anonymous:2002:FCN

[2003] Anonymous. The future of computerand network forensics. Network Se-curity, 2002(10):13–15, October 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802100122.

Anonymous:2002:WRS

[2004] Anonymous. When to review se-curity — timing is Everything . . .. Network Security, 2002(10):15–17, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100134.

Anonymous:2002:RYF

[2005] Anonymous. Reworking your fire-walls. Network Security, 2002(10):18–19, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100146.

Anonymous:2002:HJS

[2006] Anonymous. Honeypots — not juststicking to research. Network Security,2002(10):20, October 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802100158.

Anonymous:2002:ECj

[2007] Anonymous. Events calendar. Net-work Security, 2002(10):20, October2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580210016X.

Anonymous:2002:SID

[2008] Anonymous. Security industry — dis-organized. Network Security, 2002(11):1–2, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802110014.

Madsen:2002:UPA

[2009] Wayne Madsen. USA Patriot ActII — more snooping powers. Net-work Security, 2002(11):2, November2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802110026.

Anonymous:2002:DSI

[2010] Anonymous. DDoS strikes — indus-try thinks twice. Network Security,2002(11):3, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802110038.

Page 266: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 266

Anonymous:2002:RW

[2011] Anonymous. Replacement for WEP.Network Security, 2002(11):3, Novem-ber 2002. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S135348580211004X.

Anonymous:2002:HN

[2012] Anonymous. Hacking for news. Net-work Security, 2002(11):3, November2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802110051.

Duke:2002:DT

[2013] David Duke. Downloader Tro-jans. Network Security, 2002(11):4–5, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802110063.

Hunter:2002:VLS

[2014] Philip Hunter. VOIP the latest secu-rity concern: DoS attack the great-est threat. Network Security, 2002(11):5–7, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802110075.

Forte:2002:LAP

[2015] Dario Forte. Logging architecture— problems and solutions. NetworkSecurity, 2002(11):7–10, November2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485802110087.

Midian:2002:PPT

[2016] Paul Midian. Perspectives on pen-etration testing — black box vs.white box. Network Security, 2002(11):10–12, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802110099.

Schultz:2002:DID

[2017] Eugene Schultz. Demystifying in-trusion detection: Sorting throughthe confusion, hyperbole and miscon-ceptions 1. Network Security, 2002(11):12–17, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802110105.

Cohen:2002:BTS

[2018] Fred Cohen. Breaking in to testsecurity? Network Security, 2002(11):17–19, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802110117.

Anonymous:2002:GSP

[2019] Anonymous. A gentle securityplayer? Network Security, 2002(11):19–20, November 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802110129.

Page 267: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 267

Anonymous:2002:ECk

[2020] Anonymous. Events calendar. Net-work Security, 2002(11):20, November2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802110130.

Hunter:2002:NSA

[2021] Philip Hunter. Network secu-rity architecture without perime-ters. Network Security, 2002(12):1–2, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802120010.

Madsen:2002:IAU

[2022] Wayne Madsen. Industry’s atti-tude to US cybersecurity plan. Net-work Security, 2002(12):2–3, December2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802120022.

Anonymous:2002:SAP

[2023] Anonymous. System administratorspatch too late. Network Security,2002(12):3, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802120034.

Anonymous:2002:IRV

[2024] Anonymous. ISS release vulnerabil-ity disclosure rules. Network Security,2002(12):3, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802120046.

Anonymous:2002:IDA

[2025] Anonymous. .info domain attackedby DdoS. Network Security, 2002(12):3, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802120058.

Anonymous:2002:Bd

[2026] Anonymous. In brief. Network Se-curity, 2002(12):3, December 2002.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580212006X.

Duke:2002:PPT

[2027] David Duke. The peer-to-peerthreat. Network Security, 2002(12):4, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802120071.

Regan:2002:DSN

[2028] Kevin Regan. Designing a se-cure network for e-business and be-yond. Network Security, 2002(12):5–8, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802120083.

Anonymous:2002:GSA

[2029] Anonymous. Guidelines for secur-ing Apache Web servers. Network

Page 268: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 268

Security, 2002(12):8–14, December2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802120095.

Wilson:2002:ISS

[2030] Piers Wilson. IT security — state ofthe nation. Network Security, 2002(12):15–17, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802120101.

Cohen:2002:BM

[2031] Fred Cohen. Back up a minute. Net-work Security, 2002(12):17–19, De-cember 2002. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485802120113.

Anonymous:2002:ECl

[2032] Anonymous. Events calendar. Net-work Security, 2002(12):20, December2002. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485802120125.

Anonymous:2002:SEG

[2033] Anonymous. Social engineering —gift of the gab. Network Security,2002(12):20, December 2002. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485802120137.

Anonymous:2003:MSC

[2034] Anonymous. Microsoft security cul-ture shock. Network Security, 2003(1):1–3, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001016.

Anonymous:2003:SBZ

[2035] Anonymous. Security benchmarks zap91% of vulnerabilities. Network Secu-rity, 2003(1):3, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001028.

Anonymous:2003:TWA

[2036] Anonymous. Top 10 Web applica-tion holes exposed. Network Secu-rity, 2003(1):3, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300103X.

Anonymous:2003:UGS

[2037] Anonymous. US Government slashessecurity strategy. Network Security,2003(1):3–4, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001041.

Anonymous:2003:Ba

[2038] Anonymous. In brief. Network Secu-rity, 2003(1):4, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001053.

Page 269: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 269

Anonymous:2003:MOC

[2039] Anonymous. Microsoft opens codeto governments. Network Security,2003(1):4, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001065.

Madsen:2003:NCC

[2040] Wayne Madsen. NIAC calls forchanges to US cybersecurity plan.Network Security, 2003(1):4, January2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803001077.

Duke:2003:P

[2041] David Duke. Passwords. Network Secu-rity, 2003(1):5, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001089.

Hunter:2003:LIU

[2042] Philip Hunter. Lack of integration un-dermines IT security. Network Security,2003(1):5–7, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001090.

Regan:2003:WLS

[2043] Kevin Regan. Wireless LAN secu-rity: Things you should know aboutWLAN security. Network Security,2003(1):7–9, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001107.

Lord:2003:TTW

[2044] Steve Lord. Trouble at the Telco:When GSM goes bad. Network Se-curity, 2003(1):10–12, January 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803001119.

King:2003:MTB

[2045] David L. King. Moving towardsa business continuity culture. Net-work Security, 2003(1):12–17, January2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803001120.

Cohen:2003:SPA

[2046] Fred Cohen. Security programmers —not all the same. Network Security,2003(1):18–19, January 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803001132.

Anonymous:2003:ECa

[2047] Anonymous. Events calendar. Net-work Security, 2003(1):20, January2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803001144.

Anonymous:2003:QG

[2048] Anonymous. 2002 — quick glance.Network Security, 2003(1):20, January

Page 270: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 270

2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803001156.

Anonymous:2003:SWL

[2049] Anonymous. Slammer Worm —lessons learned. Network Security,2003(2):1, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803002010.

Everett:2003:VHF

[2050] Catherine Everett. Vulnerabilities— hitting faster and harder. Net-work Security, 2003(2):2, February2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803002022.

Anonymous:2003:EHS

[2051] Anonymous. European honeypotserver — hacked sticky. NetworkSecurity, 2003(2):2, February 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803002034.

Anonymous:2003:CAP

[2052] Anonymous. CERT accused of profit-ing from research. Network Security,2003(2):3, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803002046.

Anonymous:2003:HGC

[2053] Anonymous. Hacker group —cracked. Network Security, 2003(2):3, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803002058.

Madsen:2003:NUI

[2054] Wayne Madsen. New US Internetmonitoring centre. Network Security,2003(2):3, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300206X.

Anonymous:2003:Bb

[2055] Anonymous. In brief. NetworkSecurity, 2003(2):3, February 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803002071.

Duke:2003:FAV

[2056] David Duke. Fooling anti-virussystems. Network Security, 2003(2):4, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803002083.

Gallo:2003:SST

[2057] Vince Gallo. Secret steganographytechniques revealed. Network Security,2003(2):4–8, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803002095.

Page 271: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 271

Midian:2003:PPT

[2058] Paul Midian. Perspectives on pen-etration testing — finding the rightsupplier. Network Security, 2003(2):9–11, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803002101.

Venter:2003:AVS

[2059] H. S. Venter and J. H. P. Eloff.Assessment of vulnerability scan-ners. Network Security, 2003(2):11–16, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803002113.

Forte:2003:SRN

[2060] Dario Forte. Slammer — the re-turn of the network nightmare. Net-work Security, 2003(2):17–18, February2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803002125.

Cohen:2003:SYI

[2061] Fred Cohen. Switching your infras-tructure. Network Security, 2003(2):19–20, February 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803002137.

Anonymous:2003:ECb

[2062] Anonymous. Events calendar. Net-work Security, 2003(2):20, February2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485803002149.

Anonymous:2003:GBS

[2063] Anonymous. Getting back to thesource. Network Security, 2003(3):1–3, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803003015.

Anonymous:2003:Bc

[2064] Anonymous. In brief. Network Secu-rity, 2003(3):2–3, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803003027.

Anonymous:2003:SBF

[2065] Anonymous. Security breach forcesclosure of company. Network Secu-rity, 2003(3):3, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803003039.

Anonymous:2003:LOG

[2066] Anonymous. Large online gamerpaid ransom to hacker extortionists.Network Security, 2003(3):3, March2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803003040.

Anonymous:2003:INF

[2067] Anonymous. IDS — the new firewall?Network Security, 2003(3):3, March2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 272: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 272

URL http://www.sciencedirect.

com/science/article/pii/S1353485803003052.

Anonymous:2003:UPP

[2068] Anonymous. USB — plug and pray?Network Security, 2003(3):4, March2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803003076.

Anonymous:2003:WLD

[2069] Anonymous. Wireless LANs — dothey fundamentally change the conven-tional security model? Network Secu-rity, 2003(3):4–7, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803003088.

Anonymous:2003:IFP

[2070] Anonymous. Internet freedom pen-dulum turns again . . . and do peo-ple really care? Network Security,2003(3):8–9, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300309X.

Anonymous:2003:MSS

[2071] Anonymous. The MS-SQL Slam-mer Worm. Network Security, 2003(3):10–14, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803003106.

Anonymous:2003:NAW

[2072] Anonymous. Network armies in a worldwithout secrets. Network Security,

2003(3):14–15, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803003118.

Anonymous:2003:DID

[2073] Anonymous. Distributed intrusion de-tection systems (DIDS) can make secu-rity more adaptive. Network Security,2003(3):16–18, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300312X.

Anonymous:2003:ND

[2074] Anonymous. Novelty detection. Net-work Security, 2003(3):18–19, March2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803003131.

Anonymous:2003:ECc

[2075] Anonymous. Events calendar. Net-work Security, 2003(3):20, March2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803003143.

Anonymous:2003:UI

[2076] Anonymous. US insight. Network Secu-rity, 2003(3):20, March 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803003155.

Anonymous:2003:BAC

[2077] Anonymous. Bugtraq attacked forcensorship and delay. Network Secu-

Page 273: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 273

rity, 2003(4):1–2, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300401X.

Anonymous:2003:ESC

[2078] Anonymous. Enterprise security con-cerns in year ahead. Network Secu-rity, 2003(4):2, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004021.

Anonymous:2003:HAW

[2079] Anonymous. Hacktivists attack web-sites in war protests. Network Secu-rity, 2003(4):2, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004033.

Anonymous:2003:Bd

[2080] Anonymous. In brief. Network Secu-rity, 2003(4):2–3, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004057.

Anonymous:2003:TVC

[2081] Anonymous. Top 10 vulnerabilitesfrom CERT. Network Security,2003(4):3, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004045.

Anonymous:2003:YCS

[2082] Anonymous. Is your current secu-rity SECURE?: John Jessop, Cryp-tic Software. Network Security,2003(4):3, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004069.

Anonymous:2003:RAP

[2083] Anonymous. Rogue access points— threat to enterprise security:Bruce Potter. Network Security,2003(4):4–5, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004070.

Anonymous:2003:EAM

[2084] Anonymous. Early alerts — makingsense of security information overload:Kevin Hawkins, Senior Principal Con-sultant, Symantec Corp. Network Secu-rity, 2003(4):5–7, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004082.

Anonymous:2003:NSA

[2085] Anonymous. Network security in ac-tion — can a worm teach us any-thing?: Paul King, security con-sultant, Cisco Systems UK andIreland. Network Security, 2003(4):8–11, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004094.

Page 274: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 274

Anonymous:2003:PPT

[2086] Anonymous. Perspectives on pene-tration testing — everybody knowsthis, surely?: Paul midian, insightconsulting. Network Security, 2003(4):12–14, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004100.

Hunter:2003:GC

[2087] Philip Hunter. Grid computing. Net-work Security, 2003(4):15–16, April2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803004112.

Anonymous:2003:CCC

[2088] Anonymous. Covert channels: Cov-ering ‘malicious’ traffic: DarioForte. Network Security, 2003(4):16–18, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004124.

Anonymous:2003:DSF

[2089] Anonymous. Documenting security:Fred Cohen. Network Security, 2003(4):18–19, April 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803004136.

Anonymous:2003:ECd

[2090] Anonymous. Events calendar. Net-work Security, 2003(4):20, April 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485803004148.

Anonymous:2003:MF

[2091] Anonymous. Mistakes in fixes. Net-work Security, 2003(4):20, April 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580300415X.

Anonymous:2003:API

[2092] Anonymous. Analyst predicts infose-curity market 2003–6. Network Secu-rity, 2003(5):1–2, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005014.

Anonymous:2003:ISD

[2093] Anonymous. IDS switches from de-tection to prevention. Network Secu-rity, 2003(5):2, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005038.

Anonymous:2003:Be

[2094] Anonymous. In brief. Network Secu-rity, 2003(5):2–3, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005026.

Anonymous:2003:WSS

[2095] Anonymous. Windows Server 2003secure? Network Security, 2003(5):3, May 2003. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371

Page 275: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 275

(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485803005051.

Anonymous:2003:NGM

[2096] Anonymous. New group merge phys-ical and cyber security. Network Se-curity, 2003(5):3, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005063.

Anonymous:2003:CVM

[2097] Anonymous. Corporates are vulner-able to minor flaws. Network Secu-rity, 2003(5):3–4, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300504X.

Potter:2003:BSO

[2098] Bruce Potter. Bluetooth — se-curity optional. Network Security,2003(5):4–5, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005075.

Regan:2003:SVD

[2099] Kevin Regan. Secure VPN designconsiderations. Network Security,2003(5):5–10, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005087.

Anonymous:2003:ILS

[2100] Anonymous. An inside look atSecurity Operation Centres: Dario

Forte outlines the role of Secu-rity Operation Centres, the gather-ers of intelligence, in the future ofsecurity. Network Security, 2003(5):11–12, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005099.

Hunter:2003:DDS

[2101] Philip Hunter. Distributed De-nial of Service (DDOS) mitiga-tion tools. Network Security, 2003(5):12–14, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005105.

Wilson:2003:WSS

[2102] Piers Wilson. Web services se-curity. Network Security, 2003(5):14–16, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005117.

Eiram:2003:SSS

[2103] Carsten H. Eiram. Snort, Sendmailand Samba — recent risks. Net-work Security, 2003(5):16–17, May2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803005129.

Cohen:2003:OSR

[2104] Fred Cohen. Operations security forthe rest of us. Network Security,2003(5):17–19, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),

Page 276: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 276

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005130.

Anonymous:2003:ECe

[2105] Anonymous. Events calendar. Net-work Security, 2003(5):20, May 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803005142.

Anonymous:2003:BFV

[2106] Anonymous. Blackhats find vul-nerabilities first. Network Security,2003(5):20, May 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803005154.

Anonymous:2003:DPM

[2107] Anonymous. DNS — prone tomore attacks. Network Security,2003(6):1–2, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006019.

Anonymous:2003:CSP

[2108] Anonymous. Cisco self-protecting net-works. Network Security, 2003(6):2, June 2003. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485803006032.

Anonymous:2003:Bf

[2109] Anonymous. In brief. Network Secu-rity, 2003(6):2–3, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006020.

Anonymous:2003:HFA

[2110] Anonymous. Harmful ‘free’ appli-cations cost corporates lots. Net-work Security, 2003(6):2–3, June 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803006044.

Anonymous:2003:SPL

[2111] Anonymous. Security productslack integration. Network Secu-rity, 2003(6):3, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006056.

Anonymous:2003:ULV

[2112] Anonymous. University launchesvirus writers course. Network Secu-rity, 2003(6):3, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006068.

Potter:2003:WAO

[2113] Bruce Potter. Wireless authenti-cation options for up and downthe Stack. Network Security, 2003(6):4–5, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300607X.

Page 277: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 277

Kristensen:2003:RIV

[2114] Thomas Kristensen. Rash of IEvulnerabilities. Network Security,2003(6):6, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006081.

Mockapetris:2003:DYD

[2115] Paul V. Mockapetris. Defend-ing your DNS & DHCP — bestpractices. Network Security, 2003(6):7–10, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006093.

Morrison:2003:DS

[2116] Paul Morrison. Database se-curity. Network Security, 2003(6):11–12, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300610X.

Ollmann:2003:BPM

[2117] Gunter Ollmann. Best practice inmanaging HTTP-based client ses-sions. Network Security, 2003(6):13–17, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006111.

Hunter:2003:DDP

[2118] Philip Hunter. Defence in depth — pro-tecting the queen. Network Security,2003(6):17–18, June 2003. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006123.

Cohen:2003:BCS

[2119] Fred Cohen. Background checks: Se-ries introduction. Network Security,2003(6):18–20, June 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803006135.

Anonymous:2003:ECf

[2120] Anonymous. Events calendar. Net-work Security, 2003(6):20, June 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803006147.

Anonymous:2003:WCS

[2121] Anonymous. Web crawling spies huntcorporate pirates. Network Secu-rity, 2003(7):1–2, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007013.

Anonymous:2003:HCM

[2122] Anonymous. Hackers control 3million servers. Network Security,2003(7):1–2, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007025.

Anonymous:2003:Bg

[2123] Anonymous. In brief. Network Secu-rity, 2003(7):2–3, July 2003. CODEN

Page 278: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 278

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007037.

Anonymous:2003:SPH

[2124] Anonymous. Symantec push honey-pot as add-on to IDS. Network Secu-rity, 2003(7):2–3, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007049.

Anonymous:2003:MRP

[2125] Anonymous. Microsoft RMS to pro-tect “digital rights”. Network Secu-rity, 2003(7):3, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007050.

Anonymous:2003:VA

[2126] Anonymous. Vulnerability analy-sis. Network Security, 2003(7):4, July2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803007062.

Anonymous:2003:KYW

[2127] Anonymous. Know your wireless Gear.Network Security, 2003(7):5–6, July2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803007074.

Anonymous:2003:DSP

[2128] Anonymous. Database security (PartII). Network Security, 2003(7):6–8, July 2003. CODEN NTSCF5.

ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485803007086.

Anonymous:2003:PSP

[2129] Anonymous. The perils of securitypatch management. Network Secu-rity, 2003(7):9–12, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007098.

Anonymous:2003:PDH

[2130] Anonymous. Part 1: Deploying hon-eypots: Project background and im-plications. Network Security, 2003(7):13–14, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007104.

Anonymous:2003:PIH

[2131] Anonymous. Part II: Honeypots in de-tail: the variations. Network Security,2003(7):14–15, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007116.

Anonymous:2003:VAT

[2132] Anonymous. Vulnerability assess-ment tools. Network Security, 2003(7):15–17, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803007128.

Page 279: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 279

Anonymous:2003:QAI

[2133] Anonymous. Questions to ask in in-formation security. Network Security,2003(7):18–19, July 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300713X.

Anonymous:2003:ECg

[2134] Anonymous. Events calendar. Net-work Security, 2003(7):20, July 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803007141.

Anonymous:2003:WCP

[2135] Anonymous. 17 ways to crack apassword. Network Security, 2003(8):1–2, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803008018.

Anonymous:2003:FPW

[2136] Anonymous. First predicted wormarrives to exploit MS flaw. Net-work Security, 2003(8):1–3, August2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580300802X.

Anonymous:2003:Bh

[2137] Anonymous. In brief. NetworkSecurity, 2003(8):2–3, August 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803008031.

Anonymous:2003:NSE

[2138] Anonymous. New senior Editor ap-pointed to network security. Net-work Security, 2003(8):3, August2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803008043.

Potter:2003:WDD

[2139] Bruce Potter. Wireless device dis-covery. Network Security, 2003(8):4–5, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803008055.

Hunter:2003:SIO

[2140] Philip Hunter. Security issues withoffshore outsourcing: Offshore codingbooming, but is it safe? Answer isa qualified yes, but only if you doyour homework. Network Security,2003(8):5–6, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803008067.

Schultz:2003:SWV

[2141] E. Eugene Schultz. The SobigWorm variants: Letter after letterfrom A–E. Network Security, 2003(8):7–10, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803008079.

Chuvakin:2003:HHV

[2142] Anton Chuvakin. “Honeynets: Highvalue security data”: Analysis of

Page 280: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 280

real attacks launched at a hon-eypot. Network Security, 2003(8):11–15, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803008080.

Wilson:2003:RS

[2143] Piers Wilson. Rogue servers. Net-work Security, 2003(8):16–18, August2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803008092.

Kristenson:2003:BPR

[2144] Thomas Kristenson. A big pictureon recent vulnerabilities: Active AX,Web server compromises and inse-cure documents. Network Security,2003(8):19, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803008109.

Anonymous:2003:ECh

[2145] Anonymous. Events calendar. Net-work Security, 2003(8):20, August2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803008110.

Anonymous:2003:UCS

[2146] Anonymous. US calls for Spy-ware law. Network Security, 2003(8):20, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803008122.

Anonymous:2003:MSP

[2147] Anonymous. Man steals passwordswith keystroke logger. Network Secu-rity, 2003(8):20, August 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803008134.

Anonymous:2003:BVW

[2148] Anonymous. Blaster variant writ-ers busted. Network Security, 2003(9):1, 3, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803009024.

Anonymous:2003:SFSa

[2149] Anonymous. Sobig family set to getbigger and badder. Network Security,2003(9):1–2, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803009012.

Anonymous:2003:Bi

[2150] Anonymous. In brief. Network Se-curity, 2003(9):2–3, September 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803009036.

Potter:2003:NGW

[2151] Bruce Potter. Next generation wire-less security tools. Network Security,2003(9):4–5, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803009048.

Page 281: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 281

Anonymous:2003:BCJ

[2152] Anonymous. Black Hat Conference:Not just hackers: Report from theInformation Security Festival. Confer-ence reporter. Network Security, 2003(9):5–6, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580300905X.

Anonymous:2003:UCD

[2153] Anonymous. Unravelling crypto de-velopments: Dr Nicko van Someren,founder and CTO of nCipher, sortsout fact from fiction when it comes toquantum encryption. Network Security,2003(9):7–8, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803009061.

King:2003:TSW

[2154] Stuart King. Threats and solutionsto Web services security. NetworkSecurity, 2003(9):8–11, September2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803009073.

Shaw:2003:SAR

[2155] Geoff Shaw. Spyware & adware:the risks facing businesses. NetworkSecurity, 2003(9):12–14, September2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803009085.

Wales:2003:IST

[2156] Elspeth Wales. Industry sinks teethinto spam. Network Security, 2003(9):15–17, September 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803009097.

David:2003:IR

[2157] Jon David. Incident response. NetworkSecurity, 2003(9):17–19, September2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803009103.

Kristensen:2003:BPBa

[2158] Thomas Kristensen. The big pictureon big flaws: RPC DCOM vulnerabil-ity — what went wrong? NetworkSecurity, 2003(9):19–20, September2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803009115.

Anonymous:2003:ECi

[2159] Anonymous. Events calendar. Net-work Security, 2003(9):20, September2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803009127.

Anonymous:2003:MBB

[2160] Anonymous. Microsoft bites back asblame deepens. Network Security, 2003(10):1, 3, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580301002X.

Page 282: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 282

Anonymous:2003:WIA

[2161] Anonymous. Why it all went wrongwith Blaster. Network Security, 2003(10):1–2, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803010018.

Anonymous:2003:VAF

[2162] Anonymous. Virus authors fasterto the kill. Network Security, 2003(10):2, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803010043.

Anonymous:2003:Bj

[2163] Anonymous. In brief. Network Se-curity, 2003(10):2–3, October 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803010031.

Schultz:2003:MWG

[2164] E. Eugene Schultz. The MS-Blaster worm: going from bad toworse. Network Security, 2003(10):4–8, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803010055.

Anonymous:2003:SWA

[2165] Anonymous. Summer of worms: Au-gust’s child is a virus writer. Net-work Security, 2003(10):8–10, October2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485803010067.

Potter:2003:WSP

[2166] Bruce Potter. Wireless securitypolicies. Network Security, 2003(10):10–12, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803010079.

Stewart:2003:SSA

[2167] Joe Stewart. Spam & Sobig: armin arm. Network Security, 2003(10):12–16, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803010080.

Sullivan:2003:VAW

[2168] Paul Sullivan. Vulnerability analy-sis — what is important and whatis not. Network Security, 2003(10):17–19, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803010092.

Kristensen:2003:BPBb

[2169] Thomas Kristensen. The big pic-ture on big holes: SSH and Send-mail challenge Microsoft’s top spotfor flaws. Network Security, 2003(10):19–20, October 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803010109.

Page 283: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 283

Anonymous:2003:ECj

[2170] Anonymous. Events calendar. Net-work Security, 2003(10):20, October2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803010110.

Anonymous:2003:VTM

[2171] Anonymous. Virus tracking movesback to basics. Network Security, 2003(11):1, 3, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011024.

Madsen:2003:CST

[2172] Wayne Madsen. Computerizedsurveillance a top priority for Pen-tagon. Network Security, 2003(11):1–2, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011012.

Anonymous:2003:Bk

[2173] Anonymous. In brief. Network Se-curity, 2003(11):2–3, November 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803011036.

Anonymous:2003:EDR

[2174] Anonymous. Expert debunks regula-tion in cybersecurity. Network Security,2003(11):2–3, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011048.

Potter:2003:WBL

[2175] Bruce Potter. Wireless-based loca-tion tracking. Network Security, 2003(11):4–5, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580301105X.

Lobo:2003:SLM

[2176] Colin Lobo. Security log man-agement. Network Security, 2003(11):6–9, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011061.

Ranum:2003:DS

[2177] Marcus J. Ranum. The death ofspam? Network Security, 2003(11):10–13, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011073.

Anonymous:2003:PB

[2178] Anonymous. Placing blame. NetworkSecurity, 2003(11):14–15, November2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803011085.

Kristenson:2003:BPBa

[2179] Thomas Kristenson. The big pictureon big holes. Network Security, 2003(11):15–17, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011097.

Page 284: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 284

Dwan:2003:BMP

[2180] Berni Dwan. Body mnemonics inPDA security. Network Security, 2003(11):17, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011103.

Ollmann:2003:IPS

[2181] Gunter Ollmann. Intrusion preven-tion systems (IPS) destined to replacelegacy routers. Network Security, 2003(11):18–19, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011115.

Anonymous:2003:ECk

[2182] Anonymous. Events calendar. Net-work Security, 2003(11):20, November2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803011127.

Anonymous:2003:IMF

[2183] Anonymous. ISPs — more forcefulin security. Network Security, 2003(11):20, November 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803011139.

Anonymous:2003:PAW

[2184] Anonymous. Port 80 apps — widerattack avenues. Network Security,2003(12):1, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000023.

Everett:2003:FDB

[2185] Catherine Everett. Full disclosure —the biggest flaw? Network Security,2003(12):1, 2, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000011.

Anonymous:2003:Bl

[2186] Anonymous. In brief. Network Se-curity, 2003(12):2–3, December 2003.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803000035.

Anonymous:2003:SFSb

[2187] Anonymous. Sobig.F spams its way totop of 2003 chart. Network Security,2003(12):3, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000047.

Potter:2003:TWS

[2188] Bruce Potter. Trends in wirelesssecurity — the big picture. Net-work Security, 2003(12):4–5, December2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803000059.

Forte:2003:PDE

[2189] Dario Forte. Principles of digital ev-idence collection. Network Security,2003(12):6–7, December 2003. CODEN

Page 285: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 285

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000060.

Starnes:2003:TD

[2190] Richard Starnes. The Trojan de-fence. Network Security, 2003(12):8, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000072.

Schultz:2003:MHS

[2191] E. Eugene Schultz. The myth ofHomeland security. Network Security,2003(12):9, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000084.

David:2003:UVB

[2192] Jon David. Unpatched vulnerabil-ities — the big issues. NetworkSecurity, 2003(12):10–14, December2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485803000096.

Dwan:2003:LTP

[2193] Berni Dwan. Laptop thieves: Priceon their head$. Network Security,2003(12):15, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000102.

Conner:2003:WS

[2194] Bill Conner. Worldwide secu-rity. Network Security, 2003(12):16, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000114.

Wilson:2003:TVB

[2195] Piers Wilson. “Top-down” versus“bottom-up” — different approachesto security. Network Security, 2003(12):17–19, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000126.

Kristenson:2003:BPBb

[2196] Thomas Kristenson. The big pictureon Blg holes. Network Security, 2003(12):19–20, December 2003. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485803000138.

Anonymous:2003:ECl

[2197] Anonymous. Events calendar. Net-work Security, 2003(12):20, December2003. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580300014X.

Everett:2004:SEE

[2198] Catherine Everett. Social engineeringemails get more devious. Network Secu-rity, 2004(1):1, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),

Page 286: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 286

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000157.

Madsen:2004:PDS

[2199] Wayne Madsen. Passenger data shar-ing continues to be a problem be-tween US & EU. Network Security,2004(1):2, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000170.

Anonymous:2004:Ba

[2200] Anonymous. In brief. Network Se-curity, 2004(1):2–3, January 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000169.

Anonymous:2004:STD

[2201] Anonymous. Sober tops Decem-ber virus chart. Network Security,2004(1):3, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000182.

Anonymous:2004:TLA

[2202] Anonymous. TruSecure launchesapplication-based vulnerability as-sessment. Network Security, 2004(1):3, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000194.

Anonymous:2004:CPG

[2203] Anonymous. Check Point goes in-side to stop threat. Network Secu-rity, 2004(1):3, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000200.

Potter:2004:WBM

[2204] Bruce Potter. Warchalking and Blue-jacking: Myth or reality. Net-work Security, 2004(1):4–5, January2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000212.

Schultz:2004:WSP

[2205] E. Eugene Schultz. Windows2000 security: a postmortem anal-ysis. Network Security, 2004(1):6–9, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000224.

Ford:2004:GGW

[2206] Richard Ford and Helayne Ray.Googling for gold: Web crawlers,hacking and defense explained. Net-work Security, 2004(1):10–13, January2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000236.

Levenhagen:2004:TCV

[2207] Roger Levenhagen. Trends, codesand virus attacks — 2003 year inreview. Network Security, 2004

Page 287: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 287

(1):13–15, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000248.

Anonymous:2004:C

[2208] Anonymous. It’s a crime. Net-work Security, 2004(1):15–17, January2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580400025X.

hunter:2004:IVS

[2209] Philip hunter. IP V6: Security is-sues. Network Security, 2004(1):17–19, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000261.

Kristenson:2004:BPBa

[2210] Thomas Kristenson. The big pictureon big holes. Network Security, 2004(1):19–20, January 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000273.

Anonymous:2004:ECa

[2211] Anonymous. Events calendar. Net-work Security, 2004(1):20, January2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000285.

Anonymous:2004:AVA

[2212] Anonymous. ASN.1 vulnerabil-ity — all we can do is patch

& wait. Network Security, 2004(2):1, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000297.

Anonymous:2004:MSCa

[2213] Anonymous. Microsoft source codeexploited. Network Security, 2004(2):1–2, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000303.

McKenna:2004:ICS

[2214] Brian McKenna. IBM and Ciscostep up security convergence. Net-work Security, 2004(2):2–3, February2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000315.

Anonymous:2004:Bb

[2215] Anonymous. In brief. Network Se-curity, 2004(2):2–3, February 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000327.

Potter:2004:SMD

[2216] Bruce Potter. Securing the mo-bile device. Network Security, 2004(2):4–5, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000339.

Page 288: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 288

Miller:2004:MWY

[2217] Andrew Miller. Is malware wreckingyour computer? Network Security,2004(2):5–6, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000340.

Furnell:2004:HUH

[2218] Steven Furnell and Stamatis Bolakis.Helping us to help ourselves: Assess-ing administrators’ use of security anal-ysis tools. Network Security, 2004(2):7–12, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000352.

Anonymous:2004:MDY

[2219] Anonymous. MyDoom: Do you “getit” yet? Network Security, 2004(2):13–15, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000364.

Kristensen:2004:BPBa

[2220] Thomas Kristensen. The big pic-ture on big holes. Network Security,2004(2):15, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000376.

Dwan:2004:RRa

[2221] Berni Dwan. Research review. Net-work Security, 2004(2):16–17, February2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485804000388.

Hunter:2004:CVP

[2222] Philip Hunter. Combating videopiracy. Network Security, 2004(2):18–19, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400039X.

Anonymous:2004:ATW

[2223] Anonymous. Not another teenager— where are the grown-up virus au-thors? Network Security, 2004(2):20, February 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000406.

Anonymous:2004:ECb

[2224] Anonymous. Events calendar. Net-work Security, 2004(2):20, February2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000418.

Anonymous:2004:NSN

[2225] Anonymous. Network security needsnumbers say CSOs. Network Secu-rity, 2004(3):1, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400042X.

Madsen:2004:HLC

[2226] Wayne Madsen. Highest level clear-ances planned for all US IT secu-rity pros. Network Security, 2004

Page 289: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 289

(3):1–2, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000431.

Anonymous:2004:Bc

[2227] Anonymous. In brief. Network Secu-rity, 2004(3):2–3, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000443.

Anonymous:2004:CBB

[2228] Anonymous. Confidentiality breaches:The biggest cost. Network Security,2004(3):2–3, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000455.

Anonymous:2004:CFS

[2229] Anonymous. Cisco fattens secu-rity product line. Network Secu-rity, 2004(3):3, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000467.

Anonymous:2004:EFE

[2230] Anonymous. EU forks out EUR 50 mil-lion to clean Internet. Network Secu-rity, 2004(3):3, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000479.

Potter:2004:BV

[2231] Bruce Potter. Bluetooth “vulner-abilities”. Network Security, 2004(3):4–5, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000480.

Anonymous:2004:FEH

[2232] Anonymous. February: Eventfulhorizon. Network Security, 2004(3):5–7, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000492.

Ollmann:2004:SAT

[2233] Gunter Ollmann. Securing against the‘threat’ of instant. Network Security,2004(3):8–11, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000509.

Hunter:2004:CCI

[2234] Philip Hunter. Centrally con-trolled intrusions — the futurethreat. Network Security, 2004(3):12–13, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000510.

Forte:2004:MCT

[2235] Dario Forte. MyDoom & Co. is therereally a problem? Network Secu-rity, 2004(3):14, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),

Page 290: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 290

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000522.

Hilley:2004:FCL

[2236] Sarah Hilley. The final countdown:3, 2, 1 . . . zero. Network Security,2004(3):15–16, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000534.

Dwan:2004:RRb

[2237] Berni Dwan. Research review. Net-work Security, 2004(3):17–18, March2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000546.

Kristenson:2004:BPBb

[2238] Thomas Kristenson. The big pic-ture on big holes. Network Secu-rity, 2004(3):19, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000558.

Hichert:2004:OFS

[2239] Jan Hichert. Opinion: The finan-cial sector’s move to open source se-curity products. Network Security,2004(3):19–20, March 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400056X.

Anonymous:2004:ECc

[2240] Anonymous. Events calendar. Net-work Security, 2004(3):20, March

2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000571.

Madsen:2004:FFD

[2241] Wayne Madsen. Former FBI Di-rector says encryption fuels ter-rorists. Network Security, 2004(4):1, 3, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000595.

Anonymous:2004:MSF

[2242] Anonymous. Microsoft squeezes 20flaws into 4 patches. Network Secu-rity, 2004(4):1–2, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000583.

Anonymous:2004:NCF

[2243] Anonymous. NetScreen combines fire-wall and intrusion protection. Net-work Security, 2004(4):2, April 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000613.

Anonymous:2004:Bd

[2244] Anonymous. In brief. Network Secu-rity, 2004(4):2–3, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000601.

Page 291: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 291

Anonymous:2004:UUH

[2245] Anonymous. US universities hitin planned attack. Network Secu-rity, 2004(4):3, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000625.

Potter:2004:WID

[2246] Bruce Potter. Wireless intru-sion detection. Network Security,2004(4):4–5, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000637.

Heasman:2004:MNP

[2247] John Heasman. Migrating tothe .NET platform: an intro-duction. Network Security, 2004(4):6–7, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000649.

Edelson:2004:SNA

[2248] Eve Edelson. Security in networkattached storage (NAS) for work-groups. Network Security, 2004(4):8–12, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000650.

Claassen:2004:SH

[2249] Pieter Claassen. The state ofthe hack. Network Security, 2004(4):12–13, April 2004. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000662.

Forte:2004:ITS

[2250] Dario Forte. The importance of textsearches in digital forensics. Net-work Security, 2004(4):13–15, April2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000674.

Morgan:2004:NSC

[2251] David Morgan. Network securityand custom Web applications. Net-work Security, 2004(4):15–17, April2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000686.

Wood:2004:RIS

[2252] Peter Wood. Real IT security ona limited budget? Network Secu-rity, 2004(4):18, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000698.

McKenna:2004:IRA

[2253] Brian McKenna. Interview — remoteaccess at the BBC. Network Security,2004(4):19–20, April 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000704.

Page 292: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 292

Anonymous:2004:ECd

[2254] Anonymous. Events calendar. Net-work Security, 2004(4):20, April 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000716.

Anonymous:2004:MBH

[2255] Anonymous. Microsoft bounty huntleads to German youths. Network Se-curity, 2004(5):1, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400073X.

Anonymous:2004:OBS

[2256] Anonymous. Online betting site beatsblackmail DDoS. Network Security,2004(5):1, 3, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000728.

Madsen:2004:HCS

[2257] Wayne Madsen. House considers secu-rity and privacy proposals. Network Se-curity, 2004(5):2, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000753.

Anonymous:2004:Be

[2258] Anonymous. In brief. Network Secu-rity, 2004(5):2–3, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000741.

Everett:2004:ESB

[2259] Cath Everett. Eurovision se-cures borders. Network Security,2004(5):3, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000765.

Potter:2004:GS

[2260] Bruce Potter. GSM security. Net-work Security, 2004(5):4–5, May 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000777.

Wilson:2004:TCF

[2261] Piers Wilson. Technical challengesfaced when companies merge . . . .Network Security, 2004(5):5–7, May2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000789.

Morgan:2004:SHA

[2262] David Morgan. Securing high availabil-ity Web applications. Network Secu-rity, 2004(5):8–11, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000790.

Dwan:2004:OSV

[2263] Berni Dwan. Open source vsclosed. Network Security, 2004(5):11–13, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000807.

Page 293: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 293

Furnell:2004:GCP

[2264] Steven M. Furnell. Getting caught inthe phishing net. Network Security,2004(5):14–18, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000819.

Balle:2004:BPB

[2265] Jakob Balle. The big picture onbig holes. Network Security, 2004(5):18–20, May 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000820.

Anonymous:2004:ECe

[2266] Anonymous. Events calendar. Net-work Security, 2004(5):20, May 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000832.

Anonymous:2004:HEN

[2267] Anonymous. HP exploits new bugsto fix its systems. Network Secu-rity, 2004(6):1, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000856.

Anonymous:2004:UGA

[2268] Anonymous. US Government agen-cies struggle at patch manage-ment. Network Security, 2004(6):1–2, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000844.

Anonymous:2004:Bf

[2269] Anonymous. In brief. Network Secu-rity, 2004(6):2–3, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000868.

McKenna:2004:BFA

[2270] Brian McKenna. Bug-fixed applica-tions still insecure. Network Secu-rity, 2004(6):2–3, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400087X.

McKenna:2004:CTM

[2271] Brian McKenna. Cisco and TrendMicro tighten collaboration aroundSasser-like attacks. Network Secu-rity, 2004(6):3, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000881.

Potter:2004:FWS

[2272] Bruce Potter. Fixing wireless se-curity. Network Security, 2004(6):4–5, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000893.

Schultz:2004:RWS

[2273] E. Eugene Schultz. RPC in Win-dows systems: what you don’t know

Page 294: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 294

could hurt you. Network Security,2004(6):5–8, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400090X.

Paget:2004:HCA

[2274] Chris Paget. Hack chaining: Attacksthat become possible when a serveris compromised. Network Security,2004(6):8–11, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000911.

Furnell:2004:WVR

[2275] Steven Furnell. When vulnerabilityreports can work against us. Net-work Security, 2004(6):11–15, June2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000923.

Hunter:2004:ISN

[2276] Philip Hunter. Integrated secu-rity and network management re-main elusive. Network Security,2004(6):15–16, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000935.

Gordon:2004:SCA

[2277] Sarah Gordon. A short course in an-tivirus software testing: seven sim-ple rules for evaluating tests. Net-work Security, 2004(6):17–18, June2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485804000947.

Balle:2004:BAF

[2278] Jakob Balle. Bruised Apple tofight back? Network Security,2004(6):19–20, June 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000959.

Anonymous:2004:ECf

[2279] Anonymous. Events calendar. Net-work Security, 2004(6):20, June 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000960.

McKenna:2004:UMC

[2280] Brian McKenna. UK MPs callfor Computer Misuse Act upgrade:CMA in dire need of reform, saysreport. Network Security, 2004(7):1, 3, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000984.

Everett:2004:TTB

[2281] Cath Everett. Testing times forbeleagured Internet Explorer. Net-work Security, 2004(7):1–2, July 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804000972.

Anonymous:2004:Bg

[2282] Anonymous. In brief. Network Secu-rity, 2004(7):2–3, July 2004. CODEN

Page 295: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 295

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804000996.

Anonymous:2004:MUU

[2283] Anonymous. Microsoft unleash7 updates. Network Security,2004(7):3, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400100X.

Potter:2004:SGT

[2284] Bruce Potter. 802.16 security: get-ting there? Network Security,2004(7):4–5, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001011.

Dunn:2004:AUR

[2285] Kevin Dunn. Automatic updaterisks: can patching let a hacker in?Network Security, 2004(7):5–8, July2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001023.

Miller:2004:PSC

[2286] Andrew Miller. PDA security con-cerns. Network Security, 2004(7):8–10, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001035.

Gorling:2004:PWY

[2287] Stefan Gorling. Parasites: whatyou can’t see can hurt you. Net-work Security, 2004(7):11–13, July2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001047.

Dwan:2004:MPV

[2288] Berni Dwan. The mobile phonevirus. Network Security, 2004(7):14–15, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001059.

Papadaki:2004:IIW

[2289] Maria Papadaki and Steven Furnell.IDS or IPS: what is best? Net-work Security, 2004(7):15–19, July2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001060.

Kristensen:2004:BPBb

[2290] Thomas Kristensen. The big pic-ture on big holes. Network Security,2004(7):19–20, July 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001072.

Anonymous:2004:ECg

[2291] Anonymous. Events calendar. Net-work Security, 2004(7):20, July 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001084.

Page 296: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 296

Anonymous:2004:SBS

[2292] Anonymous. Stealth bomber screento block wireless hackers: BAE makesWLANs disappear. Network Security,2004(8):1–2, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001096.

Anonymous:2004:PEV

[2293] Anonymous. Pfizer to exterminateViagra spammers. Network Security,2004(8):1–3, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001102.

OHalloran:2004:FSW

[2294] Joe O’Halloran. Fashion sharp-ens wireless risk. Network Security,2004(8):2, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001126.

Anonymous:2004:Bh

[2295] Anonymous. In brief. NetworkSecurity, 2004(8):2–3, August 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001114.

Anonymous:2004:MGG

[2296] Anonymous. MyDoom gags Google.Network Security, 2004(8):3, August2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001138.

Potter:2004:WUB

[2297] Bruce Potter. Wireless updatesfrom Black Hat and DefCon. Net-work Security, 2004(8):4–5, August2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580400114X.

James:2004:MTS

[2298] Gareth James. Malicious threatsto Smartphones. Network Security,2004(8):5–7, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001151.

Hunter:2004:LSS

[2299] Philip Hunter. Linux security: sep-arating myth from reality. Net-work Security, 2004(8):8–9, August2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001163.

Chuvakin:2004:LID

[2300] Anton Chuvakin. Linux intrusion dis-covery: when security fails. Net-work Security, 2004(8):10–12, August2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001175.

Hilley:2004:TCP

[2301] Sarah Hilley. Trusted computing —path to security or road to servi-tude? Network Security, 2004(8):12–15, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),

Page 297: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 297

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001187.

Lobo:2004:WMD

[2302] Colin Lobo. Where’s my datagone!? Network Security, 2004(8):15–17, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001199.

Anonymous:2004:GGW

[2303] Anonymous. Google’s Gmail — willads, privacy concerns or security fearsspoil the free lunch? Network Security,2004(8):18–19, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001205.

Sandblad:2004:BPB

[2304] Andreas Sandblad. The big pictureon big holes. Network Security, 2004(8):19–20, August 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001217.

Anonymous:2004:ECh

[2305] Anonymous. Events calendar. Net-work Security, 2004(8):20, August2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001229.

Anonymous:2004:UGP

[2306] Anonymous. UK Government topush greater public awareness of In-

ternet trust. Network Security, 2004(9):1, 3, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001242.

Anonymous:2004:RPD

[2307] Anonymous. Research pinpoints 10deadly sins. Network Security, 2004(9):1–2, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001230.

Anonymous:2004:GPA

[2308] Anonymous. German police arresteBay hi-jacker. Network Security,2004(9):2, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001266.

Anonymous:2004:SAC

[2309] Anonymous. Sasser author charged.Network Security, 2004(9):2, Septem-ber 2004. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485804001278.

Anonymous:2004:Bi

[2310] Anonymous. In brief. Network Se-curity, 2004(9):2–3, September 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001254.

Page 298: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 298

Anonymous:2004:VM

[2311] Anonymous. VPN for the masses. Net-work Security, 2004(9):3, September2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580400128X.

Potter:2004:SE

[2312] Bruce Potter. Security to theedge. Network Security, 2004(9):4–5, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001291.

Wilson:2004:TSY

[2313] Piers Wilson. Tips to stop your usersfrom being phished. Network Security,2004(9):5–9, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001308.

Kemp:2004:GM

[2314] Michael Kemp. Ghosts in the ma-chine. Network Security, 2004(9):9–12, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400131X.

David:2004:NTB

[2315] Jon David. New threats bring newtreatments. Network Security, 2004(9):12–15, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001321.

Dwan:2004:HAS

[2316] Berni Dwan. Honeynets aim to stingblackhats. Network Security, 2004(9):15–18, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001333.

Eiram:2004:BPB

[2317] Carsten Eiram. The big picture onbig holes. Network Security, 2004(9):18–20, September 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001345.

Anonymous:2004:ECi

[2318] Anonymous. Events calendar. Net-work Security, 2004(9):20, September2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001357.

Anonymous:2004:TFL

[2319] Anonymous. Top 20 fear list un-leashed. Network Security, 2004(10):1–2, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001369.

Anonymous:2004:IWB

[2320] Anonymous. Infosec wages buoyant.Network Security, 2004(10):2, October2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001370.

Page 299: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 299

McKenna:2004:AIV

[2321] Brian McKenna. Accelerated IP v6shift caught at Check Point. Net-work Security, 2004(10):3, October2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001382.

McKenna:2004:CTO

[2322] Brian McKenna. Combination tools tooust point products. Network Security,2004(10):3, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001394.

Anonymous:2004:Bj

[2323] Anonymous. In brief. NetworkSecurity, 2004(10):3, October 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001400.

Potter:2004:SNS

[2324] Bruce Potter. Software & networksecurity. Network Security, 2004(10):4–5, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001412.

Anonymous:2004:UNS

[2325] Anonymous. US NSF to spend $30mto defeat malware. Network Security,2004(10):5–6, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001424.

Schultz:2004:USD

[2326] Gene Schultz. Using ssh: Dosecurity risks outweigh the bene-fits? Network Security, 2004(10):7–10, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001436.

Furnell:2004:MCA

[2327] Steven Furnell and Jeremy Ward.Malware comes of age: The ar-rival of the true computer para-site. Network Security, 2004(10):11–15, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001448.

Kemp:2004:BIR

[2328] Michael Kemp. Basic incidentresponse for system administra-tors. Network Security, 2004(10):16–18, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400145X.

Kristensen:2004:LP

[2329] Thomas Kristensen. Lethal pic-tures. Network Security, 2004(10):19–20, October 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001461.

McKenna:2004:LAV

[2330] Brian McKenna. Lumeta adds visu-als to network discovery tool. Net-

Page 300: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 300

work Security, 2004(10):20, October2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001473.

Anonymous:2004:ECj

[2331] Anonymous. Events calendar. Net-work Security, 2004(10):20, October2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001485.

Anonymous:2004:SFL

[2332] Anonymous. Security firms leap intoCahoot debate. Network Security, 2004(11):1–2, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001497.

McKenna:2004:AED

[2333] Brian McKenna. American Ex-press deploys appliance for securefile transfer. Network Security, 2004(11):2, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001503.

Anonymous:2004:Bk

[2334] Anonymous. In brief. Network Se-curity, 2004(11):3, November 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001527.

Anonymous:2004:ISL

[2335] Anonymous. IBM’s support for theLiberty Alliance brings standard con-vergence for federated identity a stepcloser. Network Security, 2004(11):3, 20, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001515.

Potter:2004:VIA

[2336] Bruce Potter. The value of Inter-net alerts. Network Security, 2004(11):4, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001539.

Young:2004:HRV

[2337] Dale Young. Human resourceshave a vital role to play withinemployee identity and access man-agement. Network Security, 2004(11):5–7, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001540.

Morgan:2004:DIH

[2338] David Morgan. Does IT hang to-gether? Network Security, 2004(11):8–10, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001552.

Vidalis:2004:ACT

[2339] Stilianos Vidalis, Andy Jones, andAndrew Blyth. Assessing cyber-

Page 301: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 301

threats in the information environ-ment. Network Security, 2004(11):10–16, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001564.

Kristensen:2004:MLW

[2340] Thomas Kristensen. Microsoftleaves Win2000, XPSP1 users inlurch. Network Security, 2004(11):16–17, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001576.

Shechtman:2004:DC

[2341] Katrin Shechtman. Divide and con-quer. Network Security, 2004(11):18–19, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001588.

Anonymous:2004:USA

[2342] Anonymous. USB sticks to be au-dited — no escape. Network Security,2004(11):20, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580400159X.

Anonymous:2004:GRD

[2343] Anonymous. Government regulationsdrive job demand. Network Security,2004(11):20, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001606.

Anonymous:2004:MSCb

[2344] Anonymous. MS source code fencebusted. Network Security, 2004(11):20, November 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001618.

Anonymous:2004:ECk

[2345] Anonymous. Events calendar. Net-work Security, 2004(11):20, November2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580400162X.

Anonymous:2004:VTS

[2346] Anonymous. Viruses in 2004 —technology stifles tenacious vari-ants. Network Security, 2004(12):1–2, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001631.

Anonymous:2004:SAF

[2347] Anonymous. Skewed audit files scup-per IDS. Network Security, 2004(12):3, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001643.

Anonymous:2004:CSF

[2348] Anonymous. Company spotlightsfive flaws that will be worms. Net-work Security, 2004(12):3, December

Page 302: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 302

2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001655.

Anonymous:2004:Bl

[2349] Anonymous. In brief. Network Se-curity, 2004(12):3–4, December 2004.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001667.

Anonymous:2004:YR

[2350] Anonymous. Year in review. Net-work Security, 2004(12):4, December2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001679.

Potter:2004:BBW

[2351] Bruce Potter. Big Boss is watching you— but should he? Network Security,2004(12):5–6, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001680.

Fumy:2004:ISS

[2352] Walter Fumy. IT security stan-dardisation. Network Security, 2004(12):6–11, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001692.

Morgan:2004:DE

[2353] David Morgan. Deploying ex-tranets? Network Security, 2004(12):12–14, December 2004. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001709.

Hunter:2004:TSP

[2354] Philip Hunter. Testing security prod-ucts. Network Security, 2004(12):15–16, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001710.

Knight:2004:MWD

[2355] William Knight. Mobile workingdrives switch to federated accessrights. Network Security, 2004(12):16–19, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001722.

Kristensen:2004:WSV

[2356] Thomas Kristensen. Winamp stillvulnerable. Network Security, 2004(12):19–20, December 2004. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485804001734.

McKenna:2004:NYM

[2357] Brian McKenna. New York mayor,Giuliani, says “be prepared”. Net-work Security, 2004(12):20, December2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001746.

Page 303: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 303

Anonymous:2004:ECl

[2358] Anonymous. Events calendar. Net-work Security, 2004(12):20, December2004. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485804001758.

Dudley-Gough:2005:WDC

[2359] Nova Dudley-Gough. Wave of de-ceit crashes on the charitable. Net-work Security, 2005(1):1, January2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805001765.

McKenna:2005:RSO

[2360] Brian McKenna. Reuters steps up out-sourced monitoring. Network Secu-rity, 2005(1):2, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001777.

McKenna:2005:SBV

[2361] Brian McKenna. Symantec buysVeritas to broaden enterprise ap-peal. Network Security, 2005(1):2–3, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001789.

Anonymous:2005:Ba

[2362] Anonymous. In brief. Network Secu-rity, 2005(1):3, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001790.

Hunter:2005:TSG

[2363] Philip Hunter. Tsunami spares globalIT but shakes up disaster recov-ery plans. Network Security, 2005(1):4–5, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001807.

Schultz:2005:IES

[2364] E. Eugene Schultz. Internet Explorersecurity: is there any hope? Net-work Security, 2005(1):6–10, January2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805001819.

Ionescu:2005:ESD

[2365] Ionut Ionescu. Embedded security andthe drivers behind it. Network Security,2005(1):10–13, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001820.

Morgan:2005:LLN

[2366] David Morgan. Low-level network as-sessment: firewalls. Network Security,2005(1):14–16, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001832.

Potter:2005:BBW

[2367] Bruce Potter. Is big boss watch-ing you? Network Security, 2005(1):17–18, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),

Page 304: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 304

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001844.

Kristensen:2005:MHT

[2368] Thomas Kristensen. More holes than aphishing net. Network Security, 2005(1):18–19, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001856.

Dwan:2005:PS

[2369] Berni Dwan. Pervasive spyware. Net-work Security, 2005(1):19, January2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805001868.

McKenna:2005:BBS

[2370] Brian McKenna. Bullish BritishSMEs poised to splash on IT se-curity. Network Security, 2005(1):20, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580500187X.

Dudley-Gough:2005:JBF

[2371] Nova Dudley-Gough. Jail for bug find-ing researcher? Network Security,2005(1):20, January 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001881.

Anonymous:2005:ECa

[2372] Anonymous. Events calendar. Net-work Security, 2005(1):20, January

2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805001893.

McKenna:2005:STP

[2373] Brian McKenna. Symantec’s Thomp-son pronounces old style IT secu-rity dead. Network Security, 2005(2):1, 3, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001947.

Anonymous:2005:MPF

[2374] Anonymous. Microsoft pushes fur-ther into anti-virus and anti-spywareterritory. Network Security, 2005(2):1–2, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580500190X.

Mathieson:2005:PDG

[2375] SA Mathieson. Profession drive gath-ers momentum. Network Security,2005(2):2, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001911.

Hilley:2005:CWS

[2376] Sarah Hilley. Cisco widens securityspan in network. Network Security,2005(2):2–3, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001923.

Page 305: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 305

McKenna:2005:GAS

[2377] Brian McKenna. Gates announcessecurity invasion. Network Security,2005(2):3, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001935.

Anonymous:2005:Bb

[2378] Anonymous. In brief. NetworkSecurity, 2005(2):3, February 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805001959.

Edelson:2005:VIS

[2379] Eve Edelson. Voice over IP: secu-rity pitfalls. Network Security, 2005(2):4–7, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001960.

Stanton:2005:GAS

[2380] Ray Stanton. Getting ahead insecurity. Network Security, 2005(2):8–10, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001972.

Kemp:2005:WIB

[2381] Mike Kemp. When ignorance isnot bliss. Network Security, 2005(2):10–12, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001984.

Knight:2005:WCH

[2382] William Knight. Worm cure is ahard act. Network Security, 2005(2):12–14, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805001996.

Potter:2005:BAS

[2383] Bruce Potter. Bluetooth attacks startto bite. Network Security, 2005(2):14–15, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580500200X.

Hunter:2005:MTV

[2384] Philip Hunter. Microsoft tack-les viruses and spyware at last,but will it be trusted on secu-rity? Network Security, 2005(2):16–17, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002011.

Pollard:2005:TFC

[2385] Craig Pollard. Telecom fraud: thecost of doing nothing just wentup. Network Security, 2005(2):17–19, February 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002023.

Kristensen:2005:IPA

[2386] Thomas Kristensen. IE patched af-ter ‘extremely critical’ warning. Net-work Security, 2005(2):19–20, February

Page 306: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 306

2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805002035.

Anonymous:2005:ECb

[2387] Anonymous. Events calendar. Net-work Security, 2005(2):20, February2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805002047.

Everett:2005:CEP

[2388] Cath Everett. CA exposure provokesdisclosure debate. Network Security,2005(3):1–3, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002059.

Anonymous:2005:UEV

[2389] Anonymous. US election-voting sys-tems blamed for Bush win. Network Se-curity, 2005(3):3, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002060.

Anonymous:2005:ILS

[2390] Anonymous. Ivy League schools barwanna-B students. Network Secu-rity, 2005(3):3, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002072.

Anonymous:2005:Bc

[2391] Anonymous. In brief. Network Secu-rity, 2005(3):3–4, March 2005. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002084.

McKenna:2005:CSJ

[2392] Brian McKenna. Close shave forJapanese bank. Network Security,2005(3):4, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002096.

Potter:2005:DUU

[2393] Bruce Potter. Dangerous urls: Uni-code & IDN. Network Security,2005(3):5–6, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002102.

Kemp:2005:BSC

[2394] Mike Kemp. Building security cred-ibility. Network Security, 2005(3):6–8, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002114.

Furnell:2005:AOW

[2395] Steven Furnell. Authenticating our-selves: will we ever escape the pass-word? Network Security, 2005(3):8–13, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002126.

Page 307: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 307

Heywood:2005:KYD

[2396] Mark Heywood. Keeping your dataavailable in 10 steps. Network Security,2005(3):14–16, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002138.

Gosling:2005:TSE

[2397] Paul Gosling. Trojans & spyware: anelectronic Achilles. Network Security,2005(3):17–18, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580500214X.

Mathieson:2005:MPT

[2398] SA Mathieson. Mobile phone trackingthreatens privacy. Network Security,2005(3):19–20, March 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805002151.

Anonymous:2005:ECc

[2399] Anonymous. Events calendar. Net-work Security, 2005(3):20, March2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805002163.

Anonymous:2005:TDD

[2400] Anonymous. Tips to defeat DDoS.Network Security, 2005(4):1–2, April2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702178.

McKenna:2005:QTC

[2401] Brian McKenna. Qualys ticks com-pliance box. Network Security,2005(4):2, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580570218X.

McKenna:2005:RHW

[2402] Brian McKenna. Russian hackersare world class. Network Secu-rity, 2005(4):3, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702191.

Anonymous:2005:Bd

[2403] Anonymous. In brief. Network Secu-rity, 2005(4):3, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702208.

Stanton:2005:ISP

[2404] Ray Stanton. Inside out security:de-perimeterisation. Network Secu-rity, 2005(4):4–6, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580570221X.

Stewart:2005:CAN

[2405] Andrew Stewart. A contempo-rary approach to network vulnera-bility assessment. Network Security,2005(4):7–10, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),

Page 308: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 308

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702221.

Hilley:2005:CRM

[2406] Sarah Hilley. Crypto race for math-ematical infinity. Network Security,2005(4):10–11, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702233.

Kemp:2005:BES

[2407] Mike Kemp. Biometrics: the eyeof the storm. Network Security,2005(4):11–13, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702245.

Hunter:2005:PSL

[2408] Philip Hunter. Proactive security lat-est: vendors wire the cage but has thebudgie flown . . . . Network Security,2005(4):14–15, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702257.

Dean:2005:MAS

[2409] Roger Dean. Management aspectsof secure messaging between orga-nizations. Network Security, 2005(4):16–17, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702269.

Potter:2005:RMU

[2410] Bruce Potter. RFID: misunderstoodor untrustworthy? Network Security,2005(4):17–18, April 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702270.

Grimes:2005:NSM

[2411] Galen A. Grimes. Network secu-rity managers’ preferences for theSnort IDS and GUI add-ons. Net-work Security, 2005(4):19–20, April2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702282.

Anonymous:2005:VFY

[2412] Anonymous. Vulnerabilities so farthis year — A-V, Oracle, media play-ers and Microsoft. Network Secu-rity, 2005(5):1–2, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702294.

McKenna:2005:CUI

[2413] Brian McKenna. Cisco unveils in-tegrated security appliance family.Network Security, 2005(5):2–3, May2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702300.

Anonymous:2005:CPU

[2414] Anonymous. Check Point upgradessecurity platform. Network Secu-rity, 2005(5):3, May 2005. CODEN

Page 309: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 309

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702312.

Anonymous:2005:Be

[2415] Anonymous. In brief. Network Secu-rity, 2005(5):3, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702324.

Licari:2005:BPI

[2416] Joe Licari. Best practices for instantmessaging in business. Network Secu-rity, 2005(5):4–7, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702336.

Ernest-Jones:2005:UNS

[2417] Terry Ernest-Jones. US National Sci-ence Foundation: $19m security re-search programme. Network Secu-rity, 2005(5):8–9, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702348.

Beal:2005:ISP

[2418] Barry Beal. IT security: the prod-uct vendor landscape. Network Secu-rity, 2005(5):9–10, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580570235X.

Marteau:2005:MXS

[2419] Laurent Marteau. Mac OS X & secu-rity — an overview. Network Security,2005(5):11–13, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702361.

Potter:2005:ISN

[2420] Bruce Potter. IT security needshierarchy. Network Security, 2005(5):14–15, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702373.

Kemp:2005:WBT

[2421] Mike Kemp. For whom thebells toll: effective IDS deploy-ment strategies. Network Security,2005(5):16–18, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702385.

Sidaway:2005:RRB

[2422] Garry Sidaway. The rise and riseof bot networks. Network Security,2005(5):19–20, May 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702397.

Anonymous:2005:ECd

[2423] Anonymous. Events calendar. Net-work Security, 2005(5):20, May 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 310: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 310

URL http://www.sciencedirect.

com/science/article/pii/S1353485805702403.

Mathieson:2005:UCR

[2424] SA Mathieson. UK crypto regu-lation option dies. Network Secu-rity, 2005(6):2, June 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702415.

Anonymous:2005:ISP

[2425] Anonymous. IT security profession-als devil-may-care about USB sticks.Network Security, 2005(6):2, June2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702427.

McKenna:2005:DDI

[2426] Brian McKenna. Dorothy Den-ning on infosec and physical secu-rity. Network Security, 2005(6):3, June2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702439.

Anonymous:2005:Bf

[2427] Anonymous. In brief. Network Secu-rity, 2005(6):3, June 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702440.

Simmonds:2005:UFB

[2428] Paul Simmonds. Users fight backby breaking the boundaries. Net-work Security, 2005(6):4–6, June 2005.

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702452.

Rowan:2005:SWS

[2429] Lannon Rowan. Security in a Webservices world. Network Security,2005(6):7–10, June 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702464.

Kemp:2005:BIG

[2430] Mike Kemp. Barbarians inside thegates: addressing internal securitythreats. Network Security, 2005(6):11–13, June 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702476.

Potter:2005:WVA

[2431] Bruce Potter. Wireless vulnerabil-ity assessment. Network Security,2005(6):14–15, June 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702488.

Kay:2005:LVV

[2432] James Kay. Low volume viruses: newtools for criminals. Network Security,2005(6):16–18, June 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580570249X.

Page 311: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 311

Lambert:2005:BS

[2433] Martin Lambert. Blackberry se-curity. Network Security, 2005(6):18–20, June 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702506.

Anonymous:2005:ECe

[2434] Anonymous. Events calendar. Net-work Security, 2005(6):20, June 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702518.

Anonymous:2005:USP

[2435] Anonymous. US state police leadersconfront CardSystems. Network Secu-rity, 2005(7):1, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580570252X.

McKenna:2005:CTA

[2436] Brian McKenna. Cyber-terroristassault will happen, says Conser-vative MP. Network Security,2005(7):2, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702531.

McKenna:2005:CCD

[2437] Brian McKenna. Credit card de-tails in the clear and up forsale in India. Network Security,2005(7):2, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702543.

McKenna:2005:BSS

[2438] Brian McKenna. Bank startsto sell PKI. Network Security,2005(7):3, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702555.

Anonymous:2005:Bg

[2439] Anonymous. In brief. Network Secu-rity, 2005(7):3, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702567.

Potter:2005:QCS

[2440] Bruce Potter. Quantum crypto: Startrek or real science? Network Secu-rity, 2005(7):4–5, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702579.

Furnell:2005:ITE

[2441] Steven Furnell. Internet threatsto end-users: Hunting easy prey.Network Security, 2005(7):5–9, July2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702580.

Stuttard:2005:SO

[2442] Dafydd Stuttard. Security & ob-scurity. Network Security, 2005(7):10–12, July 2005. CODEN

Page 312: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 312

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702592.

Rowe:2005:VET

[2443] Paul Rowe. VOIP — extra threatsin the converged environment. Net-work Security, 2005(7):12–16, July2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702609.

OConor:2005:ISO

[2444] Mark O’Conor. The implications ofSarbanes–Oxley for non-US IT de-partments. Network Security, 2005(7):17–20, July 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702610.

Anonymous:2005:ECf

[2445] Anonymous. Events calendar. Net-work Security, 2005(7):20, July 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702622.

McKenna:2005:NSA

[2446] Brian McKenna. New Symantecto avoid “over integration”. Net-work Security, 2005(8):2, August2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702634.

McKenna:2005:ECB

[2447] Brian McKenna. Enterasys CTOblasts Cisco and ISS over hole con-troversy. Network Security, 2005(8):2, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702646.

Anonymous:2005:BWB

[2448] Anonymous. Bidding war for bughunter rewards. Network Security,2005(8):3, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702658.

Anonymous:2005:Bh

[2449] Anonymous. In brief. NetworkSecurity, 2005(8):3–4, August 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580570266X.

Everett:2005:GN

[2450] Cath Everett. Godfathers of thenet. Network Security, 2005(8):4–20, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702671.

Ernest-Jones:2005:BCS

[2451] Terry Ernest-Jones. Business conti-nuity strategy — the life line. Net-work Security, 2005(8):5–9, August2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 313: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 313

URL http://www.sciencedirect.

com/science/article/pii/S1353485805702683.

Bertrand:2005:BCM

[2452] Christophe Bertrand. Business con-tinuity and mission critical appli-cations. Network Security, 2005(8):9–11, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702695.

McKenna:2005:DDL

[2453] Brian McKenna. Dig deep and looksideways. Network Security, 2005(8):12–13, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702701.

Kemp:2005:BTS

[2454] Mike Kemp and Michael Kemp. Be-yond trust: security policies anddefence-in-depth. Network Security,2005(8):14–16, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702713.

Potter:2005:SNC

[2455] Bruce Potter. Securing the network:changing priorities. Network Security,2005(8):16–17, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702725.

Bradbury:2005:BBF

[2456] Danny Bradbury. Bits and bridlesfor free speech. Network Security,2005(8):17–19, August 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702737.

Anonymous:2005:ECg

[2457] Anonymous. Events calendar. Net-work Security, 2005(8):20, August2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702749.

Anonymous:2005:FAY

[2458] Anonymous. FBI arrests youngTurk and Moroccan for Zotob. Net-work Security, 2005(9):1–2, September2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702750.

OHalloran:2005:ZV

[2459] Joe O’Halloran. Zotob and VoIP. Net-work Security, 2005(9):2–20, Septem-ber 2005. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485805702762.

Anonymous:2005:URI

[2460] Anonymous. US researchers to in-vent new Internet. Network Security,2005(9):3, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702774.

Page 314: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 314

Anonymous:2005:Bi

[2461] Anonymous. In brief. Network Se-curity, 2005(9):3, September 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702786.

Forte:2005:LME

[2462] Dario Forte. Log management foreffective incident response. Net-work Security, 2005(9):4–7, September2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702798.

Potter:2005:PD

[2463] Bruce Potter. Are passwordsdead? Network Security, 2005(9):7–8, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702804.

Morgan:2005:FPF

[2464] David Morgan. Fool-proofing fire-walls. Network Security, 2005(9):9–11, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702816.

Wood:2005:IIM

[2465] Peter Wood. Implementing identitymanagement security — an ethicalhacker’s view. Network Security, 2005(9):12–15, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702828.

Sullivan:2005:CFI

[2466] Roger K. Sullivan. The case for feder-ated identity. Network Security, 2005(9):15–19, September 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580570283X.

Anonymous:2005:ECh

[2467] Anonymous. Events calendar. Net-work Security, 2005(9):20, September2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702841.

Mathieson:2005:GPH

[2468] SA Mathieson. Gone phishing inHalifax. Network Security, 2005(10):2, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702853.

Anonymous:2005:MOP

[2469] Anonymous. Microsoft’s Octoberpatch-fest causes pain. Network Se-curity, 2005(10):2–20, October 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702865.

Anonymous:2005:Bj

[2470] Anonymous. In brief. NetworkSecurity, 2005(10):3, October 2005.

Page 315: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 315

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702877.

Pemble:2005:ETB

[2471] Matthew Pemble. Evolutionarytrends in bank customer-targetedmalware. Network Security, 2005(10):4–7, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702889.

Dunn:2005:DYD

[2472] Kev Dunn. Dig yourself out ofthe data crater — database secu-rity isn’t new, so why can’t we getit right? Network Security, 2005(10):7–10, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702890.

Potter:2005:EZD

[2473] Bruce Potter. The end of zerodays? Network Security, 2005(10):10–11, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702907.

Hallam-Baker:2005:PSN

[2474] Phillip Hallam-Baker. Preventionstrategies for the next wave of cy-ber crime. Network Security, 2005(10):12–15, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702919.

Whitworth:2005:OSB

[2475] Martin Whitworth. Outsourced secu-rity — the benefits and risks. NetworkSecurity, 2005(10):16–19, October2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702920.

Anonymous:2005:QWC

[2476] Anonymous. QualysGuard to workwith Cisco NAC. Network Security,2005(10):20, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702932.

Anonymous:2005:LTH

[2477] Anonymous. Lloyds TSB hook up30,000 customers to anti-phishingtoken. Network Security, 2005(10):20, October 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702944.

Anonymous:2005:ECi

[2478] Anonymous. Events calendar. Net-work Security, 2005(10):20, October2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702956.

Anonymous:2005:MIS

[2479] Anonymous. Microsoft investi-gates spammers with trick com-puter. Network Security, 2005(11):

Page 316: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 316

1–2, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702968.

McKenna:2005:ELE

[2480] Brian McKenna. Espionage-linked ex-ploits grow in threat potential. Net-work Security, 2005(11):2, November2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580570297X.

Mathieson:2005:AIS

[2481] SA Mathieson. DoS attack not illegal,says London judge. Network Security,2005(11):2–3, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805702981.

Anonymous:2005:Bk

[2482] Anonymous. In brief. NetworkSecurity, 2005(11):3, 20, November2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805702993.

Crosbie:2005:BES

[2483] Mark Crosbie. Biometrics for enter-prise security. Network Security, 2005(11):4–8, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703007.

Davis:2005:RSI

[2484] Adrian Davis. Return on secu-rity investment — proving it’s worthit. Network Security, 2005(11):8–10, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703019.

Morgan:2005:ESP

[2485] David Morgan. The evolution of secu-rity purchasing. Network Security, 2005(11):11–12, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703020.

Keanini:2005:PTI

[2486] Tim Keanini. Protecting TCP/IP. Network Security, 2005(11):13–16, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703032.

Viveros:2005:CMT

[2487] Sal Viveros. Changing malwarethreats — AV vendor’s view. NetworkSecurity, 2005(11):16–18, November2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805703044.

Potter:2005:LSV

[2488] Bruce Potter. Layer 2 security: invogue. Network Security, 2005(11):18–20, November 2005. CODENNTSCF5. ISSN 1353-4858 (print),

Page 317: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 317

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703056.

Anonymous:2005:ECj

[2489] Anonymous. Events calendar. Net-work Security, 2005(11):20, November2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805703068.

Anonymous:2005:MSP

[2490] Anonymous. Microsoft start play-ing hardball with anti-virus. Net-work Security, 2005(12):1–2, December2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580570307X.

McKenna:2005:ISV

[2491] Brian McKenna. Internal systemvulnerabilities poorly patched. Net-work Security, 2005(12):2, December2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805703081.

Anonymous:2005:SWR

[2492] Anonymous. Sober worm returnsas largest outbreak of 2005. Net-work Security, 2005(12):2, December2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805703093.

Anonymous:2005:Bl

[2493] Anonymous. In brief. Network Se-curity, 2005(12):3, December 2005.

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580570310X.

Sunner:2005:ESB

[2494] Mark Sunner. Email security bestpractice. Network Security, 2005(12):4–7, December 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703111.

Forte:2005:SMT

[2495] Dario Forte. Spyware: more thana costly annoyance. Network Secu-rity, 2005(12):8–10, December 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805703123.

Starkins:2005:OSN

[2496] Graham Starkins. Outside thesafety net — communicating be-yond traditional network bound-aries. Network Security, 2005(12):10–12, December 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703135.

Newson:2005:NTV

[2497] Alan Newson. Network threats andvulnerability scanners. Network Secu-rity, 2005(12):13–15, December 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805703147.

Page 318: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 318

Voice:2005:OAM

[2498] Chris Voice. Online authentica-tion: matching security levels to therisk. Network Security, 2005(12):15–18, December 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703159.

Potter:2005:SSI

[2499] Bruce Potter. Safe and secure in-frastructure upgrades. Network Secu-rity, 2005(12):19–20, December 2005.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805703160.

Anonymous:2005:SPC

[2500] Anonymous. Spam and phish arecoming to town. Network Security,2005(12):20, December 2005. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485805703172.

Anonymous:2005:ECk

[2501] Anonymous. Events calendar. Net-work Security, 2005(12):20, December2005. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485805703184.

Mathieson:2006:AUF

[2502] SA Mathieson. Apps under fire. Net-work Security, 2006(1):1–2, January2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703191.

Anonymous:2006:Ba

[2503] Anonymous. In brief. Network Secu-rity, 2006(1):3, January 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703208.

Furnell:2006:RPS

[2504] Steven Furnell and Leith Zekri. Re-placing passwords: in search of thesecret remedy. Network Security,2006(1):4–8, January 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580670321X.

Rowan:2006:SCN

[2505] Lannon Rowan. Securing con-verged networks — pitfalls and pro-cedures. Network Security, 2006(1):8–10, January 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703221.

Philpott:2006:ITD

[2506] Andrew Philpott. Identity theft— dodging the own-goals. Net-work Security, 2006(1):11–13, January2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703233.

Macleod:2006:PTO

[2507] Calum Macleod. The passwordthat’s overstayed its welcome. Net-work Security, 2006(1):13–15, January2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 319: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 319

URL http://www.sciencedirect.

com/science/article/pii/S1353485806703245.

Potter:2006:OSF

[2508] Bruce Potter. Open source firewallalternatives. Network Security, 2006(1):16–17, January 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703257.

Heasman:2006:RT

[2509] John Heasman. Rootkit threats. Net-work Security, 2006(1):18–19, January2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703269.

OHalloran:2006:SAS

[2510] Joe O’Halloran. Skype — an attacksurface here to stay. Network Security,2006(1):20, January 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703270.

Anonymous:2006:ECa

[2511] Anonymous. Events calendar. Net-work Security, 2006(1):20, January2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703282.

Anonymous:2006:SSN

[2512] Anonymous. Spyware spikes in north-ern Europe. Network Security, 2006(2):1–2, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703294.

Mathieson:2006:FTO

[2513] SA Mathieson. Fine-tuning forOlympic IT security. Network Security,2006(2):2, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703300.

McKenna:2006:GMC

[2514] Brian McKenna. Gates and Mc-Neally commit to sharing on Valen-tine’s Day. Network Security, 2006(2):2, 20, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703312.

Anonymous:2006:Bb

[2515] Anonymous. In brief. NetworkSecurity, 2006(2):3, February 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703324.

Potter:2006:NTA

[2516] Bruce Potter. New threat of Ap-ple Mac OS X. Network Security,2006(2):4–5, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703336.

Wood:2006:HTF

[2517] Peter Wood. The hacker’s top fiveroutes into the network (and how

Page 320: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 320

to block them). Network Security,2006(2):5–9, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703348.

Morgan:2006:RMG

[2518] David Morgan. Risk management— getting properly valued. Net-work Security, 2006(2):10–11, February2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580670335X.

Stevens:2006:UOS

[2519] Mark Stevens. UTM: one-stop pro-tection. Network Security, 2006(2):12–14, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703361.

Johnson:2006:SAS

[2520] Everett C. Johnson. Security aware-ness: switch to a better pro-gramme. Network Security, 2006(2):15–18, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703373.

Cassidy:2006:NPS

[2521] Darren Cassidy. Network printing secu-rity — getting to grips with the multi-function device. Network Security, 2006(2):19–20, February 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703385.

Anonymous:2006:ECb

[2522] Anonymous. Events calendar. Net-work Security, 2006(2):20, February2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703397.

Mathieson:2006:JLM

[2523] SA Mathieson. John Lewis monitorsmoves on CCTV. Network Security,2006(3):1–2, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703403.

Anonymous:2006:ICB

[2524] Anonymous. ISS’s CTO on 2006— botnet armies and security ser-vices online. Network Security, 2006(3):2, 20, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703415.

Anonymous:2006:Bc

[2525] Anonymous. In brief. Network Secu-rity, 2006(3):3, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703427.

Furnell:2006:UPW

[2526] Steven Furnell and Bogdan Ghita.Usability pitfalls in wireless LANsecurity. Network Security, 2006(3):4–8, March 2006. CODEN

Page 321: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 321

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703439.

Morgan:2006:WIA

[2527] David Morgan. Web injection at-tacks. Network Security, 2006(3):8–10, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703440.

Waite:2006:SOB

[2528] Steve Waite. Securing online busi-ness with SSL. Network Security,2006(3):10–12, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703452.

McGurk:2006:SDS

[2529] Ian McGurk. Stealing data on smalldevices — tools to wipe out the iPodpredator. Network Security, 2006(3):13–16, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703464.

Frost:2006:VTG

[2530] Nick Frost. VoIP threats — get-ting louder. Network Security, 2006(3):16–18, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703476.

Potter:2006:BSM

[2531] Bruce Potter. Bluetooth securitymoves. Network Security, 2006(3):19–20, March 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703488.

Anonymous:2006:ECc

[2532] Anonymous. Events calendar. Net-work Security, 2006(3):20, March2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580670349X.

Anonymous:2006:UBC

[2533] Anonymous. UK business carelesswith online data. Network Security,2006(4):1–2, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703506.

Hilley:2006:HSO

[2534] Sarah Hilley. HSBC to secure onlinebusiness customers. Network Secu-rity, 2006(4):2, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703518.

Anonymous:2006:Bd

[2535] Anonymous. In brief. Network Secu-rity, 2006(4):3, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580670352X.

Page 322: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 322

Morgan:2006:WAS

[2536] David Morgan. Web applica-tion security — SQL injection at-tacks. Network Security, 2006(4):4–5, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703531.

Khokhar:2006:SCB

[2537] Rafael Khokhar. Smartphones —a call for better safety on themove. Network Security, 2006(4):6–7, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703543.

Rana:2006:SVOa

[2538] Omer Rana and Jeremy Hilton. Se-curing the virtual organization —Part 1: Requirements from gridcomputing. Network Security, 2006(4):7–10, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703555.

Whitworth:2006:VCB

[2539] Martin Whitworth. VoIP — a call forbetter protection. Network Security,2006(4):11–12, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703567.

delaCuadra:2006:ASB

[2540] Fernando de la Cuadra. The artof security budgeting — a new

structure. Network Security, 2006(4):12–15, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703579.

Potter:2006:UEH

[2541] Bruce Potter. User education —how valid is it? Network Security,2006(4):15–16, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703580.

Forte:2006:KSI

[2542] Dario Forte. Keeping up to stan-dard — incident management inISO 17799. Network Security, 2006(4):16–17, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703592.

Henry:2006:TFA

[2543] Paul A. Henry. Two-factor au-thentication — a look behind theheadlines. Network Security, 2006(4):18–19, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703609.

Anonymous:2006:FCI

[2544] Anonymous. Fix for critical IE flaw.Network Security, 2006(4):20, April2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703622.

Page 323: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 323

Anonymous:2006:SBT

[2545] Anonymous. Small botnets are threat.Network Security, 2006(4):20, April2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703634.

Anonymous:2006:ECd

[2546] Anonymous. Events calendar. Net-work Security, 2006(4):20, April 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703646.

Hilley:2006:SSD

[2547] Sarah Hilley. Secret Service dis-mantles web forums. Network Secu-rity, 2006(4):20, April 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703610.

Anonymous:2006:NMS

[2548] Anonymous. New McAfee study re-veals risk of using search engines.Network Security, 2006(5):1–2, May2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703798.

Anonymous:2006:HE

[2549] Anonymous. Hacker to be extradited.Network Security, 2006(5):2, May2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703804.

Anonymous:2006:MWS

[2550] Anonymous. Mac and Windowssystems at risk. Network Secu-rity, 2006(5):2, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703816.

Anonymous:2006:MMC

[2551] Anonymous. Money makes e-crimego round. Network Security, 2006(5):2, 20, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703828.

Anonymous:2006:Be

[2552] Anonymous. In brief. Network Secu-rity, 2006(5):3, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580670383X.

Bergman:2006:SBN

[2553] Alisa Bergman and Agnieszka Ver-let. Security breaches: to no-tify or not to notify — that isthe question. Network Security,2006(5):4–6, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703841.

Rana:2006:SVOb

[2554] Omer Rana and Jeremy Hilton.Securing the virtual organization,Part 2 — grid computing in ac-tion. Network Security, 2006

Page 324: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 324

(5):6–10, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703853.

Spencer:2006:VAD

[2555] Dave Spencer. Vulnerability analy-sis — discovery to disclosure. Net-work Security, 2006(5):11–12, May2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703865.

Surgenor:2006:SRS

[2556] Valerie Surgenor. Setting the recordsstraight . . . and staying on the rightside of the law. Network Security,2006(5):13–15, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703877.

Walker:2006:BCO

[2557] Alan Walker. Business continuityand outsourcing — moves to takeout the risk. Network Security,2006(5):15–17, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703889.

Potter:2006:TTA

[2558] Bruce Potter. The times they area’changing: trends that impact se-curity strategy. Network Security,2006(5):18–19, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703890.

Murton:2006:CGH

[2559] Daniel Murton. Crypto goes to theheart. Network Security, 2006(5):19, May 2006. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485806703907.

Anonymous:2006:ECe

[2560] Anonymous. Events calendar. Net-work Security, 2006(5):20, May 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703919.

Anonymous:2006:SQE

[2561] Anonymous. Success for quantumencryption? Network Security,2006(5):20, May 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703920.

Hilley:2006:FYC

[2562] Sarah Hilley. Five years for Cal-ifornian botmaster. Network Secu-rity, 2006(6):1–2, June 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703932.

McKenna:2006:RWS

[2563] Brian McKenna. Real world se-curity model for infosec, says Mi-crosoft security guru. Network Secu-rity, 2006(6):2, June 2006. CODEN

Page 325: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 325

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703944.

Anonymous:2006:TUP

[2564] Anonymous. Trojan uses pornogra-phy trap to steal bank details. Net-work Security, 2006(6):2, 20, June2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703956.

Anonymous:2006:Bf

[2565] Anonymous. In brief. Network Secu-rity, 2006(6):3, June 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806703968.

Emm:2006:FTH

[2566] David Emm. Focus on Trojans — hold-ing data to ransom. Network Secu-rity, 2006(6):4–7, June 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580670397X.

Forte:2006:EPS

[2567] Dario Forte. Endpoint and perime-ter security: a new symbiosis. Net-work Security, 2006(6):7–8, June 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703981.

Ernest-Jones:2006:PSP

[2568] Terry Ernest-Jones. Pinning downa security policy for mobile data.

Network Security, 2006(6):8–12, June2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806703993.

Crosbie:2006:TCC

[2569] Mark Crosbie. Trusted computing —closing that lingering doubt. Net-work Security, 2006(6):13–15, June2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704007.

Morgan:2006:MSW

[2570] David Morgan. Maintaining state inWeb applications. Network Security,2006(6):16–18, June 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704019.

McKewan:2006:BZG

[2571] Andy McKewan. Botnets — zom-bies get smarter. Network Security,2006(6):18–20, June 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704020.

Anonymous:2006:ECf

[2572] Anonymous. Events calendar. Net-work Security, 2006(6):20, June 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704032.

Page 326: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 326

Anonymous:2006:ABS

[2573] Anonymous. Is Apple the best se-curity of all? Network Security,2006(7):1–2, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704044.

Anonymous:2006:GWE

[2574] Anonymous. Germany wins theEuropean Cup. Network Security,2006(7):2, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704056.

Anonymous:2006:TUW

[2575] Anonymous. Theft of 26.5m US warveterans’ details. Network Security,2006(7):2, 20, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704068.

Anonymous:2006:Bg

[2576] Anonymous. In brief. Network Secu-rity, 2006(7):3, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580670407X.

OSullivan:2006:IMV

[2577] Shirley O’Sullivan. Instant Messagingvs. instant compromise. Network Secu-rity, 2006(7):4–6, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704081.

Alcorn:2006:CSS

[2578] Wade Alcorn. Cross-site script-ing viruses and worms — a newattack vector. Network Security,2006(7):7–8, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704093.

Watson:2006:SPS

[2579] Ian Watson. Securing portablestorage devices. Network Security,2006(7):8–11, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580670410X.

Small:2006:USR

[2580] Mike Small. Unify and sim-plify: re-thinking identity man-agement. Network Security, 2006(7):11–14, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704111.

Gordon-Smith:2006:VMP

[2581] Matt Gordon-Smith and StephenWing. VoIP and multimedia pro-tocols in wireless and firewalled en-vironments. Network Security, 2006(7):14–17, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704123.

Bech:2006:SLD

[2582] Soeren Bech. Shedding light on darktraffic attacks. Network Security,

Page 327: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 327

2006(7):17–19, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704135.

Anonymous:2006:DSW

[2583] Anonymous. Data security worriesstill top the list. Network Secu-rity, 2006(7):20, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704147.

Anonymous:2006:JHD

[2584] Anonymous. Just 12% of handhelddevices encrypted. Network Secu-rity, 2006(7):20, July 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704159.

Anonymous:2006:ECg

[2585] Anonymous. Events calendar. Net-work Security, 2006(7):20, July 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704160.

Anonymous:2006:Bh

[2586] Anonymous. In brief. Network Secu-rity, 2006(8):2, August 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704287.

Lamb:2006:SFW

[2587] Stephen Lamb. Security featuresin Windows Vista and IE7 — Mi-

crosoft’s view. Network Security,2006(8):3–7, August 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704299.

Broomfield:2006:NAD

[2588] Mike Broomfield. NTFS AlternateData Streams: focused hacking. Net-work Security, 2006(8):7–9, August2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704305.

Furnell:2006:SMD

[2589] Steven Furnell. Securing mo-bile devices: technology and at-titude. Network Security, 2006(8):9–13, August 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704317.

Emm:2006:PUH

[2590] David Emm. Phishing update, andhow to avoid getting hooked. Net-work Security, 2006(8):13–15, August2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704329.

Mueller:2006:WHB

[2591] Lance Mueller. Webjacking, and howto boot it out. Network Security,2006(8):15–18, August 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704330.

Page 328: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 328

Marsanu:2006:VCM

[2592] Michael Marsanu. VoIP: carrying themost sensitive data? Network Security,2006(8):19–20, August 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704342.

Anonymous:2006:ECh

[2593] Anonymous. Events calendar. Net-work Security, 2006(8):20, August2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704354.

Anonymous:2006:UTB

[2594] Anonymous. Upturn in Trojansand bots. Network Security, 2006(9):1–2, September 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704172.

Anonymous:2006:NMV

[2595] Anonymous. No more the virus. Net-work Security, 2006(9):2, September2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704184.

Anonymous:2006:Bi

[2596] Anonymous. In brief. Network Se-curity, 2006(9):3, September 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704196.

Powell:2006:TWW

[2597] Graeme Powell. ‘Tmobile’ — wising upto wireless exposure. Network Security,2006(9):4–6, September 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704202.

Ernest-Jones:2006:TAS

[2598] Terry Ernest-Jones. Threat analysis —stretching the limits. Network Security,2006(9):6–8, September 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704214.

Byrne:2006:AFD

[2599] Paul Byrne. Application fire-walls in a defence-in-depth de-sign. Network Security, 2006(9):9–11, September 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704226.

Titmus:2006:SIT

[2600] Peter Titmus. Securing IP telephonysystems — best practices. NetworkSecurity, 2006(9):11–13, September2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704238.

Solterbeck:2006:PDR

[2601] Andy Solterbeck. Protecting dataat rest and in motion. NetworkSecurity, 2006(9):14–17, September2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 329: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 329

URL http://www.sciencedirect.

com/science/article/pii/S135348580670424X.

Braganza:2006:CSS

[2602] Richard Braganza. Cross-site script-ing — an alternative view. NetworkSecurity, 2006(9):17–20, September2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704251.

Anonymous:2006:IBI

[2603] Anonymous. IBM brings ISS intothe family. Network Security, 2006(9):20, September 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704263.

Anonymous:2006:ECi

[2604] Anonymous. Events calendar. Net-work Security, 2006(9):20, September2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704275.

Anonymous:2006:MFI

[2605] Anonymous. Microsoft to the fore atISSE 2006. Network Security, 2006(10):1–2, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704366.

Anonymous:2006:SVB

[2606] Anonymous. Security vendors barredfrom Microsoft’s Vista. NetworkSecurity, 2006(10):2, October 2006.

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704378.

Anonymous:2006:Bj

[2607] Anonymous. In brief. NetworkSecurity, 2006(10):3, October 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580670438X.

Forte:2006:SIR

[2608] Dario Forte. Sharpening incidentresponse. Network Security, 2006(10):4–5, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704391.

Marsanu:2006:SSP

[2609] Michael Marsanu. Is size still a problemfor wireless LANs? Network Security,2006(10):6–8, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704408.

Surgenor:2006:PDS

[2610] Valerie Surgenor. The price of datasharing. Network Security, 2006(10):8–10, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580670441X.

Boyd:2006:RBK

[2611] Chris Boyd. Rogue browsers — keep-ing Browsezilla & Co at bay. Network

Page 330: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 330

Security, 2006(10):11–12, October2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704421.

Williams:2006:CMW

[2612] Paul Williams. Cappuccino, muf-fin, WiFi — but what about thesecurity? Network Security, 2006(10):13–17, October 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704433.

Murfitt:2006:CTI

[2613] Martin Murfitt. The case for atiered internal network. Network Se-curity, 2006(10):17–20, October 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704445.

Anonymous:2006:ECj

[2614] Anonymous. Events calendar. Net-work Security, 2006(10):20, October2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704457.

Anonymous:2006:BBC

[2615] Anonymous. BT buys counter-pane to boost IT security ser-vices. Network Security, 2006(11):1–2, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704469.

McKenna:2006:SIP

[2616] Brian McKenna. Senior infosec prosshift gears from technology to man-agement. Network Security, 2006(11):2, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704470.

Anonymous:2006:SNS

[2617] Anonymous. ‘Social networking’study shows cybercrime risk. Net-work Security, 2006(11):2, November2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704482.

Anonymous:2006:Bk

[2618] Anonymous. In brief. Network Se-curity, 2006(11):3, November 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704494.

Emm:2006:MMN

[2619] David Emm. Mobile malware —new avenues. Network Security, 2006(11):4–6, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704500.

Furnell:2006:SHW

[2620] Steven Furnell and Network Re-search Group. Securing the homeworker. Network Security, 2006(11):6–12, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),

Page 331: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 331

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704512.

Wood:2006:SUW

[2621] Peter Wood. In search of the un-crackable Windows password. NetworkSecurity, 2006(11):12–13, November2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704524.

Peacey:2006:TES

[2622] Angus Peacey. Teleworkers —extending security beyond the of-fice. Network Security, 2006(11):14–16, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704536.

Potter:2006:CFI

[2623] Bruce Potter. The changing face ofIT security. Network Security, 2006(11):16–17, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704548.

Dunn:2006:PLP

[2624] Kev Dunn. Poor lockdown prac-tices pave the way to the domaincontroller. Network Security, 2006(11):18–20, November 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580670455X.

Anonymous:2006:ECk

[2625] Anonymous. Events calendar. Net-work Security, 2006(11):20, November2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704561.

Anonymous:2006:IMR

[2626] Anonymous. 81% of IT managers re-port greynet incidents. Network Se-curity, 2006(12):2, December 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704573.

Anonymous:2006:BBS

[2627] Anonymous. Botnets behind spamsurge. Network Security, 2006(12):2, 20, December 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704585.

Anonymous:2006:Bl

[2628] Anonymous. In brief. Network Se-curity, 2006(12):3, December 2006.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704597.

Dean:2006:IMB

[2629] Roger Dean. Identity management —back to the user. Network Security,2006(12):4–7, December 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704603.

Page 332: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 332

Neuenschwander:2006:IMM

[2630] Mike Neuenschwander. Identity man-agement market shifts — who’s outthere? Network Security, 2006(12):7–10, December 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704615.

Perry:2006:NFI

[2631] Simon Perry. Network forensics andthe inside job. Network Security, 2006(12):11–13, December 2006. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704627.

Potter:2006:CKM

[2632] Bruce Potter. Cryptographic key man-agement for the masses. NetworkSecurity, 2006(12):13–14, December2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704639.

Best:2006:EBT

[2633] Tim Best. Eying up biometrics —time to go multimodal? NetworkSecurity, 2006(12):15–17, December2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704640.

Matthews:2006:SCA

[2634] Adam Matthews. Side-channel attackson smartcards. Network Security, 2006(12):18–20, December 2006. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485806704652.

Anonymous:2006:ECl

[2635] Anonymous. Events calendar. Net-work Security, 2006(12):20, December2006. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485806704664.

Anonymous:2007:UGD

[2636] Anonymous. UK Government dropssingle-database ID registry. Net-work Security, 2007(1):1–2, January2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700016.

Anonymous:2007:PIU

[2637] Anonymous. Phishing increases asusers get wise. Network Security,2007(1):2, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700028.

Anonymous:2007:Ba

[2638] Anonymous. In brief. Network Secu-rity, 2007(1):3, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580770003X.

Watson:2007:HTC

[2639] David Watson. Honeynets: a toolfor counterintelligence in online se-curity. Network Security, 2007(1):4–8, January 2007. CODEN

Page 333: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 333

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700041.

Heron:2007:WBH

[2640] Simon Heron. Working the botnet:how dynamic DNS is revitalising thezombie army. Network Security, 2007(1):9–11, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700053.

Kinge:2007:FSU

[2641] Steve Kinge. Freedom of speech: Us-ing speech biometrics for user ver-ification. Network Security, 2007(1):12–14, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700065.

Forte:2007:SSI

[2642] Dario Forte. Security standardiza-tion in incident management: the ITILapproach. Network Security, 2007(1):14–16, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700077.

Potter:2007:RVB

[2643] Bruce Potter. Running Vista — bigOS, big change. Network Security,2007(1):17–18, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700089.

Casey:2007:BSI

[2644] Donal Casey. Building a se-cure instant messaging environ-ment. Network Security, 2007(1):18–20, January 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700090.

Anonymous:2007:ECa

[2645] Anonymous. Events calendar. Net-work Security, 2007(1):20, January2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700107.

Anonymous:2007:STU

[2646] Anonymous. Security through un-certainty. Network Security, 2007(2):1, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700119.

Anonymous:2007:PTC

[2647] Anonymous. Pen test certifications pre-pare to compete. Network Security,2007(2):1–2, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700120.

Anonymous:2007:RNS

[2648] Anonymous. Root name servers comeunder attack. Network Security,2007(2):2, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),

Page 334: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 334

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700132.

Anonymous:2007:PWT

[2649] Anonymous. Peacomm worm takesnet by surprise. Network Security,2007(2):2, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700144.

Anonymous:2007:Bb

[2650] Anonymous. In brief. NetworkSecurity, 2007(2):3, February 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700156.

Harrison:2007:STU

[2651] Keith Harrison, Bill Munro, andTim Spiller. Security through un-certainty. Network Security, 2007(2):4–7, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700168.

Fafinski:2007:SRP

[2652] Stefan Fafinski. The security ram-ifications of the Police and JusticeAct 2006. Network Security, 2007(2):8–11, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580770017X.

Potter:2007:WDG

[2653] Bruce Potter. The widening disclo-sure gap. Network Security, 2007(2):11–12, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700181.

Davis:2007:AAA

[2654] Adrian Davis. Authentication acrossthe airwaves. Network Security, 2007(2):13–19, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700193.

Forte:2007:NED

[2655] Dario Forte. The negative effects of e-discovery rules. Network Security, 2007(2):19–20, February 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580770020X.

Anonymous:2007:ECb

[2656] Anonymous. Events calendar. Net-work Security, 2007(2):20, February2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700211.

Anonymous:2007:VSV

[2657] Anonymous. Vista security ver-dicts roll in. Network Security,2007(3):1–2, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700223.

Page 335: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 335

Anonymous:2007:EPE

[2658] Anonymous. Expert pushes enve-lope with passport RFID crack. Net-work Security, 2007(3):2, 20, March2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700235.

Anonymous:2007:Bc

[2659] Anonymous. In brief. Network Secu-rity, 2007(3):3, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700247.

Ritchie:2007:SRA

[2660] Paul Ritchie. The security risks ofAJAX/web 2.0 applications. Net-work Security, 2007(3):4–8, March2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700259.

Westcott:2007:MRS

[2661] Ross Westcott. Maximizing the ROIof a security audit. Network Security,2007(3):8–11, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700260.

deVries:2007:STS

[2662] Stephen de Vries. Software test-ing for security. Network Security,2007(3):11–15, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700272.

Storey:2007:NDS

[2663] Dominic Storey. Network dis-covery and its security applica-tions. Network Security, 2007(3):15–18, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700284.

Potter:2007:OCN

[2664] Bruce Potter. Our changing net-work borders. Network Security, 2007(3):18–20, March 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700296.

Anonymous:2007:ECc

[2665] Anonymous. Events calendar. Net-work Security, 2007(3):20, March2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700302.

Anonymous:2007:STC

[2666] Anonymous. Symantec tracks commer-cialisation of malware. Network Secu-rity, 2007(4):1–2, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700399.

Anonymous:2007:ACP

[2667] Anonymous. Animated cursor pointsto trouble for Microsoft. Network Se-curity, 2007(4):2, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),

Page 336: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 336

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700405.

Anonymous:2007:UPP

[2668] Anonymous. UK plc pinpoints IM,VoIP as security risks. Network Secu-rity, 2007(4):2, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700417.

Anonymous:2007:Bd

[2669] Anonymous. In brief. Network Secu-rity, 2007(4):3, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700429.

Rowan:2007:AFF

[2670] Tom Rowan. Application firewalls:filling the void. Network Security,2007(4):4–7, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700430.

Owen:2007:FOR

[2671] Michael Owen. Fun with onionrouting. Network Security, 2007(4):8–12, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700442.

Heron:2007:BCC

[2672] Simon Heron. Botnet command andcontrol techniques. Network Security,2007(4):13–16, April 2007. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700454.

Anonymous:2007:DBA

[2673] Anonymous. Data breach activityis getting worse. Network Security,2007(4):16, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700466.

delaCuadra:2007:GM

[2674] Fernando de la Cuadra. The geneal-ogy of malware. Network Security,2007(4):17–20, April 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700478.

Anonymous:2007:ECd

[2675] Anonymous. Events calendar. Net-work Security, 2007(4):20, April 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580770048X.

Anonymous:2007:UIV

[2676] Anonymous. UK Internet voting comesunder attack. Network Security, 2007(5):1–2, 20, May 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700314.

Anonymous:2007:Be

[2677] Anonymous. In brief. Network Secu-rity, 2007(5):3, May 2007. CODEN

Page 337: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 337

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700326.

Anderson:2007:CHA

[2678] Kent Anderson. Convergence: aholistic approach to risk management.Network Security, 2007(5):4–7, May2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700338.

Gleave:2007:MLI

[2679] Stephen Gleave. The mechanics oflawful interception. Network Secu-rity, 2007(5):8–11, May 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580770034X.

Potter:2007:BGS

[2680] Bruce Potter and Shmoo Group. Be-ing a good security citizen. Net-work Security, 2007(5):11–12, May2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700351.

Everett:2007:TFO

[2681] Bernard Everett. Tapping into fi-bre optic cables. Network Security,2007(5):13–16, May 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700363.

Ollmann:2007:WSC

[2682] Gunter Ollmann. Writing securecode. Network Security, 2007(5):16–20, May 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700375.

Anonymous:2007:ECe

[2683] Anonymous. Events calendar. Net-work Security, 2007(5):20, May 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700387.

Anonymous:2007:FSL

[2684] Anonymous. FBI still lax on se-curity. Network Security, 2007(6):1–2, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700491.

Anonymous:2007:BBB

[2685] Anonymous. Better Business Bureauphishing attacks continue. Network Se-curity, 2007(6):2, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700508.

Anonymous:2007:Bf

[2686] Anonymous. In brief. Network Secu-rity, 2007(6):3, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580770051X.

Page 338: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 338

Heron:2007:RRK

[2687] Simon Heron. The rise and rise ofthe keyloggers. Network Security,2007(6):4–6, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700521.

Munro:2007:WW

[2688] Ken Munro. Wireless worms. Net-work Security, 2007(6):6–8, June 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700533.

Owen:2007:NBC

[2689] Michael Owen and Colin Dixon.A new baseline for cardholder se-curity. Network Security, 2007(6):8–12, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700545.

Dantu:2007:SMN

[2690] Ram Dantu, Herman Oosterwijk,Prakash Kolan, and Husain Husna.Securing medical networks. Net-work Security, 2007(6):13–16, June2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700557.

LeVine:2007:PSS

[2691] Richard LeVine. Putting the spiritinto security. Network Security,2007(6):17–20, June 2007. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700569.

Anonymous:2007:SSI

[2692] Anonymous. Seattle spammer indicted.Network Security, 2007(6):20, June2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700570.

Anonymous:2007:ECf

[2693] Anonymous. Events calendar. Net-work Security, 2007(6):20, June 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700582.

Anonymous:2007:YHS

[2694] Anonymous. YouTube hit by se-curity concerns. Network Security,2007(7):1–2, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700594.

Anonymous:2007:MPN

[2695] Anonymous. MPack packs a nastypunch. Network Security, 2007(7):2, July 2007. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485807700600.

Anonymous:2007:Bg

[2696] Anonymous. In brief. Network Secu-rity, 2007(7):3, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),

Page 339: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 339

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700612.

Clark:2007:DMT

[2697] Andrew J. Clark. Document metadata,tracking and tracing. Network Secu-rity, 2007(7):4–7, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700624.

Potter:2007:AWB

[2698] Bruce Potter. Alternative webbrowsers: friend or foe? Network Secu-rity, 2007(7):7–8, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700636.

Badra:2007:AWC

[2699] Mohamad Badra. Alternative wire-less client authentication and key dis-tribution. Network Security, 2007(7):9–13, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700648.

Mattsson:2007:DD

[2700] Ulf Mattsson. Defending thedatabase. Network Security, 2007(7):14–17, July 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580770065X.

deBorde:2007:STF

[2701] Duncan de Borde. Selecting a two-factor authentication system. Net-work Security, 2007(7):17–20, July2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700661.

Anonymous:2007:ECg

[2702] Anonymous. Events calendar. Net-work Security, 2007(7):20, July 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700673.

Anonymous:2007:WLV

[2703] Anonymous. WabiSabiLabi launchesvulnerability market. Network Se-curity, 2007(8):1–2, August 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700685.

Anonymous:2007:SFS

[2704] Anonymous. Spam formats shiftagain. Network Security, 2007(8):2, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700697.

Anonymous:2007:Bh

[2705] Anonymous. In brief. Network Secu-rity, 2007(8):3, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700703.

Page 340: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 340

Frith:2007:SAO

[2706] David Frith. Steganography ap-proaches, options, and implica-tions. Network Security, 2007(8):4–7, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700715.

Coursen:2007:FMM

[2707] Shane Coursen. The future of mo-bile malware. Network Security, 2007(8):7–11, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700727.

Williams:2007:EBR

[2708] Paul Williams. Executive andboard roles in information secu-rity. Network Security, 2007(8):11–14, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700739.

Hwang:2007:HDM

[2709] Tim Hwang. Herdict: a dis-tributed model for threats on-line. Network Security, 2007(8):15–18, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700740.

Potter:2007:MSR

[2710] Bruce Potter. Mobile security risks:ever evolving. Network Security, 2007

(8):19–20, August 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700752.

Anonymous:2007:ECh

[2711] Anonymous. Events calendar. Net-work Security, 2007(8):20, August2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700764.

Anonymous:2007:LWB

[2712] Anonymous. Lords want banks,tech firms held responsible. Net-work Security, 2007(9):1–2, September2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700776.

Anonymous:2007:ABM

[2713] Anonymous. Attachment-based mal-ware takes back seat to spam. NetworkSecurity, 2007(9):2, 20, September2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700788.

Anonymous:2007:Bi

[2714] Anonymous. In brief. Network Se-curity, 2007(9):3, September 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580770079X.

Laurie:2007:PAA

[2715] Adam Laurie. Practical attacksagainst RFID. Network Security, 2007

Page 341: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 341

(9):4–7, September 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700806.

Armstrong:2007:NIC

[2716] Neil Armstrong. Network infiltra-tion with client-side attacks. NetworkSecurity, 2007(9):8–10, September2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700818.

Rowan:2007:IPS

[2717] Tom Rowan. Intrusion preventionsystems: superior security. NetworkSecurity, 2007(9):11–15, September2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580770082X.

DeGuerre:2007:MVR

[2718] Jamie De Guerre. The mechanics ofVipul’s Razor technology. NetworkSecurity, 2007(9):15–17, September2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700831.

Potter:2007:SA

[2719] Bruce Potter. Security automa-tion. Network Security, 2007(9):18–19, September 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700843.

Anonymous:2007:MCS

[2720] Anonymous. monster.com suffersweb attack. Network Security, 2007(9):20, September 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700855.

Anonymous:2007:NSN

[2721] Anonymous. Network Security’snew look. Network Security, 2007(9):20, September 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700867.

Anonymous:2007:ECi

[2722] Anonymous. Events calendar. Net-work Security, 2007(9):20, September2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700879.

Anonymous:2007:UDD

[2723] Anonymous. US DoD, DHS criticisedfor security flaws. Network Security,2007(10):1–2, October 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700880.

Anonymous:2007:VPS

[2724] Anonymous. VMware patches secu-rity flaws. Network Security, 2007(10):2, October 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700892.

Page 342: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 342

Anonymous:2007:E

[2725] Anonymous. Erratum. NetworkSecurity, 2007(10):2, October 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700909.

Anonymous:2007:Bj

[2726] Anonymous. In brief. NetworkSecurity, 2007(10):3, October 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700910.

Skapinetz:2007:VBT

[2727] Kevin Skapinetz. Virtualisation asa blackhat tool. Network Security,2007(10):4–7, October 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700922.

Clement:2007:SIG

[2728] Miles Clement. Securing the iPodgeneration. Network Security, 2007(10):7–9, October 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700934.

Watson:2007:WAA

[2729] David Watson. Web applicationattacks. Network Security, 2007(10):10–14, October 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700946.

Midian:2007:NRD

[2730] Paul Midian. Networks at risk: de-tection, defence and dealing withit. Network Security, 2007(10):14–18, October 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700958.

Potter:2007:CWW

[2731] Bruce Potter. Converging wired andwireless authentication. Network Se-curity, 2007(10):18–20, October 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580770096X.

Anonymous:2007:ECj

[2732] Anonymous. Events calendar. Net-work Security, 2007(10):20, October2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807700971.

Anonymous:2007:ILS

[2733] Anonymous. IBM launches securityoffensive. Network Security, 2007(11):1–2, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700357.

Anonymous:2007:HPS

[2734] Anonymous. Humans + porn =solved Captcha. Network Security,2007(11):2, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),

Page 343: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 343

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700369.

Anonymous:2007:Bk

[2735] Anonymous. In brief. Network Se-curity, 2007(11):3, November 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700370.

Heron:2007:GCO

[2736] Simon Heron. Gang culture in theonline world. Network Security, 2007(11):4–7, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700382.

Watson:2007:EWA

[2737] David Watson. The evolution ofweb application attacks. NetworkSecurity, 2007(11):7–12, November2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700394.

Moyle:2007:BTS

[2738] Steve Moyle. The blackhat’s toolbox:SQL injections. Network Security, 2007(11):12–14, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700400.

Frith:2007:VSH

[2739] David Frith. E-voting security: hopeor hype? Network Security, 2007(11):14–16, November 2007. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700412.

Clement:2007:IES

[2740] Miles Clement. Issues in endpoint se-curity. Network Security, 2007(11):17–18, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700424.

Potter:2007:CP

[2741] Bruce Potter. From concept to pro-duction. Network Security, 2007(11):19–20, November 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700436.

Anonymous:2007:ECk

[2742] Anonymous. Events calendar. Net-work Security, 2007(11):20, November2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700448.

Anonymous:2007:DBC

[2743] Anonymous. Data breach casts pall onUK ID card scheme. Network Security,2007(12):1–2, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700983.

Anonymous:2007:SPR

[2744] Anonymous. 2008 security predic-tions roll in. Network Security, 2007

Page 344: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 344

(12):2, 20, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807700995.

Anonymous:2007:Bl

[2745] Anonymous. In brief. Network Se-curity, 2007(12):3, December 2007.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807701009.

Sunner:2007:RTT

[2746] Mark Sunner. The rise of targetedTrojans. Network Security, 2007(12):4–7, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807701010.

Newman:2007:HIS

[2747] Kenneth Newman. Home invasion: se-curing home access to business net-works. Network Security, 2007(12):8–10, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807701022.

Abimbola:2007:ISI

[2748] Abiola Abimbola. Information se-curity incident response. NetworkSecurity, 2007(12):10–13, December2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807701034.

Rowan:2007:VTI

[2749] Tom Rowan. VPN technology: IPSECvs SSL. Network Security, 2007(12):13–17, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807701046.

Potter:2007:NFA

[2750] Bruce Potter. Network flow anal-ysis. Network Security, 2007(12):18–19, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807701058.

Anonymous:2007:PCS

[2751] Anonymous. Password crackers see big-ger picture. Network Security, 2007(12):20, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580770106X.

Anonymous:2007:NSG

[2752] Anonymous. Network Security goesonline. Network Security, 2007(12):20, December 2007. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485807701071.

Anonymous:2007:ECl

[2753] Anonymous. Events calendar. Net-work Security, 2007(12):20, December2007. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485807701083.

Page 345: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 345

Anonymous:2008:MDL

[2754] Anonymous. More data losses inUK government. Network Security,2008(1):1, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700011.

Anonymous:2008:BTC

[2755] Anonymous. Banking Trojan causesaccount havoc. Network Security,2008(1):2, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700023.

Anonymous:2008:MTI

[2756] Anonymous. Microsoft tests inkypassword solution. Network Security,2008(1):2, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700035.

Anonymous:2008:Ba

[2757] Anonymous. In brief. Network Secu-rity, 2008(1):3, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700047.

Munro:2008:SCS

[2758] Ken Munro. SCADA — a criticalsituation. Network Security, 2008(1):4–6, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700059.

Potter:2008:CJC

[2759] Bruce Potter. Controlling JavaScriptwith Caja. Network Security, 2008(1):7–8, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700060.

Ullrich:2008:DWS

[2760] Johannes B. Ullrich and Jason Lam.Defacing websites via SQL injec-tion. Network Security, 2008(1):9–10, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700072.

Dunne:2008:ITB

[2761] Nollaig Dunne. ID theft for be-ginners. Network Security, 2008(1):10–13, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700084.

Small:2008:ME

[2762] Mike Small. Managing entitle-ments. Network Security, 2008(1):13–17, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700096.

Bridges:2008:CFM

[2763] Lloyd Bridges. The changing faceof malware. Network Security, 2008(1):17–20, January 2008. CODENNTSCF5. ISSN 1353-4858 (print),

Page 346: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 346

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700102.

Anonymous:2008:ECa

[2764] Anonymous. Events calendar. Net-work Security, 2008(1):20, January2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700114.

Anonymous:2008:MMW

[2765] Anonymous. Most malicious websites are hacked. Network Security,2008(2):1–2, February 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700126.

Anonymous:2008:BWA

[2766] Anonymous. Business worried aboutdata loss — but probably notenough. Network Security, 2008(2):2, February 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700138.

Anonymous:2008:OIG

[2767] Anonymous. Ontario issues guidanceon RFID use. Network Security, 2008(2):2, 20, February 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870014X.

Anonymous:2008:Bb

[2768] Anonymous. In brief. NetworkSecurity, 2008(2):3, February 2008.

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700151.

Casey:2008:TLF

[2769] Donal Casey. Turning log files intoa security asset. Network Security,2008(2):4–7, February 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700163.

Ross:2008:EIS

[2770] Steven J. Ross. Enforcing informa-tion security: architecture and re-sponsibilities. Network Security, 2008(2):7–10, February 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700175.

LoIacono:2008:WSL

[2771] Luigi Lo Iacono and Jun Wang. Webservice layer security (WSLS). Net-work Security, 2008(2):10–13, February2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700187.

Forte:2008:IAS

[2772] Dario Forte. An integrated ap-proach to security incident manage-ment. Network Security, 2008(2):14–16, February 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700199.

Page 347: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 347

Small:2008:EMP

[2773] Mike Small. Entitlement manage-ment — a practical approach. Net-work Security, 2008(2):16–19, February2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700205.

Anonymous:2008:STS

[2774] Anonymous. Spammers turn tosearch engines. Network Security,2008(2):20, February 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700217.

Anonymous:2008:ECb

[2775] Anonymous. Events calendar. Net-work Security, 2008(2):20, February2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700229.

Anonymous:2008:SPM

[2776] Anonymous. Symantec prepares formanaged security services. Net-work Security, 2008(3):1–2, March2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700230.

Anonymous:2008:MDB

[2777] Anonymous. Microsoft downplaysBitLocker claim. Network Security,2008(3):2, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700242.

Anonymous:2008:GUD

[2778] Anonymous. Google unveils drive-by download details. Network Secu-rity, 2008(3):2, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700254.

Anonymous:2008:PEC

[2779] Anonymous. Ponemon evaluates costof UK breaches. Network Security,2008(3):2, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700266.

Anonymous:2008:Bc

[2780] Anonymous. In brief. Network Secu-rity, 2008(3):3, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700278.

Dye:2008:WAS

[2781] Kerry Dye. Website abuse for searchengine optimisation. Network Secu-rity, 2008(3):4–6, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870028X.

Corrons:2008:EMR

[2782] Luis Corrons and Dominic Hoskins. Ex-ploring MBR rootkits. Network Secu-rity, 2008(3):7–9, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700291.

Page 348: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 348

Potter:2008:SRE

[2783] Bruce Potter. Is security really every-one’s responsibility? Network Security,2008(3):9–10, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700308.

Fyffe:2008:AIT

[2784] George Fyffe. Addressing the in-sider threat. Network Security, 2008(3):11–14, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870031X.

Heron:2008:PMR

[2785] Simon Heron. Parasitic mal-ware: The resurgence of an oldthreat. Network Security, 2008(3):15–18, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700321.

Forte:2008:SST

[2786] Dario Forte. Selling security to topmanagement. Network Security, 2008(3):18–20, March 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700333.

Anonymous:2008:ECc

[2787] Anonymous. Events calendar. Net-work Security, 2008(3):20, March2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485808700345.

Anonymous:2008:SPE

[2788] Anonymous. SEO poisoning epi-demic explodes. Network Security,2008(4):1, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870045X.

Anonymous:2008:ELP

[2789] Anonymous. EU launches PrimeLifeproject. Network Security, 2008(4):2, April 2008. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485808700461.

Anonymous:2008:ATE

[2790] Anonymous. Attackers target epilepsysite. Network Security, 2008(4):2, April2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700473.

Anonymous:2008:ATC

[2791] Anonymous. Adware tops charts inQ1. Network Security, 2008(4):2, April2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700485.

Anonymous:2008:Bd

[2792] Anonymous. In brief. Network Secu-rity, 2008(4):3, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

Page 349: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 349

//www.sciencedirect.com/science/

article/pii/S1353485808700497.

Miller:2008:VWR

[2793] Charlie Miller. Virtual worlds,real exploits. Network Security,2008(4):4–6, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700503.

Smith:2008:CFI

[2794] Don Smith. The challenge of federatedidentity management. Network Secu-rity, 2008(4):7–9, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700515.

Forte:2008:PAA

[2795] Dario V. Forte. The PTK: Analternative advanced interface forSleuth Kit. Network Security, 2008(4):10–13, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700527.

Howard:2008:MWA

[2796] Fraser Howard. Modern web at-tacks. Network Security, 2008(4):13–15, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700539.

Fyffe:2008:MMC

[2797] George Fyffe. Managing multina-tional compliance efforts while address-

ing corporate security needs. Net-work Security, 2008(4):16–18, April2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700540.

Potter:2008:SMA

[2798] Bruce Potter. Scalable malwareanalysis. Network Security, 2008(4):18–20, April 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700552.

Anonymous:2008:ECd

[2799] Anonymous. Events calendar. Net-work Security, 2008(4):20, April 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700564.

Anonymous:2008:SAS

[2800] Anonymous. SQL attackers strikeagain. Network Security, 2008(5):1, May 2008. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485808700576.

Anonymous:2008:RCB

[2801] Anonymous. Researchers crackbot net secrets. Network Secu-rity, 2008(5):2, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700588.

Page 350: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 350

Anonymous:2008:BMW

[2802] Anonymous. BERR: More workto do on security. Network Secu-rity, 2008(5):2, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870059X.

Anonymous:2008:Be

[2803] Anonymous. In brief. Network Secu-rity, 2008(5):3, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700606.

Sunner:2008:DWD

[2804] Mark Sunner. Developing world, de-veloping problems. Network Secu-rity, 2008(5):4–7, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700618.

Colley:2008:MBC

[2805] John Colley. Managing both ca-reers and risks. Network Security,2008(5):7–9, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870062X.

Roemer:2008:TET

[2806] Kurt Roemer. Treating employ-ees as a threat. Network Security,2008(5):9–11, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700631.

Arce:2008:VMCa

[2807] Ivan Arce. Vulnerability managementat the crossroads. Network Security,2008(5):11–13, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700643.

Urzay:2008:CIA

[2808] Inaki Urzay. Collective intelli-gence approaches to malware recog-nition. Network Security, 2008(5):14–16, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700655.

Forte:2008:SSR

[2809] Dario V. Forte. Security for safetyin railways. Network Security, 2008(5):17–19, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700667.

Anonymous:2008:SSU

[2810] Anonymous. Symantec: Spammersusing AdWords. Network Security,2008(5):20, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700679.

Anonymous:2008:MSI

[2811] Anonymous. Mozilla serves upinfected files. Network Security,2008(5):20, May 2008. CODENNTSCF5. ISSN 1353-4858 (print),

Page 351: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 351

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700680.

Anonymous:2008:ECe

[2812] Anonymous. Events calendar. Net-work Security, 2008(5):20, May 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700692.

Anonymous:2008:OSS

[2813] Anonymous. Open source softwaregetting better. Network Security,2008(6):1–2, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700709.

Anonymous:2008:UPB

[2814] Anonymous. UK plans Big Brotherdatabase. Network Security, 2008(6):2, June 2008. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485808700710.

Anonymous:2008:RDC

[2815] Anonymous. Researcher demon-strates Cisco rootkit. Network Secu-rity, 2008(6):2, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700722.

Anonymous:2008:Bf

[2816] Anonymous. In brief. Network Secu-rity, 2008(6):3, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700734.

Munro:2008:BB

[2817] Ken Munro. Breaking into Blue-tooth. Network Security, 2008(6):4–6, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700746.

Frankland:2008:ISM

[2818] Jane Frankland. IT security met-rics: implementation and stan-dards compliance. Network Security,2008(6):6–9, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700758.

Arce:2008:VMCb

[2819] Ivan Arce. Vulnerability manage-ment at the crossroads, part 2. Net-work Security, 2008(6):9–12, June2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580870076X.

Forte:2008:VDV

[2820] Dario V. Forte. Volatile data vs.data at rest: the requirements ofdigital forensics. Network Security,2008(6):13–15, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700771.

Page 352: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 352

Hardjono:2008:SEA

[2821] Thomas Hardjono. Strengthening en-terprise applications using trusted plat-form modules. Network Security,2008(6):15–18, June 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700783.

Potter:2008:PGI

[2822] Bruce Potter. Proxies: a goodidea whose time has passed. Net-work Security, 2008(6):19–20, June2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700795.

Anonymous:2008:ECf

[2823] Anonymous. Events calendar. Net-work Security, 2008(6):20, June 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700801.

Anonymous:2008:KAD

[2824] Anonymous. Kaspersky asks for de-cryption help. Network Security,2008(7):1–2, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700813.

Anonymous:2008:VEB

[2825] Anonymous. Verizon: Externalbreaches more common. Network Se-curity, 2008(7):2, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700825.

Anonymous:2008:RES

[2826] Anonymous. Researchers encode secretmessages in VoIP calls. Network Se-curity, 2008(7):2, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700837.

Anonymous:2008:Bg

[2827] Anonymous. In brief. Network Secu-rity, 2008(7):3, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700849.

DeMarines:2008:OHD

[2828] Victor DeMarines. Obfuscation —how to do it and how to crack it.Network Security, 2008(7):4–7, July2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700850.

Nazario:2008:DAE

[2829] Jose Nazario. DDoS attack evo-lution. Network Security, 2008(7):7–10, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700862.

Rowan:2008:SVC

[2830] Tom Rowan. The secure virtualcomputer on your keychain. Net-work Security, 2008(7):11–14, July

Page 353: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 353

2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700874.

Ray:2008:SS

[2831] Ed Ray. It’s the software, stupid.Network Security, 2008(7):14–17, July2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700886.

Shaul:2008:IDS

[2832] Josh Shaul. Implementing databasesecurity: using attack analysis to im-prove your defences. Network Security,2008(7):18–20, July 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700898.

Anonymous:2008:ECg

[2833] Anonymous. Events calendar. Net-work Security, 2008(7):20, July 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808700904.

Anonymous:2008:DFR

[2834] Anonymous. DNS flaw rocksweb. Network Security, 2008(8):1–2, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700916.

Anonymous:2008:CWH

[2835] Anonymous. City worker holds SanFrancisco to ransom. Network Secu-

rity, 2008(8):2, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700928.

Anonymous:2008:OCN

[2836] Anonymous. Online crime networksmimic mafia. Network Security,2008(8):2, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870093X.

Anonymous:2008:Bh

[2837] Anonymous. In brief. Network Secu-rity, 2008(8):3, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700941.

Takanen:2008:FM

[2838] Ari Takanen. Fuzzing for themasses. Network Security, 2008(8):4–6, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700953.

Lovet:2008:CSF

[2839] Guillaume Lovet. Cybercrime is ina state of flux. Network Security,2008(8):6–8, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700965.

Page 354: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 354

Naumann:2008:PFE

[2840] Ingo Naumann and Giles Hogben. Pri-vacy features of European eID cardspecifications. Network Security, 2008(8):9–13, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700977.

Kim:2008:SSS

[2841] Gene Kim. Seven steps to a secure vir-tual environment. Network Security,2008(8):14–18, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700989.

Forte:2008:SMI

[2842] Dario Forte. 2008: Six months of in-formation security. Network Security,2008(8):18–20, August 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808700990.

Anonymous:2008:ECh

[2843] Anonymous. Events calendar. Net-work Security, 2008(8):20, August2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701004.

Anonymous:2008:HOP

[2844] Anonymous. Home Office: Pass go,do not collect £200. Network Security,2008(9):1–2, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701016.

Anonymous:2008:BHH

[2845] Anonymous. Black hats hit RedHat. Network Security, 2008(9):2, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701028.

Anonymous:2008:GFG

[2846] Anonymous. Google firms up Gmailsecurity. Network Security, 2008(9):2, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870103X.

Anonymous:2008:Bi

[2847] Anonymous. In brief. Network Se-curity, 2008(9):3, September 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701041.

Kaminsky:2008:CK

[2848] Dan Kaminsky. Catching up withKaminsky. Network Security, 2008(9):4–7, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701053.

Mansfield-Devine:2008:XIT

[2849] Steve Mansfield-Devine. OS X— is it time to start worry-ing? Network Security, 2008(9):

Page 355: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 355

7–9, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701065.

Shaikh:2008:CIDa

[2850] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, and HaoChen. Characterising intrusion detec-tion sensors. Network Security, 2008(9):10–12, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701077.

Potter:2008:DP

[2851] Bruce Potter. Document protec-tion. Network Security, 2008(9):13–14, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701089.

May:2008:AUE

[2852] Clifford May. Approaches to usereducation. Network Security, 2008(9):15–17, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701090.

Forte:2008:DSS

[2853] Dario Forte. Do storage and security goarm in arm? Network Security, 2008(9):18–19, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701107.

Anonymous:2008:CRT

[2854] Anonymous. Customer records turnup on auctioned machine. Net-work Security, 2008(9):20, September2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701119.

Anonymous:2008:WSF

[2855] Anonymous. Web security flawsup. Network Security, 2008(9):20, September 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701120.

Anonymous:2008:ECi

[2856] Anonymous. Events calendar. Net-work Security, 2008(9):20, September2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701132.

Anonymous:2008:MSS

[2857] Anonymous. McAfee snaps up Se-cure Computing. Network Security,2008(10):1–2, October 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701144.

Anonymous:2008:SEU

[2858] Anonymous. Security experts: UStrailing on cybersecurity. NetworkSecurity, 2008(10):2, October 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701156.

Page 356: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 356

Anonymous:2008:Bj

[2859] Anonymous. In brief. NetworkSecurity, 2008(10):3, October 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701168.

Hartley:2008:DWS

[2860] Dave Hartley. Defending Windowsservers. Network Security, 2008(10):4–8, October 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870117X.

Shaikh:2008:CIDb

[2861] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, and HaoChen. Characterising intrusion detec-tion sensors, part 2. Network Security,2008(10):8–11, October 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701181.

Sood:2008:HKB

[2862] Aditya K. Sood. Hiding a knifebehind a smile — OBS hackingthreats. Network Security, 2008(10):12–16, October 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701193.

Forte:2008:OBK

[2863] Dario Forte. An overview of thebest known virtual solutions. NetworkSecurity, 2008(10):16–18, October

2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580870120X.

Potter:2008:HBI

[2864] Bruce Potter. How bad is it? NetworkSecurity, 2008(10):18–20, October2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701211.

Anonymous:2008:ECj

[2865] Anonymous. Events calendar. Net-work Security, 2008(10):20, October2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701223.

Anonymous:2008:MIE

[2866] Anonymous. Microsoft issues emer-gency patch for RPC flaw. Net-work Security, 2008(11):1–2, November2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701235.

Anonymous:2008:CPM

[2867] Anonymous. CSI promotes more so-phisticated security measures. Net-work Security, 2008(11):2, November2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701247.

Anonymous:2008:ALS

[2868] Anonymous. Alcatel Lucent ships lap-top protection system. Network Se-curity, 2008(11):2, November 2008.

Page 357: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 357

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701259.

Anonymous:2008:Bk

[2869] Anonymous. In brief. Network Se-curity, 2008(11):3, November 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701260.

Mansfield-Devine:2008:ASN

[2870] Steve Mansfield-Devine. Anti-socialnetworking: exploiting the trust-ing environment of Web 2.0. Net-work Security, 2008(11):4–7, November2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701272.

Gebhardt:2008:PHB

[2871] Carlo Gebhardt, Chris I. Dalton, andRichard Brown. Preventing hypervisor-based rootkits with trusted executiontechnology. Network Security, 2008(11):7–12, November 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701284.

Shaikh:2008:NR

[2872] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, andHao Chen. Network reconnais-sance. Network Security, 2008(11):12–16, November 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701296.

Forte:2008:TAI

[2873] Dario Forte. Technological alterna-tives in incident response. NetworkSecurity, 2008(11):16–18, November2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701302.

Potter:2008:ES

[2874] Bruce Potter. An everyman SIM.Network Security, 2008(11):18–20,November 2008. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485808701314.

Anonymous:2008:ECk

[2875] Anonymous. Events calendar. Net-work Security, 2008(11):20, November2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701326.

Anonymous:2008:MAO

[2876] Anonymous. Microsoft axes OneCare.Network Security, 2008(12):1–2, De-cember 2008. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485808701338.

Anonymous:2008:MM

[2877] Anonymous. Marshal and 8e6merge. Network Security, 2008(12):2, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),

Page 358: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 358

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580870134X.

Anonymous:2008:NMS

[2878] Anonymous. NetWitness makes soft-ware tool free. Network Security,2008(12):2, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701351.

Anonymous:2008:BMR

[2879] Anonymous. BNP members revealedby list leak. Network Security, 2008(12):2, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701363.

Anonymous:2008:Bl

[2880] Anonymous. In brief. Network Se-curity, 2008(12):3, December 2008.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701375.

Munro:2008:DE

[2881] Ken Munro. Desktop encryp-tion. Network Security, 2008(12):4–6, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701387.

Libeau:2008:ASE

[2882] Fabian Libeau. Automating securityevents management. Network Security,2008(12):6–9, December 2008. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701399.

Mansfield-Devine:2008:DC

[2883] Steve Mansfield-Devine. Danger inthe clouds. Network Security, 2008(12):9–11, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701405.

Shaikh:2008:FPR

[2884] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, andHao Chen. False positive re-sponse. Network Security, 2008(12):11–15, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701417.

Danahy:2008:PSG

[2885] Jack Danahy. The ‘phasing-in’ of secu-rity governance in the SDLC. NetworkSecurity, 2008(12):15–17, December2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701429.

Forte:2008:DFS

[2886] Dario Forte. Dealing with forensic soft-ware vulnerabilities: is anti-forensics areal danger? Network Security, 2008(12):18–20, December 2008. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485808701430.

Page 359: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 359

Anonymous:2008:ECl

[2887] Anonymous. Events calendar. Net-work Security, 2008(12):20, December2008. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485808701442.

Anonymous:2009:DWT

[2888] Anonymous. Downadup worm takesnet by storm. Network Security,2009(1):1, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700017.

Anonymous:2009:NBP

[2889] Anonymous. New botnets on theprowl. Network Security, 2009(1):2, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700029.

Anonymous:2009:PCA

[2890] Anonymous. Proof of concept attackfurther discredits MD5. Network Secu-rity, 2009(1):2, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700030.

Anonymous:2009:Ba

[2891] Anonymous. In brief. Network Secu-rity, 2009(1):3, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700042.

Erasmus:2009:AMA

[2892] Jacques Erasmus. Anatomy of amalware attack. Network Security,2009(1):4–7, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700054.

Schipka:2009:DD

[2893] Maksym Schipka. Dollars for down-loading. Network Security, 2009(1):7–11, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700066.

Heron:2009:TSD

[2894] Simon Heron. Technologies for spamdetection. Network Security, 2009(1):11–15, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700078.

Potter:2009:MST

[2895] Bruce Potter. Microsoft SDL ThreatModelling Tool. Network Security,2009(1):15–18, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580970008X.

Forte:2009:WGG

[2896] Dario Forte. So are we go-ing to govern this security busi-ness? Network Security, 2009(1):18–20, January 2009. CODENNTSCF5. ISSN 1353-4858 (print),

Page 360: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 360

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700091.

Anonymous:2009:ECa

[2897] Anonymous. Events calendar. Net-work Security, 2009(1):20, January2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700108.

Anonymous:2009:COT

[2898] Anonymous. Cybersecurity: Obamatakes care of business. Network Se-curity, 2009(2):1–2, February 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580970011X.

Anonymous:2009:KCU

[2899] Anonymous. Kyrgyzstan comes un-der cyberattack. Network Security,2009(2):2, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700121.

Anonymous:2009:CBR

[2900] Anonymous. Cost of breachesrises. Network Security, 2009(2):2, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700133.

Anonymous:2009:Bb

[2901] Anonymous. In brief. NetworkSecurity, 2009(2):3, February 2009.

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700145.

Rowan:2009:PPN

[2902] Tom Rowan. Password protection: thenext generation. Network Security,2009(2):4–7, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700157.

Broom:2009:PIE

[2903] Alastair Broom. De-perimeterisation:inevitable and essential. Network Se-curity, 2009(2):7–10, February 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700169.

Biro:2009:WW

[2904] Tamas Biro. A window to theworld? Network Security, 2009(2):11–13, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700170.

Sood:2009:VPW

[2905] Aditya K. Sood. From vulnerabil-ity to patch: the window of ex-posure. Network Security, 2009(2):14–16, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700182.

Page 361: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 361

Potter:2009:TTY

[2906] Bruce Potter. Three tips for yournetwork. Network Security, 2009(2):16–18, February 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700194.

Forte:2009:DM

[2907] Dario Forte. The death of MD5. Net-work Security, 2009(2):18–20, February2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700200.

Anonymous:2009:ECb

[2908] Anonymous. Events calendar. Net-work Security, 2009(2):20, February2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700212.

Anonymous:2009:BBI

[2909] Anonymous. BBC botnet investiga-tion causes controversy. Network Secu-rity, 2009(3):1–2, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700224.

Anonymous:2009:APO

[2910] Anonymous. Anti-phishing organ-isation launches common reportingstandard. Network Security, 2009(3):2, 20, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700236.

Anonymous:2009:Bc

[2911] Anonymous. In brief. Network Secu-rity, 2009(3):3, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700248.

Mansfield-Devine:2009:GH

[2912] Steve Mansfield-Devine. Google hack-ing 101. Network Security, 2009(3):4–6, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580970025X.

Kamluk:2009:HLY

[2913] Vitaly Kamluk. Here’s looking atyou Kido. Network Security, 2009(3):6–8, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700261.

Eisen:2009:SPK

[2914] Ori Eisen. In-session phishing andknowing your enemy. Network Security,2009(3):8–11, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700273.

Sood:2009:YSP

[2915] Aditya K. Sood. Is your systempwned? Network Security, 2009(3):11–13, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700285.

Page 362: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 362

Southern:2009:CRM

[2916] Steve Southern. Creating riskmanagement strategies for IT se-curity. Network Security, 2009(3):13–16, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700297.

Forte:2009:SAM

[2917] Dario Forte. Security audits in mixedenvironments. Network Security, 2009(3):17–19, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700303.

Anonymous:2009:MBS

[2918] Anonymous. McAfee: Beware thespam of March. Network Security,2009(3):20, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700315.

Anonymous:2009:MDN

[2919] Anonymous. ‘Monroe Doctrine’ neededfor cyberspace. Network Security,2009(3):20, March 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700327.

Anonymous:2009:ECc

[2920] Anonymous. Events calendar. Net-work Security, 2009(3):20, March2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485809700339.

Anonymous:2009:CEO

[2921] Anonymous. Cyber-espionage oper-ation discovered. Network Security,2009(4):1–2, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700340.

Anonymous:2009:RCG

[2922] Anonymous. Rogueware continuesto grow. Network Security, 2009(4):2, 20, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700352.

Anonymous:2009:Bd

[2923] Anonymous. In brief. Network Secu-rity, 2009(4):3, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700364.

Jenik:2009:CEM

[2924] Aviram Jenik. Cyberwar in Estoniaand the Middle East. Network Secu-rity, 2009(4):4–6, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700376.

Mansfield-Devine:2009:SWF

[2925] Steve Mansfield-Devine. Simple web-site footprinting. Network Security,2009(4):7–9, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),

Page 363: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 363

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700388.

Dwyer:2009:CCA

[2926] Dennis Dwyer. Chinese cyber-attacktools continue to evolve. Network Secu-rity, 2009(4):9–11, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580970039X.

Heron:2009:GP

[2927] Simon Heron. A good policy. Net-work Security, 2009(4):12–14, April2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700406.

Mattsson:2009:RSV

[2928] Ulf Mattsson. Real security for vir-tual machines. Network Security,2009(4):15–17, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700418.

Forte:2009:APA

[2929] Dario Forte. Anatomy of a phishingattack: a high-level overview. Net-work Security, 2009(4):17–19, April2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580970042X.

Anonymous:2009:RBL

[2930] Anonymous. Researcher blows lidoff retail networks. Network Secu-rity, 2009(4):20, April 2009. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700431.

Anonymous:2009:UEG

[2931] Anonymous. US electrical gridcompromised. Network Security,2009(4):20, April 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700443.

Anonymous:2009:ECd

[2932] Anonymous. Events calendar. Net-work Security, 2009(4):20, April 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700455.

Anonymous:2009:SGL

[2933] Anonymous. Security groups launchanti-malware effort. Network Secu-rity, 2009(5):1–2, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700467.

Anonymous:2009:GGA

[2934] Anonymous. Gumblar Google attacktakes web by storm. Network Secu-rity, 2009(5):2, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700479.

Anonymous:2009:CFB

[2935] Anonymous. Conficker fails, butbots increase. Network Security,

Page 364: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 364

2009(5):2, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700480.

Anonymous:2009:CSC

[2936] Anonymous. Cyber-swine cash inon real-world flu. Network Secu-rity, 2009(5):2, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700492.

Anonymous:2009:Be

[2937] Anonymous. In brief. Network Secu-rity, 2009(5):3, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700509.

Jenik:2009:FTM

[2938] Aviram Jenik. Fuzzing tools: makingsense out of nonsense. Network Secu-rity, 2009(5):4–6, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700510.

Rodriguez:2009:CCT

[2939] Bruno Rodriguez. The cyber-crimethreat to online transactions. Net-work Security, 2009(5):7–8, May 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700522.

Khan:2009:RTC

[2940] Shafiullah Khan and Kok-Keong Loo.Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wire-less mesh networks. Network Secu-rity, 2009(5):9–16, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700534.

Walters:2009:JD

[2941] Richard Walters. Joining thedots. Network Security, 2009(5):16–19, May 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700546.

Forte:2009:PD

[2942] Dario Forte. Phishing in depth. Net-work Security, 2009(5):19–20, May2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700558.

Anonymous:2009:ECe

[2943] Anonymous. Events calendar. Net-work Security, 2009(5):20, May 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580970056X.

Anonymous:2009:CPT

[2944] Anonymous. Chinese protection toolpegged as badware. Network Secu-rity, 2009(6):1–2, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),

Page 365: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 365

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700571.

Anonymous:2009:FUH

[2945] Anonymous. Feds unveil Hath-away review. Network Security,2009(6):2, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700583.

Anonymous:2009:RPS

[2946] Anonymous. Researcher promisessmart grid botnet. Network Security,2009(6):2, 20, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700595.

Anonymous:2009:Bf

[2947] Anonymous. In brief. Network Secu-rity, 2009(6):3, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700601.

Heron:2009:OPB

[2948] Simon Heron. Online privacy andbrowser security. Network Security,2009(6):4–7, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700613.

Mansfield-Devine:2009:MT

[2949] Steve Mansfield-Devine. A mat-ter of trust. Network Security,2009(6):7–9, June 2009. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700625.

Gold:2009:SM

[2950] Steve Gold. Not-so-smart me-ters? Network Security, 2009(6):9–11, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700637.

Shaikh:2009:TSI

[2951] Siraj A. Shaikh, Howard Chivers,Philip Nobles, John A. Clark, andHao Chen. Towards scalable intru-sion detection. Network Security,2009(6):12–16, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700649.

Rexworthy:2009:IDS

[2952] Ben Rexworthy. Intrusion detectionssystems — an outmoded network pro-tection model. Network Security,2009(6):17–19, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700650.

Anonymous:2009:BVP

[2953] Anonymous. Browser vendors inpatch blitz. Network Security,2009(6):20, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700662.

Page 366: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 366

Anonymous:2009:RBB

[2954] Anonymous. Researchers buildbrowser-based darknet. Network Secu-rity, 2009(6):20, June 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700674.

Anonymous:2009:ECf

[2955] Anonymous. Events calendar. Net-work Security, 2009(6):20, June 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700686.

Anonymous:2009:RDE

[2956] Anonymous. In a recession, disgrun-tled employees could pose a securitythreat from within. Network Secu-rity, 2009(7):1, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700807.

Anonymous:2009:FPN

[2957] Anonymous. Finger pointed at NorthKorea after denial of service attacks onthe South and the US. Network Secu-rity, 2009(7):1–2, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700819.

Anonymous:2009:NCV

[2958] Anonymous. NHS computer virusesimpact on patient healthcare. Net-work Security, 2009(7):2, July 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485809700820.

Anonymous:2009:BDP

[2959] Anonymous. Bonn discovers par-tial solution to Conficker infections.Network Security, 2009(7):2, July2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700832.

Anonymous:2009:Bg

[2960] Anonymous. In brief. Network Secu-rity, 2009(7):3, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700844.

Mansfield-Devine:2009:PW

[2961] Steve Mansfield-Devine. The promiseof whitelisting. Network Security,2009(7):4–6, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700856.

Forte:2009:YCV

[2962] Dario Forte. Are you courtvalidated? Network Security,2009(7):6–8, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700868.

Caviglione:2009:UER

[2963] Luca Caviglione. Understandingand exploiting the reverse patternsof peer-to-peer file sharing appli-cations. Network Security, 2009

Page 367: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 367

(7):8–12, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580970087X.

Goucher:2009:EW

[2964] Wendy Goucher. The enemywithin. Network Security, 2009(7):12–14, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700881.

Potter:2009:RL

[2965] Bruce Potter. A review of L0phtCrack6. Network Security, 2009(7):14–17, July 2009. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485809700893.

Forte:2009:ILF

[2966] Dario Forte. The importance oflog files in security incident pre-vention. Network Security, 2009(7):18–20, July 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580970090X.

Anonymous:2009:ECg

[2967] Anonymous. Events calendar. Net-work Security, 2009(7):20, July 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700911.

Anonymous:2009:CAI

[2968] Anonymous. Cyber attacks increas-ingly target wealthy smartphone own-ers, says Cisco. Network Security,2009(8):1, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700698.

Anonymous:2009:FPV

[2969] Anonymous. Flaws and patchingin Las Vegas. Network Security,2009(8):1–2, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700704.

Anonymous:2009:RNM

[2970] Anonymous. Rogueware now amajor menace. Network Security,2009(8):2, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700716.

Anonymous:2009:Bh

[2971] Anonymous. In brief. Network Secu-rity, 2009(8):3, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700728.

Forte:2009:RIS

[2972] Dario V. Forte. The role of the Infor-mation Security Manager in cutting-edge companies. Network Security,2009(8):4–5, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),

Page 368: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 368

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580970073X.

Mortleman:2009:BA

[2973] Jim Mortleman. Behavioural analysis.Network Security, 2009(8):5–7, August2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700741.

Barry:2009:SPS

[2974] Daniel Joseph Barry. Specialproblems of securing 10Gbps net-works. Network Security, 2009(8):8–11, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700753.

Frankland:2009:NDI

[2975] Jane Frankland. Numeric dataintegrity: piercing the corporateveil. Network Security, 2009(8):11–14, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700765.

Sloan:2009:SVW

[2976] Kevin Sloan. Security in a virtu-alised world. Network Security, 2009(8):15–18, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700777.

Gold:2009:SCS

[2977] Steve Gold. The SCADA chal-lenge: securing critical infrastruc-ture. Network Security, 2009(8):18–20, August 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700789.

Anonymous:2009:ECh

[2978] Anonymous. Events calendar. Net-work Security, 2009(8):20, August2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700790.

Anonymous:2009:FFB

[2979] Anonymous. Failed firm bannedfrom selling customers’ personaldata. Network Security, 2009(9):1, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700923.

Anonymous:2009:MWI

[2980] Anonymous. Massive website infec-tion avoids detection by search enginesecurity scanners. Network Security,2009(9):1, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700935.

Anonymous:2009:ITM

[2981] Anonymous. ID theft malware onthe increase. Network Security, 2009(9):1–2, September 2009. CODEN

Page 369: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 369

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700947.

Anonymous:2009:ULD

[2982] Anonymous. US lab develops fed-erated model for defence against cy-ber attack. Network Security, 2009(9):2, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700959.

Anonymous:2009:Bi

[2983] Anonymous. In brief. Network Se-curity, 2009(9):3, September 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809700960.

Abraham:2009:WC

[2984] Dave Abraham. Why 2FA in thecloud? Network Security, 2009(9):4–5, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700972.

Garlick:2009:HBO

[2985] Nick Garlick and Nebulas SolutionsGroup. The hidden benefits of opti-mising your firewall. Network Security,2009(9):6–9, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700984.

Everett:2009:MAD

[2986] Cath Everett. Moving across to thedark side. Network Security, 2009(9):10–12, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809700996.

Sridevi:2009:NAE

[2987] R. Sridevi, A. Damodaram, andS. V. L. Narasimham. A novelarchitecture for enhanced securitythrough virtualisation and spoof-ing. Network Security, 2009(9):12–16, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348580970100X.

Forte:2009:CVB

[2988] Dario Forte. Compliance vs busi-ness security. Network Security, 2009(9):16–18, September 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701011.

Goucher:2009:CSS

[2989] Wendy Goucher. Carpe sus: secu-rity in the time of swine flu. NetworkSecurity, 2009(9):18–20, September2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809701023.

Anonymous:2009:ECi

[2990] Anonymous. Events calendar. Net-work Security, 2009(9):20, September

Page 370: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 370

2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809701035.

Anonymous:2009:WRL

[2991] Anonymous. Wireless researchers learnto see through walls. Network Security,2009(10):1–2, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701047.

Anonymous:2009:DNF

[2992] Anonymous. DHS needs to fixweb site security. Network Security,2009(10):2, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701059.

Anonymous:2009:SBM

[2993] Anonymous. Spam-borne malware ison the rise. Network Security, 2009(10):2, 19, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701060.

Anonymous:2009:Bj

[2994] Anonymous. In brief. NetworkSecurity, 2009(10):3, October 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809701072.

Lowe:2009:SPB

[2995] Nick Lowe. Shields up! Pro-tecting browsers, endpoints and

enterprises against web-based at-tacks. Network Security, 2009(10):4–7, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701084.

Walsh:2009:BFC

[2996] Patrick J. Walsh. The brighten-ing future of cloud security. Net-work Security, 2009(10):7–10, October2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809701096.

Storey:2009:SPC

[2997] Dominic Storey. Securing process con-trol networks. Network Security, 2009(10):10–13, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701102.

Agrawal:2009:MVO

[2998] A. Agrawal and R. A. Khan. Mea-suring the vulnerability of an object-oriented design. Network Security, 2009(10):13–17, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701114.

Forte:2009:SVR

[2999] Dario Forte. SSL VPN and re-turn on investment: a possible com-bination. Network Security, 2009(10):17–19, October 2009. CODENNTSCF5. ISSN 1353-4858 (print),

Page 371: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 371

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701126.

Anonymous:2009:AMS

[3000] Anonymous. Advertising malwarescammers get smarter. Network Se-curity, 2009(10):19–20, October 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809701138.

Anonymous:2009:ELD

[3001] Anonymous. Europe leaves dooropen for three-strikes policy. Net-work Security, 2009(10):20, October2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348580970114X.

Anonymous:2009:ECj

[3002] Anonymous. Events calendar. Net-work Security, 2009(10):20, October2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809701151.

Anonymous:2009:ADF

[3003] Anonymous. Adobe design flawalleged. Network Security, 2009(11):1–2, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701163.

Anonymous:2009:IEF

[3004] Anonymous. IPS equipment fails tomake grade. Network Security, 2009(11):2, November 2009. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701175.

Anonymous:2009:WAV

[3005] Anonymous. Web applicationsvulnerabilities severe, says Cen-zic. Network Security, 2009(11):2, 20, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701187.

Anonymous:2009:Bk

[3006] Anonymous. In brief. Network Se-curity, 2009(11):3, November 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809701199.

Iyer:2009:NAS

[3007] Sudha Iyer. New approaches to secur-ing the database. Network Security,2009(11):4–8, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701205.

Jones:2009:RMT

[3008] Andy Jones. Recycling more than yourIT equipment. Network Security, 2009(11):8–9, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701217.

Page 372: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 372

Xirasagar:2009:SIN

[3009] Sindhu Xirasagar and Masoud Moj-tahed. Securing IP networks, PartI. Network Security, 2009(11):10–14, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701229.

Storey:2009:CFH

[3010] Dominic Storey. Catching flies withhoney tokens. Network Security, 2009(11):15–18, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701230.

Forte:2009:IRI

[3011] Dario Forte. Is it really importantto have a structured security bud-get? Network Security, 2009(11):18–20, November 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485809701242.

Anonymous:2009:ECk

[3012] Anonymous. Events calendar. Net-work Security, 2009(11):20, November2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485809701254.

Anonymous:2009:WCT

[3013] Anonymous. WPA cracking toollaunched. Network Security, 2009(12):1–2, December 2009. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700015.

Anonymous:2009:GLD

[3014] Anonymous. Google launches DNSserver. Network Security, 2009(12):2, December 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700027.

Anonymous:2009:MRD

[3015] Anonymous. Malware rebounds as dataloss cause. Network Security, 2009(12):2, 20, December 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700039.

Anonymous:2009:Bl

[3016] Anonymous. In brief. Network Se-curity, 2009(12):3, December 2009.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700040.

Lin:2009:AMD

[3017] Phillip Lin. Anatomy of the Mega-D takedown. Network Security, 2009(12):4–7, December 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700052.

Heron:2009:AES

[3018] Simon Heron. Advanced Encryp-tion Standard (AES). Network Secu-rity, 2009(12):8–12, December 2009.

Page 373: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 373

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700064.

Yang:2009:CGA

[3019] Seung S. Yang and Hongsik Choi. Acomplement to the GridOne authenti-cation method. Network Security, 2009(12):12–18, December 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700076.

Forte:2009:ADP

[3020] Dario Forte. Application deliv-ery: pros and cons both virtual andreal. Network Security, 2009(12):18–20, December 2009. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700088.

Anonymous:2009:ECl

[3021] Anonymous. Events calendar. Net-work Security, 2009(12):20, December2009. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581070009X.

Anonymous:2010:AHS

[3022] Anonymous. Aurora hack spawnswidespread concern. Network Security,2010(1):1–2, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700106.

Anonymous:2010:GCS

[3023] Anonymous. Google challenged onsearch privacy. Network Security, 2010(1):2, 20, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700118.

Anonymous:2010:Ba

[3024] Anonymous. In brief. Network Secu-rity, 2010(1):3, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070012X.

Fergusonnam:2010:BF

[3025] Rik Fergusonnam. Back to thefuture. Network Security, 2010(1):4–7, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700131.

Furnell:2010:MSA

[3026] Steven Furnell. Mac security: AnApple that can’t be bitten? Net-work Security, 2010(1):7–11, January2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700143.

Mansfield-Devine:2010:PS

[3027] Steve Mansfield-Devine. The perilsof sharing. Network Security, 2010(1):11–13, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700155.

Page 374: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 374

Xirasagar:2010:SIN

[3028] Sindhu Xirasagar and Masoud Moj-tahed. Securing IP networks. Net-work Security, 2010(1):13–17, January2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700167.

Forte:2010:RIR

[3029] Dario V. Forte. The respon-sibilities of an incident respon-der. Network Security, 2010(1):18–19, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700179.

Anonymous:2010:OCR

[3030] Anonymous. Online criminals replacingbrawn with brain. Network Security,2010(1):20, January 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700180.

Anonymous:2010:ECa

[3031] Anonymous. Events calendar. Net-work Security, 2010(1):20, January2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700192.

Anonymous:2010:NIE

[3032] Anonymous. New Internet Explorerbug emerges. Network Security, 2010(2):1–2, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700209.

Anonymous:2010:SCB

[3033] Anonymous. SpyEye continues bat-tle of the botnets. Network Security,2010(2):2, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700210.

Anonymous:2010:Bb

[3034] Anonymous. In brief. NetworkSecurity, 2010(2):3, February 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700222.

Brandt:2010:WAA

[3035] Andrew Brandt and Zachary Wolff.When admins attack: 30 hoursin the life of a Gumblar vic-tim. Network Security, 2010(2):4–8, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700234.

Rowan:2010:NWS

[3036] Tom Rowan. Negotiating WiFisecurity. Network Security, 2010(2):8–12, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700246.

Page 375: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 375

Goode:2010:MMS

[3037] Alan Goode. Managing mobile se-curity: How are we doing? Net-work Security, 2010(2):12–15, February2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700258.

McPherson:2010:CGC

[3038] Danny McPherson. Cybercrime— a game of cat and mouse in2009. Network Security, 2010(2):15–18, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070026X.

Forte:2010:PIH

[3039] Dario Forte. Preventing and investi-gating hacking by auditing web ap-plications. Network Security, 2010(2):18–20, February 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700271.

Anonymous:2010:ECb

[3040] Anonymous. Events calendar. Net-work Security, 2010(2):20, February2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700283.

Anonymous:2010:BBS

[3041] Anonymous. Botherders battle tostay online. Network Security, 2010(3):1–2, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700295.

Anonymous:2010:RIC

[3042] Anonymous. Researcher issues code foryet another IE flaw. Network Secu-rity, 2010(3):2, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700301.

Anonymous:2010:SUS

[3043] Anonymous. SSD used to speed uppassword cracking. Network Secu-rity, 2010(3):2, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700313.

Anonymous:2010:Bc

[3044] Anonymous. In brief. Network Secu-rity, 2010(3):3, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700325.

Mansfield-Devine:2010:DCT

[3045] Steve Mansfield-Devine. Divide andconquer: the threats posed by hybridapps and HTML 5. Network Secu-rity, 2010(3):4–6, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700337.

Wicherski:2010:PLI

[3046] Georg Wicherski. Placing a low-interaction honeypot in-the-wild: A re-

Page 376: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 376

view of mwcollectd. Network Secu-rity, 2010(3):7–8, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700349.

Janssen:2010:VS

[3047] Robert Janssen. VDI and se-curity. Network Security, 2010(3):8–11, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700350.

Corrons:2010:RRN

[3048] Luis Corrons. The rise and riseof NDR. Network Security, 2010(3):12–16, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700362.

Chandra:2010:CCO

[3049] S. Chandra and R. A. Khan. Confi-dentiality checking an object-orientedclass hierarchy. Network Security,2010(3):16–20, March 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700374.

Anonymous:2010:ECc

[3050] Anonymous. Events calendar. Net-work Security, 2010(3):20, March2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700386.

Anonymous:2010:PARa

[3051] Anonymous. PDF attacks on therise, says Symantec. Network Secu-rity, 2010(4):1–2, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700398.

Anonymous:2010:EMS

[3052] Anonymous. Extortion malwarescares file sharers with fake copy-right messages. Network Security,2010(4):2, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700404.

Anonymous:2010:PARb

[3053] Anonymous. PAC attack redirectsbrowsers to malicious sites usingproxy hack. Network Security, 2010(4):2, 20, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700416.

Anonymous:2010:Bd

[3054] Anonymous. In brief. Network Secu-rity, 2010(4):3, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700428.

Portnoy:2010:PWA

[3055] Aaron Portnoy. Pwn2Own wrapup and analysis. Network Security,2010(4):4–5, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),

Page 377: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 377

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070043X.

Wood:2010:BWS

[3056] Paul Wood. Bot wars: the spam-mers strike back. Network Security,2010(4):5–8, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700441.

Cluley:2010:SMT

[3057] Graham Cluley. Sizing up the mal-ware threat — key malware trendsfor 2010. Network Security, 2010(4):8–10, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700453.

Eisen:2010:CFM

[3058] Ori Eisen. Catching the fraud-ulent Man-in-the-Middle and Man-in-the-Browser. Network Security,2010(4):11–12, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700465.

Carnie:2010:PSM

[3059] James Carnie. Preserving securityin a multi-tenanted hosting envi-ronment. Network Security, 2010(4):12–15, April 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700477.

Vlissidis:2010:TCS

[3060] Paul Vlissidis and Matthew Hickey.Thin clients: slim security? Net-work Security, 2010(4):16–19, April2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700489.

Anonymous:2010:NSF

[3061] Anonymous. Network security fixesWordPress configuration hole. Net-work Security, 2010(4):20, April 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700490.

Anonymous:2010:ECd

[3062] Anonymous. Events calendar. Net-work Security, 2010(4):20, April 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700507.

Anonymous:2010:FUA

[3063] Anonymous. Facebook under at-tack on all fronts. Network Secu-rity, 2010(5):1–2, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700519.

Anonymous:2010:GAS

[3064] Anonymous. Google ‘accidentally’snooped on wifi data. Network Secu-rity, 2010(5):2, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700520.

Page 378: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 378

Anonymous:2010:Be

[3065] Anonymous. In brief. Network Secu-rity, 2010(5):3, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700532.

Mansfield-Devine:2010:BB

[3066] Steve Mansfield-Devine. Battle ofthe botnets. Network Security,2010(5):4–6, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700544.

Steiner:2010:WFN

[3067] Paul Steiner. Why FTP is no longerup to the job. Network Security,2010(5):7–9, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700556.

Heron:2010:DSM

[3068] Simon Heron. Denial of service: moti-vations and trends. Network Security,2010(5):10–12, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700568.

Davis:2010:MTP

[3069] Adrian Davis. Managing third par-ties — an information security per-spective. Network Security, 2010(5):13–15, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070057X.

Bradbury:2010:SCC

[3070] Danny Bradbury. Shadows in thecloud: Chinese involvement in ad-vanced persistent threats. NetworkSecurity, 2010(5):16–19, May 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700581.

Anonymous:2010:BUI

[3071] Anonymous. Browsers uniquelyidentify users. Network Security,2010(5):19, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700593.

Anonymous:2010:IFC

[3072] Anonymous. India fears cyberspy-ing by China. Network Security,2010(5):19–20, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070060X.

Anonymous:2010:TCD

[3073] Anonymous. Twitter commandsDIY botnets. Network Security,2010(5):20, May 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700611.

Page 379: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 379

Anonymous:2010:VW

[3074] Anonymous. Virtualisation worries.Network Security, 2010(5):20, May2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700623.

Anonymous:2010:ECe

[3075] Anonymous. Events calendar. Net-work Security, 2010(5):20, May 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700635.

Anonymous:2010:RIS

[3076] Anonymous. Reduce IT security costswithout increasing risk. Network Secu-rity, 2010(6):1–2, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700763.

Anonymous:2010:NVH

[3077] Anonymous. New ventures help devel-opers in fight against security flaws.Network Security, 2010(6):2, June2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700775.

Anonymous:2010:WFD

[3078] Anonymous. Windows flaw disclosurecauses fierce debate. Network Secu-rity, 2010(6):2, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700787.

Anonymous:2010:Bf

[3079] Anonymous. In brief. Network Secu-rity, 2010(6):3, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700799.

Karrenberg:2010:DSG

[3080] Daniel Karrenberg. DNSSEC: Se-curing the global infrastructure ofthe Internet. Network Security,2010(6):4–6, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700805.

Aljawarneh:2010:SWS

[3081] Shadi Aljawarneh, Shadi Masadeh, andFaisal Alkhateeb. A secure wifi sys-tem for wireless networks: an experi-mental evaluation. Network Security,2010(6):6–12, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700817.

Bradbury:2010:HSW

[3082] Danny Bradbury. A hole in the securitywall: ATM hacking. Network Security,2010(6):12–15, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700829.

Hamelin:2010:PFM

[3083] Michael Hamelin. Preventing fire-wall meltdowns. Network Security,2010(6):15–16, June 2010. CODEN

Page 380: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 380

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700830.

Martin:2010:PCC

[3084] Luther Martin. Protecting creditcard information: encryption vs to-kenisation. Network Security, 2010(6):17–19, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700842.

Anonymous:2010:ALP

[3085] Anonymous. AT&T leaks privatedata of Apple customers — twice.Network Security, 2010(6):20, June2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700854.

Anonymous:2010:FSR

[3086] Anonymous. Facebook suffers fromrash of clickjacking. Network Secu-rity, 2010(6):20, June 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700866.

Anonymous:2010:ECf

[3087] Anonymous. Events calendar. Net-work Security, 2010(6):20, June 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700878.

Anonymous:2010:SV

[3088] Anonymous. Smartphone vul-nerabilities. Network Security,2010(7):2, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070088X.

Anonymous:2010:MIS

[3089] Anonymous. Malware-infested spamon the rise. Network Security,2010(7):2, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700891.

Anonymous:2010:Bg

[3090] Anonymous. In brief. Network Secu-rity, 2010(7):3, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700908.

Joffee:2010:CGE

[3091] Rodney Joffee. Cybercrime: theglobal epidemic at your network door.Network Security, 2010(7):4–7, July2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581070091X.

Bradbury:2010:HME

[3092] Danny Bradbury. Hands-on withMetasploit Express. Network Secu-rity, 2010(7):7–11, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700921.

Page 381: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 381

Schiavo:2010:CSE

[3093] Jay Schiavo. Code signing for end-user peace of mind. Network Security,2010(7):11–13, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700933.

Eisen:2010:OSN

[3094] Ori Eisen. Online security — a newstrategic approach. Network Security,2010(7):14–15, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700945.

Ward:2010:CSM

[3095] Des Ward. The cost of savingmoney: no longer the company rep-utation. Network Security, 2010(7):15–19, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700957.

Anonymous:2010:DND

[3096] Anonymous. Disclosure and non-disclosure. Network Security, 2010(7):19–20, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700969.

Anonymous:2010:SFS

[3097] Anonymous. Software flaws setto double. Network Security,2010(7):20, July 2010. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810700970.

Anonymous:2010:TTT

[3098] Anonymous. Twitter told to tightensecurity. Network Security, 2010(7):20, July 2010. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485810700982.

Anonymous:2010:ECg

[3099] Anonymous. Events calendar. Net-work Security, 2010(7):20, July 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810700994.

Anonymous:2010:IBM

[3100] Anonymous. Intel buys McAfee. Net-work Security, 2010(8):1–2, August2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701008.

Anonymous:2010:BDH

[3101] Anonymous. Black Hat and DefConhighlights. Network Security, 2010(8):2, 20, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070101X.

Anonymous:2010:Bh

[3102] Anonymous. In brief. Network Secu-rity, 2010(8):3, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),

Page 382: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 382

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701021.

Gold:2010:CP

[3103] Steve Gold. Cracking passwords. Net-work Security, 2010(8):4–7, August2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701033.

Storey:2010:TCN

[3104] Dominic Storey. Ten consequences ofnetwork blindness. Network Security,2010(8):7–9, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701045.

Kim:2010:SGF

[3105] Seong-Hwan Kim, Sundar Vedantham,and Pravin Pathak. SMB gatewayfirewall implementation using a net-work processor. Network Security,2010(8):10–15, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701057.

Smith:2010:CDS

[3106] Graham Smith. Countering datacentresecurity pressures. Network Security,2010(8):15–17, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701069.

Midgley:2010:SEE

[3107] Stephen Midgley. The state of en-cryption in Europe: some culturalcomparisons. Network Security, 2010(8):18–19, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701070.

Anonymous:2010:DMC

[3108] Anonymous. Did malware causeSpanair crash? Network Security,2010(8):20, August 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701082.

Anonymous:2010:PZ

[3109] Anonymous. Phishing down, Zeus up.Network Security, 2010(8):20, August2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701094.

Anonymous:2010:ECh

[3110] Anonymous. Events calendar. Net-work Security, 2010(8):20, August2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701100.

Anonymous:2010:SMW

[3111] Anonymous. Stuxnet may bethe work of state-backed hack-ers. Network Security, 2010(9):1–2, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),

Page 383: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 383

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701112.

Anonymous:2010:WLB

[3112] Anonymous. Wins and losses in thebotnet war. Network Security, 2010(9):2, 19, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701124.

Anonymous:2010:Bi

[3113] Anonymous. In brief. Network Se-curity, 2010(9):3, September 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701136.

Bransfield-Garth:2010:MPC

[3114] Simon Bransfield-Garth. Mobile phonecalls as a business risk. NetworkSecurity, 2010(9):4–11, September2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701148.

Taylor:2010:FIP

[3115] Mark Taylor, John Haggerty, DavidGresty, and Paul Fergus. Foren-sic investigation of peer-to-peer net-works. Network Security, 2010(9):12–15, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070115X.

Gold:2010:PA

[3116] Steve Gold. Password alterna-tives. Network Security, 2010(9):16–19, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701161.

Anonymous:2010:CAF

[3117] Anonymous. Corporate attacks fo-cus on web. Network Security, 2010(9):19–20, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701173.

Anonymous:2010:SPM

[3118] Anonymous. Smartphones present ma-jor threat. Network Security, 2010(9):20, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701185.

Anonymous:2010:HPA

[3119] Anonymous. Hacking popular amongstudents. Network Security, 2010(9):20, September 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701197.

Anonymous:2010:ECi

[3120] Anonymous. Events calendar. Net-work Security, 2010(9):20, September2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701203.

Page 384: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 384

Anonymous:2010:SRI

[3121] Anonymous. Stuxnet: rumours in-crease, infections spread. Network Se-curity, 2010(10):1–2, October 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701215.

Anonymous:2010:TR

[3122] Anonymous. Threat round-up. Net-work Security, 2010(10):2, October2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701227.

Anonymous:2010:Bj

[3123] Anonymous. In brief. NetworkSecurity, 2010(10):3, October 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701239.

Papadaki:2010:VMA

[3124] Maria Papadaki and Steven Furnell.Vulnerability management: an atti-tude of mind? Network Security,2010(10):4–8, October 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701240.

Perche:2010:NLA

[3125] Patrice Perche. Network latency: avoidpaying a tax on time. Network Security,2010(10):9–12, October 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701252.

Zaitsev:2010:SKP

[3126] Oleg Zaitsev. Skeleton keys: thepurpose and applications of keylog-gers. Network Security, 2010(10):12–17, October 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701264.

Knight:2010:IDF

[3127] Eric Knight. Investigating digi-tal fingerprints: advanced log anal-ysis. Network Security, 2010(10):17–20, October 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701276.

Anonymous:2010:ECj

[3128] Anonymous. Events calendar. Net-work Security, 2010(10):20, October2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701288.

Anonymous:2010:BBT

[3129] Anonymous. Bredolab botnet takendown. Network Security, 2010(11):1–2, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581070129X.

Anonymous:2010:ZMF

[3130] Anonymous. Zeus makes final ap-pearance? Network Security, 2010(11):2, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),

Page 385: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 385

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701306.

Anonymous:2010:AVM

[3131] Anonymous. Anti-virus for Macs. Net-work Security, 2010(11):2, November2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701318.

Anonymous:2010:Bk

[3132] Anonymous. In brief. Network Se-curity, 2010(11):3, November 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581070132X.

Bradbury:2010:AUH

[3133] Danny Bradbury. Avoiding URLhell. Network Security, 2010(11):4–6, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701331.

Walters:2010:MPU

[3134] Richard Walters. Managing privi-leged user activity in the datacen-tre. Network Security, 2010(11):6–10, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701343.

Gold:2010:SET

[3135] Steve Gold. Social engineeringtoday: psychology, strategies andtricks. Network Security, 2010(11):

11–14, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701355.

Boroditsky:2010:CCW

[3136] Marc Boroditsky. Click, click, who’sthere? Network Security, 2010(11):14–16, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701367.

Warmack:2010:CTT

[3137] Rob Warmack. Compliance today —and tomorrow. Network Security, 2010(11):16–18, November 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701379.

Cavalancia:2010:PDL

[3138] Nick Cavalancia. Preventing dataloss by securing USB ports. NetworkSecurity, 2010(11):18–20, November2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701380.

Anonymous:2010:ECk

[3139] Anonymous. Events calendar. Net-work Security, 2010(11):20, November2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701392.

Page 386: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 386

Anonymous:2010:PNY

[3140] Anonymous. Predictions for theNew Year. Network Security, 2010(12):1–2, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701409.

Anonymous:2010:MUM

[3141] Anonymous. More users means se-curity challenges. Network Security,2010(12):2, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701410.

Anonymous:2010:HPS

[3142] Anonymous. Higher priority for se-curity. Network Security, 2010(12):2, 20, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701422.

Anonymous:2010:Bl

[3143] Anonymous. In brief. Network Se-curity, 2010(12):3, December 2010.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701434.

Dinoor:2010:PIM

[3144] Shlomi Dinoor. Privileged iden-tity management: securing the en-terprise. Network Security, 2010(12):4–6, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701446.

Ridley:2010:OSF

[3145] Philip Ridley. Outsmarting the smart-phone fraudsters. Network Security,2010(12):7–9, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701458.

Gold:2010:PCA

[3146] Steve Gold. Protecting the cloud: at-tack vectors and other exploits. Net-work Security, 2010(12):10–12, De-cember 2010. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S135348581070146X.

Furnell:2010:UVC

[3147] Steven Furnell. Usability versus com-plexity — striking the balance in end-user security. Network Security, 2010(12):13–17, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701471.

Ranum:2010:WMT

[3148] Marcus Ranum. The well-meaningthreat. Network Security, 2010(12):17–19, December 2010. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485810701483.

Page 387: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 387

Anonymous:2010:UPP

[3149] Anonymous. US public-private part-nership for cyber-security. Net-work Security, 2010(12):20, December2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701495.

Anonymous:2010:ECl

[3150] Anonymous. Events calendar. Net-work Security, 2010(12):20, December2010. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485810701501.

Anonymous:2011:SPF

[3151] Anonymous. Security professionalsfocus on yesterday’s skills. Net-work Security, 2011(1):1–2, January2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700010.

Anonymous:2011:WSC

[3152] Anonymous. Wifi security cracked.Network Security, 2011(1):2, 20, Jan-uary 2011. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485811700022.

Anonymous:2011:Ba

[3153] Anonymous. In brief. Network Secu-rity, 2011(1):3, January 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700034.

Mansfield-Devine:2011:AST

[3154] Steve Mansfield-Devine. Anony-mous: serious threat or mere an-noyance? Network Security, 2011(1):4–10, January 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700046.

Amoroso:2011:CAA

[3155] Edward G. Amoroso. Cyber attacks:awareness. Network Security, 2011(1):10–16, January 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700058.

Gold:2011:AET

[3156] Steve Gold. Advanced evasion tech-niques. Network Security, 2011(1):16–19, January 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581170006X.

Anonymous:2011:PT

[3157] Anonymous. Passwords not up tothe task. Network Security, 2011(1):20, January 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700071.

Anonymous:2011:DLR

[3158] Anonymous. Data leaks result frommalicious intent. Network Security,2011(1):20, January 2011. CODENNTSCF5. ISSN 1353-4858 (print),

Page 388: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 388

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700083.

Anonymous:2011:ECa

[3159] Anonymous. Events calendar. Net-work Security, 2011(1):20, January2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700095.

Anonymous:2011:STC

[3160] Anonymous. Sinister trends in cy-berthreats. Network Security, 2011(2):2, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700101.

Anonymous:2011:EGR

[3161] Anonymous. European guidelines forresilience and cyber-security. NetworkSecurity, 2011(2):2, 19–20, February2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700113.

Anonymous:2011:Bb

[3162] Anonymous. In brief. NetworkSecurity, 2011(2):3, February 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700125.

Durbin:2011:ISB

[3163] Steve Durbin. Information securitywithout boundaries. Network Security,2011(2):4–8, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700137.

Bradbury:2011:HWE

[3164] Danny Bradbury. Hacking wifi theeasy way. Network Security, 2011(2):9–12, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700149.

Gold:2011:FF

[3165] Steve Gold. The future of the fire-wall. Network Security, 2011(2):13–15, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700150.

Ting:2011:TTA

[3166] David Ting. Thinking thin: ad-dressing the challenges of client com-puting. Network Security, 2011(2):16–17, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700162.

Hamelin:2011:PFA

[3167] Michael Hamelin. Preparing for a fire-wall audit. Network Security, 2011(2):18–19, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700174.

Page 389: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 389

Anonymous:2011:ZSH

[3168] Anonymous. Zeus and SpyEye hy-brid emerges. Network Security,2011(2):20, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700186.

Anonymous:2011:WMC

[3169] Anonymous. Waledac makes acomeback. Network Security, 2011(2):20, February 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700198.

Anonymous:2011:ECb

[3170] Anonymous. Events calendar. Net-work Security, 2011(2):20, February2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700204.

Anonymous:2011:RZO

[3171] Anonymous. The resurgence of Zeusand other banking Trojans. Net-work Security, 2011(3):2, March 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700216.

Anonymous:2011:NHO

[3172] Anonymous. Nearly half of organ-isations are not protected. Net-work Security, 2011(3):2, 20, March2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700228.

Anonymous:2011:Bc

[3173] Anonymous. In brief. Network Secu-rity, 2011(3):3, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581170023X.

Taylor:2011:FIC

[3174] Mark Taylor, John Haggerty, DavidGresty, and David Lamb. Foren-sic investigation of cloud comput-ing systems. Network Security, 2011(3):4–10, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700241.

Sanderson:2011:SDP

[3175] Russell Sanderson. A secure data pro-tection strategy. Network Security,2011(3):10–12, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700253.

Aljawarneh:2011:WES

[3176] Shadi Aljawarneh. A web engi-neering security methodology for e-learning systems. Network Security,2011(3):12–15, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700265.

Gold:2011:IMS

[3177] Steve Gold. IPv6 migration andsecurity. Network Security, 2011(3):15–18, March 2011. CODEN

Page 390: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 390

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700277.

Lesnykh:2011:DLP

[3178] Alexei Lesnykh. Data loss preven-tion: a matter of discipline. Net-work Security, 2011(3):18–19, March2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700289.

Anonymous:2011:XTN

[3179] Anonymous. OS X Trojan nowin beta. Network Security, 2011(3):20, March 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700290.

Anonymous:2011:ECc

[3180] Anonymous. Events calendar. Net-work Security, 2011(3):20, March2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700307.

Anonymous:2011:RHL

[3181] Anonymous. RSA hack leaves statusof SecurID uncertain. Network Secu-rity, 2011(4):1–2, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700319.

Anonymous:2011:FAS

[3182] Anonymous. Few aware of smart-phone vulnerability. Network Security,

2011(4):2, 20, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700320.

Anonymous:2011:Bd

[3183] Anonymous. In brief. Network Secu-rity, 2011(4):3, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700332.

Anonymous:2011:BRSa

[3184] Anonymous. Book review: Secu-rity for Microsoft Windows SystemsAdministrators, by Derrick Roun-tree. Published by Syngress (ISBN978-1-59749-594-3, e-ISBN 978-1-59749-595-0). Network Security,2011(4):4, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700344.

Anonymous:2011:MWA

[3185] Anonymous. Microsoft Windows 7 ad-ministrator’s reference. Network Secu-rity, 2011(4):4, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700356.

Anonymous:2011:NBa

[3186] Anonymous. News in brief. Net-work Security, 2011(4):4, April 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700368.

Page 391: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 391

Caldwell:2011:SS

[3187] Tracey Caldwell. Smart security.Network Security, 2011(4):5–9, April2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581170037X.

Kemshall:2011:WMT

[3188] Andy Kemshall. Why mobile two-factor authentication makes sense. Net-work Security, 2011(4):9–12, April2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700381.

Gold:2011:CG

[3189] Steve Gold. Cracking GSM. Net-work Security, 2011(4):12–15, April2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700393.

Blandford:2011:ISC

[3190] Richard Blandford. Information secu-rity in the cloud. Network Security,2011(4):15–17, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581170040X.

Jenkins:2011:LLS

[3191] Steve Jenkins. Learning to loveSIEM. Network Security, 2011(4):18–19, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700411.

Anonymous:2011:USU

[3192] Anonymous. Utilities still un-der threat. Network Security,2011(4):20, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700423.

Anonymous:2011:Ca

[3193] Anonymous. Calendar. Network Secu-rity, 2011(4):20, April 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700435.

Anonymous:2011:UGT

[3194] Anonymous. US Government takesover Coreflood botnet. Network Secu-rity, 2011(5):1–2, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700447.

Anonymous:2011:NUF

[3195] Anonymous. NSS uncovers fire-wall shortcomings. Network Security,2011(5):2, 19, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700459.

Anonymous:2011:Be

[3196] Anonymous. In brief. Network Secu-rity, 2011(5):3, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700460.

Page 392: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 392

Anonymous:2011:BRCa

[3197] Anonymous. Book review: Com-puter Networks: a systems approach,by Larry Peterson and Bruce Davie.Fifth Edition. Morgan Kaufman. ISBN978-0-12-385059-1. Network Secu-rity, 2011(5):4, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700472.

Anonymous:2011:NBb

[3198] Anonymous. News in brief. Net-work Security, 2011(5):4, May 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700484.

Bradbury:2011:RAC

[3199] Danny Bradbury. Routing around cen-sorship. Network Security, 2011(5):5–8, May 2011. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485811700496.

Sood:2011:SBD

[3200] Aditya K. Sood and Richard J. En-body. Spying on the browser: dis-secting the design of malicious ex-tensions. Network Security, 2011(5):8–12, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700502.

Gold:2011:TBa

[3201] Steve Gold. Taking down bot-nets. Network Security, 2011

(5):13–15, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700514.

Jammalamadaka:2011:DSM

[3202] Ravi Chandra Jammalamadaka, SharadMehrotra, Nalini Venkatasubramanian,and Kent Seamons. DataVault: se-cure mobile access and data sharing.Network Security, 2011(5):16–19, May2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700526.

Anonymous:2011:EQS

[3203] Anonymous. EU questions stabilityof the Internet. Network Security,2011(5):19–20, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700538.

Anonymous:2011:HMP

[3204] Anonymous. Hackers may be‘pimping’ data. Network Security,2011(5):20, May 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581170054X.

Anonymous:2011:ECd

[3205] Anonymous. Events calendar. Net-work Security, 2011(5):20, May 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700551.

Page 393: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 393

Anonymous:2011:RRS

[3206] Anonymous. RSA replacing Se-curID tokens. Network Security,2011(6):1–2, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700563.

Anonymous:2011:GSP

[3207] Anonymous. Google spear-phishingtargets governments and military. Net-work Security, 2011(6):2, 20, June2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700575.

Anonymous:2011:Bf

[3208] Anonymous. In brief. Network Secu-rity, 2011(6):3, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700587.

Anonymous:2011:BRI

[3209] Anonymous. Book review: IPv6for Enterprise Networks, by Shan-non McFarland, Muninder Sambi,Nikhil Sharma, and Sanjay Hooda.Cisco Press. ISBN 978-1-58714-227-7. Network Security, 2011(6):4, June2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700599.

Anonymous:2011:BRPa

[3210] Anonymous. Book review: PKI Un-covered, Andre Karamanian, SrinivasTenneti, Francois Dessart. Cisco Press.

ISBN 978-1-58705-916-2. Network Se-curity, 2011(6):4, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700605.

Durbin:2011:TCT

[3211] Steve Durbin. Tackling convergedthreats: building a security-positiveenvironment. Network Security,2011(6):5–8, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700617.

Caldwell:2011:WWC

[3212] Tracey Caldwell. When worlds col-lide: the security of converged net-works. Network Security, 2011(6):8–12, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700629.

Hudson:2011:WMH

[3213] Jeff Hudson. Weaponised mal-ware: how criminals use digitalcertificates to cripple your organ-isation. Network Security, 2011(6):12–14, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700630.

Gold:2011:RP

[3214] Steve Gold. The rebirth of phreaking.Network Security, 2011(6):15–17, June2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 394: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 394

URL http://www.sciencedirect.

com/science/article/pii/S1353485811700642.

Hocking:2011:TCS

[3215] Marc Hocking. Thin client secu-rity in the cloud. Network Security,2011(6):17–19, June 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700654.

Anonymous:2011:MMA

[3216] Anonymous. More malware for An-droid. Network Security, 2011(6):20, June 2011. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485811700666.

Anonymous:2011:ECe

[3217] Anonymous. Events calendar. Net-work Security, 2011(6):20, June 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700678.

Anonymous:2011:HCH

[3218] Anonymous. High costs but higherprofits with targeted attacks. Net-work Security, 2011(7):1–2, July 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581170068X.

Anonymous:2011:FTF

[3219] Anonymous. Firms turn down freedata breach audits. Network Secu-rity, 2011(7):2, July 2011. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700691.

Anonymous:2011:Bg

[3220] Anonymous. In brief. Network Secu-rity, 2011(7):3, July 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700708.

Anonymous:2011:BRCb

[3221] Anonymous. Book review: Cisco Fire-walls, by Alexandre Moraes. CiscoPress. ISBN 978-1-58714-109-6. Net-work Security, 2011(7):4, July 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581170071X.

Anonymous:2011:BRCc

[3222] Anonymous. Book review: Cisco Fire-walls, by Alexandre Moraes. CiscoPress. ISBN 978-1-58714-109-6. Net-work Security, 2011(7):4, July 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700721.

Gold:2011:TBb

[3223] Steve Gold. Terrorism and Bluetooth.Network Security, 2011(7):5–7, July2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700733.

Gragido:2011:BZA

[3224] Will Gragido. Beyond zero: analysingthreat trends. Network Security,

Page 395: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 395

2011(7):7–9, July 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700745.

Caldwell:2011:EHP

[3225] Tracey Caldwell. Ethical hackers:putting on the white hat. Net-work Security, 2011(7):10–13, July2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700757.

Sreenivas:2011:DKB

[3226] R. Sreeram Sreenivas and R. Anitha.Detecting keyloggers based on traf-fic analysis with periodic behaviour.Network Security, 2011(7):14–19, July2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700769.

Anonymous:2011:WLW

[3227] Anonymous. Wins and losses inthe war on botnets. Network Secu-rity, 2011(7):20, July 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700770.

Anonymous:2011:AQF

[3228] Anonymous. Al-Qaeda forum knockedoffline. Network Security, 2011(7):20, July 2011. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485811700782.

Anonymous:2011:ECf

[3229] Anonymous. Events calendar. Net-work Security, 2011(7):20, July 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700794.

Anonymous:2011:BDH

[3230] Anonymous. Black Hat and DefConhighlights. Network Security, 2011(8):2, 19–20, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700800.

Anonymous:2011:Bh

[3231] Anonymous. In brief. Network Secu-rity, 2011(8):3, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700812.

Anonymous:2011:BRPb

[3232] Anonymous. Book review: Prac-tical Packet Analysis: using Wire-shark to solve real-world network prob-lems, by Chris Sanders. Second Edi-tion. No Starch Press. ISBN 978-1-59327-266-1. Network Security,2011(8):4, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700824.

Anonymous:2011:Cb

[3233] Anonymous. Correction. NetworkSecurity, 2011(8):4, August 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 396: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 396

URL http://www.sciencedirect.

com/science/article/pii/S1353485811700836.

Mansfield-Devine:2011:HAD

[3234] Steve Mansfield-Devine. Hacktivism:assessing the damage. Network Se-curity, 2011(8):5–13, August 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700848.

Turiel:2011:INT

[3235] Avi Turiel. IPv6: new technology,new threats. Network Security, 2011(8):13–15, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581170085X.

Tankard:2011:APT

[3236] Colin Tankard. Advanced persistentthreats and how to monitor and de-ter them. Network Security, 2011(8):16–19, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700861.

Anonymous:2011:MUF

[3237] Anonymous. Mobile users facemounting threats. Network Security,2011(8):20, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700873.

Anonymous:2011:WAA

[3238] Anonymous. Web apps attacked ev-ery two minutes. Network Security,

2011(8):20, August 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700885.

Anonymous:2011:ECg

[3239] Anonymous. Events calendar. Net-work Security, 2011(8):20, August2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700897.

Anonymous:2011:AHD

[3240] Anonymous. APT hype is a distrac-tion from real security needs, saysGartner. Network Security, 2011(9):1–2, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700903.

Anonymous:2011:AMA

[3241] Anonymous. Android is most-attackedmobile platform. Network Secu-rity, 2011(9):2, 20, September 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700915.

Anonymous:2011:Bi

[3242] Anonymous. In brief. Network Se-curity, 2011(9):3, September 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700927.

Page 397: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 397

Anonymous:2011:BRM

[3243] Anonymous. Book review: Metas-ploit: The Penetration Tester’s Guide,by David Kennedy, Jim O’Gorman,Devon Kearns, and Mati Aharoni.No Starch Press. ISBN 978-1-59327-288-3. Network Security, 2011(9):4, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700939.

Gold:2011:CCN

[3244] Steve Gold. Cracking cellular net-works via femtocells. Network Security,2011(9):5–8, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700940.

Everett:2011:PNT

[3245] Cath Everett. Printers: the ne-glected threat. Network Security, 2011(9):8–11, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700952.

Jammalamadaka:2011:PPD

[3246] Ravi Chandra Jammalamadaka, SharadMehrotra, and Nalini Venkatasubra-manian. Protecting personal datafrom untrusted web-based data ser-vices. Network Security, 2011(9):11–16, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700964.

deJoode:2011:ECS

[3247] Alex de Joode. Effective corporatesecurity and cybercrime. NetworkSecurity, 2011(9):16–18, September2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811700976.

Creasey:2011:PD

[3248] Graeme Creasey. Protecting the dat-acentre. Network Security, 2011(9):18–19, September 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811700988.

Anonymous:2011:ECh

[3249] Anonymous. Events calendar. Net-work Security, 2011(9):20, September2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581170099X.

Anonymous:2011:WSU

[3250] Anonymous. Web security underthreat. Network Security, 2011(10):1–2, 20, October 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701003.

Anonymous:2011:Bj

[3251] Anonymous. In brief. NetworkSecurity, 2011(10):3, October 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701015.

Page 398: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 398

Anonymous:2011:BRBa

[3252] Anonymous. Book review: TheBook of Ruby, Huw Collingbourne.No Starch Press. ISBN 978-1-59327-294-4. Network Security, 2011(10):4, October 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701027.

Anonymous:2011:BRSb

[3253] Anonymous. Book review: SecurityRisk Management, Evan Wheeler. Syn-gress. ISBN 978-1-59749-615-5. Net-work Security, 2011(10):4, October2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701039.

Gold:2011:AI

[3254] Steve Gold. Android insecurity. Net-work Security, 2011(10):5–7, October2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701040.

Sood:2011:FFD

[3255] Aditya K. Sood and Richard J. En-body. Frametrapping the framebust-ing defence. Network Security, 2011(10):8–12, October 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701052.

Harris:2011:DNS

[3256] James Harris. Defending the net-work several times over. Network

Security, 2011(10):12–14, October2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701064.

Nanda:2011:MDS

[3257] Rohan Nanda and P. Venkata Kr-ishna. Mitigating denial of serviceattacks in hierarchical wireless sen-sor networks. Network Security, 2011(10):14–18, October 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701076.

Morrell:2011:CCN

[3258] Richard Morrell and Akash Chan-drashekar. Cloud computing: newchallenges and opportunities. NetworkSecurity, 2011(10):18–19, October2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701088.

Anonymous:2011:SNW

[3259] Anonymous. Social networking inthe workplace. Network Security,2011(10):20, October 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581170109X.

Anonymous:2011:LLA

[3260] Anonymous. Lurid launches attackon Russia. Network Security, 2011(10):20, October 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

Page 399: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 399

//www.sciencedirect.com/science/

article/pii/S1353485811701106.

Anonymous:2011:ECi

[3261] Anonymous. Events calendar. Net-work Security, 2011(10):20, October2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701118.

Anonymous:2011:GWC

[3262] Anonymous. Governments warn ofcyber-security. Network Security, 2011(11):1–2, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581170112X.

Anonymous:2011:CES

[3263] Anonymous. Certificate ecosystem suf-fers further blows. Network Security,2011(11):2, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701131.

Anonymous:2011:NAT

[3264] Anonymous. Nitro attack targetschemical firms. Network Security,2011(11):2, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701143.

Anonymous:2011:Bk

[3265] Anonymous. In brief. Network Se-curity, 2011(11):3, November 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485811701155.

Anonymous:2011:BRCd

[3266] Anonymous. Book review: Comp-TIA Security + Deluxe Study Guide,by Emmett Dulaney. Second edition.Sybex ISBN 978-1-118-01474-5. Net-work Security, 2011(11):4, November2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701167.

Andrus:2011:BSB

[3267] Frank Andrus. Beyond scan and block:an adaptive approach to network ac-cess control. Network Security, 2011(11):5–9, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701179.

Thomson:2011:APU

[3268] Gordon Thomson. APTs: a poorlyunderstood challenge. Network Secu-rity, 2011(11):9–11, November 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701180.

Gheri:2011:BAD

[3269] Klaus Gheri. The benefits of applica-tion detection. Network Security, 2011(11):12–14, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701192.

Page 400: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 400

Gold:2011:CWN

[3270] Steve Gold. Cracking wireless net-works. Network Security, 2011(11):14–18, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701209.

Facey:2011:WCS

[3271] Stuart Facey. Who’s in con-trol: a six-step strategy for secureIT. Network Security, 2011(11):18–20, November 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701210.

Anonymous:2011:ECj

[3272] Anonymous. Events calendar. Net-work Security, 2011(11):20, November2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701222.

Anonymous:2011:DUD

[3273] Anonymous. DDoS used to disruptelections. Network Security, 2011(12):1–2, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701234.

Anonymous:2011:SMF

[3274] Anonymous. Security message fails toget through. Network Security, 2011(12):2, 20, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701246.

Anonymous:2011:Bl

[3275] Anonymous. In brief. Network Se-curity, 2011(12):3, December 2011.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701258.

Anonymous:2011:BRPc

[3276] Anonymous. Book review: Pene-tration Tester’s Open Source Toolkit,by Jeremy Faircloth. Third edi-tion. Syngress. ISBN 978-1-59749-627-8. Network Security, 2011(12):4, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581170126X.

Anonymous:2011:BRBb

[3277] Anonymous. Book review: The Basicsof Hacking and Penetration Testing, byPatrick Engebretson. Syngress. ISBN978-1-59749-655-1. Network Security,2011(12):4, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701271.

Mansfield-Devine:2011:DTM

[3278] Steve Mansfield-Devine. DDoS: threatsand mitigation. Network Security, 2011(12):5–12, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701283.

Page 401: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 401

DHoinne:2011:CWS

[3279] Jeremy D’Hoinne. Could ‘waitand see’ be the best IPv6 strat-egy? Network Security, 2011(12):12–14, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701295.

Gold:2011:UHP

[3280] Steve Gold. Understanding the hackerpsyche. Network Security, 2011(12):15–17, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701301.

Malecki:2011:DBL

[3281] Florian Malecki. A deeper, broaderlook at network security. NetworkSecurity, 2011(12):18–19, December2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485811701313.

Anonymous:2011:BBC

[3282] Anonymous. Big boost in cyber-security spending. Network Security,2011(12):20, December 2011. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485811701325.

Anonymous:2011:ECk

[3283] Anonymous. Events calendar. Net-work Security, 2011(12):20, December2011. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485811701337.

Anonymous:2012:HAS

[3284] Anonymous. Hackers attack secu-rity organisations. Network Security,2012(1):1–2, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700016.

Anonymous:2012:HWM

[3285] Anonymous. Hackers warring inMiddle East. Network Security,2012(1):2, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700028.

Anonymous:2012:Ba

[3286] Anonymous. In brief. Network Secu-rity, 2012(1):3, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581270003X.

Anonymous:2012:BRBa

[3287] Anonymous. Book review: A BugHunter’s Diary, by Tobias Klein.No Starch Press. ISBN 978-1-59327-385-9. Network Security, 2012(1):4, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700041.

Harley:2012:ATT

[3288] David Harley. AMTSO: the testof time? Network Security, 2012

Page 402: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 402

(1):5–10, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700053.

Woodhead:2012:MBT

[3289] Simon Woodhead. Monitoring bad traf-fic with darknets. Network Security,2012(1):10–14, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700065.

Ryan:2012:REB

[3290] Jaime Ryan. Rethinking the ESB:building a secure bus with an SOAgateway. Network Security, 2012(1):14–17, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700077.

Masadeh:2012:SMB

[3291] Shadi R. Masadeh, Nedal Turab,and Farhan Obisat. A securemodel for building e-learning sys-tems. Network Security, 2012(1):17–20, January 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700089.

Anonymous:2012:ECa

[3292] Anonymous. Events calendar. Net-work Security, 2012(1):20, January2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700090.

Anonymous:2012:HHS

[3293] Anonymous. Hacktivists hit outat Symantec, police and anti-piracygroups. Network Security, 2012(2):1–2, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700107.

Anonymous:2012:Bb

[3294] Anonymous. In brief. NetworkSecurity, 2012(2):3, February 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700119.

Anonymous:2012:BRW

[3295] Anonymous. Book review: The WebApplication Hacker’s Handbook, 2ndEdition. Dafydd Stuttard and Mar-cus Pinto. Wiley. ISBN 978-1-118-02647-2. Network Security, 2012(2):4, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700120.

Thomson:2012:BEC

[3296] Gordon Thomson. BYOD: enablingthe chaos. Network Security, 2012(2):5–8, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700132.

Wray:2012:SCN

[3297] Melvyn Wray. From server con-solidation to network consolida-tion. Network Security, 2012(2):

Page 403: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 403

8–11, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700144.

Caviglione:2012:EIS

[3298] Luca Caviglione and Alessio Merlo.The energy impact of security mech-anisms in modern mobile devices. Net-work Security, 2012(2):11–14, February2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700156.

Schneider:2012:SNS

[3299] David Schneider. The state of net-work security. Network Security, 2012(2):14–20, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700168.

Anonymous:2012:TTS

[3300] Anonymous. Tough times forSSL. Network Security, 2012(2):20, February 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581270017X.

Anonymous:2012:ECb

[3301] Anonymous. Events calendar. Net-work Security, 2012(2):20, February2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700181.

Anonymous:2012:AAL

[3302] Anonymous. Anonymous — arrests,leaks and infections. Network Secu-rity, 2012(3):2, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700399.

Anonymous:2012:Bc

[3303] Anonymous. In brief. Network Secu-rity, 2012(3):3, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700405.

Anonymous:2012:BRT

[3304] Anonymous. Book review: Thor’sMicrosoft Security Bible, by Timo-thy ‘Thor’ Mullen. Syngress. ISBN978-1-59749-572-1. Network Secu-rity, 2012(3):4, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700417.

Anonymous:2012:BRL

[3305] Anonymous. Book review: Low TechHacking: Street Smarts for SecurityProfessionals, by Jack Wiles, Terry Gu-daitis, Jennifer Jabbusch, Russ Rogers,and Sean Lowther. Syngress. ISBN978-1-59749-665-0. Network Secu-rity, 2012(3):4, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700429.

Page 404: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 404

Denman:2012:WML

[3306] Simon Denman. Why multi-layered se-curity is still the best defence. Net-work Security, 2012(3):5–7, March2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700430.

Brewer:2012:PCC

[3307] Ross Brewer. Protecting criticalcontrol systems. Network Security,2012(3):7–10, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700442.

Rouse:2012:MDM

[3308] Jason Rouse. Mobile devices —the most hostile environment for se-curity? Network Security, 2012(3):11–13, March 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700454.

Gold:2012:SV

[3309] Steve Gold. Securing VoIP. Net-work Security, 2012(3):14–17, March2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700466.

Dowling:2012:ERW

[3310] Mike Dowling. Enabling remote work-ing: protecting the network. Net-work Security, 2012(3):18–20, March2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485812700478.

Anonymous:2012:ECc

[3311] Anonymous. Events calendar. Net-work Security, 2012(3):20, March2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581270048X.

Anonymous:2012:MGF

[3312] Anonymous. Mac gets first se-rious malware. Network Security,2012(4):1–2, April 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700193.

Anonymous:2012:CGT

[3313] Anonymous. Cybercrime a grow-ing threat to financial services. Net-work Security, 2012(4):2, April 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581270020X.

Anonymous:2012:Bd

[3314] Anonymous. In brief. Network Secu-rity, 2012(4):3, April 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700211.

Anonymous:2012:TW

[3315] Anonymous. The tangled Web.Network Security, 2012(4):4, April2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 405: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 405

URL http://www.sciencedirect.

com/science/article/pii/S1353485812700223.

Anonymous:2012:CW

[3316] Anonymous. Cyber warfare. Net-work Security, 2012(4):4, April 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700235.

deCrespigny:2012:BCR

[3317] Michael de Crespigny. Building cyber-resilience to tackle threats. Net-work Security, 2012(4):5–8, April2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700247.

Tankard:2012:TMP

[3318] Colin Tankard. Taking the man-agement pain out of Active Di-rectory. Network Security, 2012(4):8–11, April 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700259.

Robertson:2012:SVL

[3319] Brian Robertson. Security: virtualisa-tion’s last frontier. Network Security,2012(4):12–15, April 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700260.

Everett:2012:EC

[3320] Bernard Everett. The encryption co-nundrum. Network Security, 2012(4):15–18, April 2012. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700272.

Serrato:2012:IAN

[3321] Christy Serrato. Identity assurance andnetwork security. Network Security,2012(4):19–20, April 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700284.

Anonymous:2012:ECd

[3322] Anonymous. Events calendar. Net-work Security, 2012(4):20, April 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700296.

Anonymous:2012:TIM

[3323] Anonymous. Trustworthy InternetMovement aims to solve SSL issues.Network Security, 2012(5):1–2, May2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700302.

Anonymous:2012:APM

[3324] Anonymous. Android’s popularitymakes it a prime target. Network Se-curity, 2012(5):2, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700314.

Anonymous:2012:Be

[3325] Anonymous. In brief. Network Secu-rity, 2012(5):3, May 2012. CODEN

Page 406: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 406

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700326.

Anonymous:2012:BRBb

[3326] Anonymous. Book review: The Ba-sics of Digital Forensics, by JohnSammons. Syngress. ISBN 978-1-59749-661-2. Network Security,2012(5):4, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700338.

Anonymous:2012:BRBc

[3327] Anonymous. Book review: The Ba-sics of Digital Forensics, by JohnSammons. Syngress. ISBN 978-1-59749-661-2. Network Security,2012(5):4, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581270034X.

Mason:2012:CCS

[3328] Andrew Mason. Caught in the cross-site scripting fire. Network Secu-rity, 2012(5):5–9, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700351.

Gold:2012:WCT

[3329] Steve Gold. Wireless cracking: there’san app for that. Network Security,2012(5):10–14, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700363.

Hamamreh:2012:RPA

[3330] Rushdi Hamamreh. Routing pathauthentication in link-state routingprotocols. Network Security, 2012(5):14–20, May 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700375.

Anonymous:2012:ECe

[3331] Anonymous. Events calendar. Net-work Security, 2012(5):20, May 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700387.

Anonymous:2012:FCH

[3332] Anonymous. Flame creates heateddebate. Network Security, 2012(6):1–2, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700491.

Anonymous:2012:Bf

[3333] Anonymous. In brief. Network Secu-rity, 2012(6):3, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700508.

SM-D:2012:BRW

[3334] SM-D. Book review: WindowsForensic Analysis Toolkit, by Har-lan Carvey. Third edition. Syngress.ISBN 978-1-59749-727-5. Price: $69.95,

Page 407: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 407

272 pgs, paperback. Network Secu-rity, 2012(6):4, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581270051X.

Jones:2012:MMW

[3335] Greg Jones. Mobile menace: why SDRposes such a threat. Network Secu-rity, 2012(6):5–7, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700521.

Kenyon:2012:WAC

[3336] Paul Kenyon. What Australiacan teach the world about leastprivilege. Network Security, 2012(6):7–10, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700533.

Bager:2012:RAD

[3337] Kurt Bager. Remote access: don’tbe a victim. Network Security,2012(6):11–14, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700545.

Caldwell:2012:LV

[3338] Tracey Caldwell. Locking downthe VPN. Network Security, 2012(6):14–18, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700557.

Eisen:2012:CFM

[3339] Ori Eisen. Catching the fraudulentMan-in-the-Middle. Network Security,2012(6):18–20, June 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700569.

Anonymous:2012:ECf

[3340] Anonymous. Events calendar. Net-work Security, 2012(6):20, June 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700570.

Anonymous:2012:AMG

[3341] Anonymous. Android malware growthand possible botnet. Network Secu-rity, 2012(7):1–2, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700582.

Anonymous:2012:BIC

[3342] Anonymous. Big increase in criticalinfrastructure attacks. Network Secu-rity, 2012(7):2, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700594.

Anonymous:2012:Bg

[3343] Anonymous. In brief. Network Secu-rity, 2012(7):3, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700600.

Page 408: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 408

Anonymous:2012:BRPa

[3344] Anonymous. Book review: Privacyand Big Data: the players, regu-lators and stakeholders, by TerenceCraig and Mary E. Ludloff. O’Reilly.ISBN 978-1-4493-0500-0. Network Se-curity, 2012(7):4, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700612.

Anonymous:2012:BRPb

[3345] Anonymous. Book review: Privacyand Big Data: the players, regulatorsand stakeholders, by Terence Craig,and Mary E. Ludloff. O’Reilly. ISBN978-1-4493-0500-0. Network Secu-rity, 2012(7):4, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700624.

Tankard:2012:BDS

[3346] Colin Tankard. Big data security.Network Security, 2012(7):5–8, July2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700636.

Potts:2012:SIS

[3347] Mike Potts. The state of infor-mation security. Network Security,2012(7):9–11, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700648.

Mansfield-Devine:2012:EWD

[3348] Steve Mansfield-Devine. Estonia:what doesn’t kill you makes youstronger. Network Security, 2012(7):12–20, July 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581270065X.

Anonymous:2012:ECg

[3349] Anonymous. Events calendar. Net-work Security, 2012(7):20, July 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700661.

Anonymous:2012:BH

[3350] Anonymous. Black Hat high-lights. Network Security, 2012(8):1–2, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700673.

Anonymous:2012:Bi

[3351] Anonymous. In brief. Network Secu-rity, 2012(8):3, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700685.

SM-D:2012:BRPa

[3352] SM-D. Book review: Planning forIPv6, by Silvia Hagen. O’Reilly. ISBN978-1-4493-0538-3 (e-book), 978-1-4493-0539-0 (print). Network Secu-rity, 2012(8):4, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),

Page 409: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 409

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700697.

SM-D:2012:BRPb

[3353] SM-D. Book review: Planning forIPv6, by Silvia Hagen. O’Reilly. ISBN978-1-4493-0538-3 (e-book), 978-1-4493-0539-0 (print). Network Secu-rity, 2012(8):4, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700703.

Conrad:2012:SHI

[3354] James Conrad. Seeking help: the im-portant role of ethical hackers. Net-work Security, 2012(8):5–8, August2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700715.

Caldwell:2012:PDW

[3355] Tracey Caldwell. The perimeteris dead — what next for the ap-pliance? Network Security, 2012(8):8–12, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700727.

Bradbury:2012:FBS

[3356] Danny Bradbury. Fighting botnetswith sinkholes. Network Security, 2012(8):12–15, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700739.

Gold:2012:CJ

[3357] Steve Gold. Cellular jamming. Net-work Security, 2012(8):15–18, August2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700740.

Malecki:2012:SWD

[3358] Florian Malecki. Simple ways to dodgethe DDoS bullet. Network Security,2012(8):18–20, August 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700752.

Anonymous:2012:ECh

[3359] Anonymous. Events calendar. Net-work Security, 2012(8):20, August2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700764.

Anonymous:2012:AHF

[3360] Anonymous. Anonymous hacks FBIlaptop. Or maybe not. Network Se-curity, 2012(9):1–2, September 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700776.

Anonymous:2012:MEO

[3361] Anonymous. Middle East oil firmshit by massive attacks. NetworkSecurity, 2012(9):2, 19, September2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700788.

Page 410: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 410

Anonymous:2012:Bj

[3362] Anonymous. In brief. Network Se-curity, 2012(9):3, September 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581270079X.

SM-D:2012:BRS

[3363] SM-D. Book review: Securing CloudServices: a pragmatic, approach tosecurity architecture in, the cloud,by Lee Newcombe. Published by ITGovernance Publishing. ISBN 978-1-84928-398-4. Network Security, 2012(9):4, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700806.

Mansfield-Devine:2012:PAJ

[3364] Steve Mansfield-Devine. Para-noid Android: just how insecureis the most popular mobile plat-form? Network Security, 2012(9):5–10, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700818.

Tankard:2012:PMS

[3365] Colin Tankard. The promise ofmanaged security services. NetworkSecurity, 2012(9):10–15, September2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581270082X.

Caldwell:2012:SD

[3366] Tracey Caldwell. Seek and de-stroy. Network Security, 2012(9):15–19, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700831.

Anonymous:2012:AMJ

[3367] Anonymous. Another major Javapanic. Network Security, 2012(9):19–20, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700843.

Anonymous:2012:NRI

[3368] Anonymous. New research instituteto study threats. Network Security,2012(9):20, September 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700855.

Anonymous:2012:ECi

[3369] Anonymous. Events calendar. Net-work Security, 2012(9):20, September2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700867.

Anonymous:2012:ACE

[3370] Anonymous. Avoid Chinese equipmentfirms, says Congress. Network Security,2012(10):1–2, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700879.

Page 411: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 411

Anonymous:2012:MEI

[3371] Anonymous. Mobile exploits in-crease. Network Security, 2012(10):2, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700880.

Anonymous:2012:Bk

[3372] Anonymous. In brief. NetworkSecurity, 2012(10):3, October 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700892.

Anonymous:2012:BRO

[3373] Anonymous. Book review: Once MoreUnto the Breach, by Andrea C Sim-mons. IT Governance Publishing. ISBN978-1-84928-390-8. Network Security,2012(10):4, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700909.

Anonymous:2012:BRP

[3374] Anonymous. Book review: PCICompliance, Branden R. Williamsand Anton Chuvakin. Third edi-tion. Syngress. ISBN 978-1-59749-948-4. Network Security, 2012(10):4, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700910.

Mansfield-Devine:2012:AAA

[3375] Steve Mansfield-Devine. Androidarchitecture: attacking the weak

points. Network Security, 2012(10):5–12, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700922.

Jordon:2012:CDD

[3376] Michael Jordon. Cleaning up dirtydisks in the cloud. Network Secu-rity, 2012(10):12–15, October 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700934.

Bradbury:2012:SFF

[3377] Danny Bradbury. Spreading fear onFacebook. Network Security, 2012(10):15–17, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700946.

Bella:2012:ISA

[3378] Madeleine A. Bihina Bella, J. H. P.Eloff, and Martin S. Olivier. Im-proving system availability with near-miss analysis. Network Security, 2012(10):18–20, October 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700958.

Anonymous:2012:ECj

[3379] Anonymous. Events calendar. Net-work Security, 2012(10):20, October2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581270096X.

Page 412: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 412

Anonymous:2012:GHH

[3380] Anonymous. Georgia hacks hacker,allegedly. Network Security, 2012(11):1–2, November 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700971.

Anonymous:2012:LAP

[3381] Anonymous. Latest Android prob-lems and fixes. Network Security,2012(11):2, November 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812700983.

Anonymous:2012:Bl

[3382] Anonymous. In brief. Network Se-curity, 2012(11):3, November 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812700995.

Anonymous:2012:BRR

[3383] Anonymous. Book review: Regu-lar Expressions Cookbook, Jan Goy-vaerts and Steven Levithan, Sec-ond edition, O’Reilly, ISBN 978-1-4493-1943-4. Network Security, 2012(11):4, November 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701009.

Anonymous:2012:BRH

[3384] Anonymous. Book review: Hack-ing Web Apps, Mike Shema. Syn-gress. ISBN 978-1-59749-951-4. Net-work Security, 2012(11):4, November

2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812701010.

Tankard:2012:CIS

[3385] Colin Tankard. Cultural issues in se-curity and privacy. Network Security,2012(11):5–8, November 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701022.

Paessler:2012:MPC

[3386] Dirk Paessler. Monitoring privateclouds. Network Security, 2012(11):8–12, November 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701034.

Mansfield-Devine:2012:AMM

[3387] Steve Mansfield-Devine. Androidmalware and mitigations. NetworkSecurity, 2012(11):12–20, November2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812701046.

Anonymous:2012:ECk

[3388] Anonymous. Events calendar. Net-work Security, 2012(11):20, November2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812701058.

Anonymous:2012:LB

[3389] Anonymous. A look back at2012. Network Security, 2012(12):

Page 413: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 413

1–2, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581270106X.

Anonymous:2012:HGA

[3390] Anonymous. How good is anti-virus? Network Security, 2012(12):2, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701071.

Anonymous:2012:Bm

[3391] Anonymous. In brief. Network Se-curity, 2012(12):3, December 2012.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812701083.

SM-D:2012:BRPc

[3392] SM-D. Book review: Practical Mal-ware Analysis, by Michael Sikorski andAndrew Honig. No Starch Press. ISBN978-1-59327-290-6. Network Security,2012(12):4, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701095.

SM-D:2012:BRE

[3393] SM-D. Book review: Encyclopediaof Electronic Components, Volume 1,Charles Platt. Make/O’Reilly, ISBN978-1-4493-3389-8. Network Security,2012(12):4, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701101.

Morrow:2012:BSC

[3394] Bill Morrow. BYOD security chal-lenges: control and protect your mostsensitive data. Network Security, 2012(12):5–8, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701113.

Sood:2012:AGP

[3395] Aditya K. Sood, Peter Greko, andRichard J. Enbody. Abusing Glypeproxies: attacks, exploits and de-fences. Network Security, 2012(12):8–15, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701125.

Gold:2012:VJH

[3396] Steve Gold. Virtual jihad: how realis the threat? Network Security, 2012(12):15–18, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701137.

Malecki:2012:NGF

[3397] Florian Malecki. Next-generationfirewalls: security with perfor-mance. Network Security, 2012(12):19–20, December 2012. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485812701149.

Page 414: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 414

Anonymous:2012:ECl

[3398] Anonymous. Events calendar. Net-work Security, 2012(12):20, December2012. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485812701150.

Anonymous:2013:CER

[3399] Anonymous. CA error results in cer-tificate blunder. Network Security,2013(1):1–2, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700126.

Anonymous:2013:UBA

[3400] Anonymous. US banks attacked —but by whom? Network Security,2013(1):2, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700138.

Anonymous:2013:Ba

[3401] Anonymous. In brief. Network Secu-rity, 2013(1):3, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581370014X.

SM-D:2013:BRC

[3402] SM-D. Book review: CUDA Pro-gramming, Shane Cook. Morgan Kauf-mann. ISBN 978-0-12-415933-4. Net-work Security, 2013(1):4, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700151.

SM-D:2013:BRT

[3403] SM-D. Book review: Think Likea Programmer, V Anton Spraul.No Starch Press. ISBN 978-1-59327-424-5. Network Security, 2013(1):4, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700163.

Bradbury:2013:VSS

[3404] Danny Bradbury. Verifying softwaresecurity — is it possible? Net-work Security, 2013(1):5–7, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700175.

Kurpjuhn:2013:ERU

[3405] Thorsten Kurpjuhn. The evolvingrole of the UTM appliance. Net-work Security, 2013(1):8–11, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700187.

Hart:2013:WTA

[3406] Jason Hart. Why the traditional ap-proach to information security is nolonger working. Network Security, 2013(1):12–14, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700199.

Bhat:2013:UMS

[3407] Wasim Ahmad Bhat and S. M. K.Quadri. Understanding and mitigat-

Page 415: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 415

ing security issues in Sun NFS. Net-work Security, 2013(1):15–18, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700205.

Walker-Brown:2013:MVM

[3408] Andrew Walker-Brown. Manag-ing VPNs in the mobile worker’sworld. Network Security, 2013(1):18–20, January 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700217.

Anonymous:2013:ECa

[3409] Anonymous. Events calendar. Net-work Security, 2013(1):20, January2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700229.

Anonymous:2013:BBH

[3410] Anonymous. Bit9 bitten by hack-ers. Network Security, 2013(2):1–2, February 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700230.

Anonymous:2013:MSC

[3411] Anonymous. Microsoft and Syman-tec cripple botnet. Network Security,2013(2):2, February 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700242.

Anonymous:2013:Bb

[3412] Anonymous. In brief. NetworkSecurity, 2013(2):3, February 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700254.

Anonymous:2013:BRL

[3413] Anonymous. Book review: Loggingand Log Management, Anton Chu-vakin, Kevin Schmidt and Christo-pher Phillips. Syngress. ISBN 978-1-59749-635-3. Network Security,2013(2):4, February 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700266.

Anonymous:2013:BRC

[3414] Anonymous. Book review: CISSPStudy Guide, Eric Conrad, SethMisenar and Joshua Feldman. Syn-gress. ISBN 978-1-59749-961-3. Net-work Security, 2013(2):4, February2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700278.

Jones:2013:PC

[3415] Greg Jones. Penetrating the cloud.Network Security, 2013(2):5–7, Febru-ary 2013. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S135348581370028X.

Hirst:2013:SYT

[3416] Mark Hirst. Securing your teleme-try: making DCIM unsniffable. Net-

Page 416: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 416

work Security, 2013(2):8–9, February2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700291.

Meulensteen:2013:SGM

[3417] Marc Meulensteen. A smart gridmust also be streetwise. Network Se-curity, 2013(2):10–12, February 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700308.

Goh:2013:MST

[3418] Jane Goh. Moving security testinginto the developer’s domain. Net-work Security, 2013(2):13–15, February2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581370031X.

Gold:2013:ECS

[3419] Steve Gold. Electronic counter-surveillance strategies. Network Se-curity, 2013(2):15–18, February 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700321.

Smith:2013:LCD

[3420] Don Smith. Life’s certainties: death,taxes and APTs. Network Secu-rity, 2013(2):19–20, February 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700333.

Anonymous:2013:ECb

[3421] Anonymous. Events calendar. Net-work Security, 2013(2):20, February2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700345.

Anonymous:2013:FAM

[3422] Anonymous. Facebook, Apple andMicrosoft hit by Java exploit atwatering hole. Network Security,2013(3):1–2, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700357.

Anonymous:2013:URP

[3423] Anonymous. US report points fin-ger at China’s military cyberwar unit.Network Security, 2013(3):2, March2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700369.

Anonymous:2013:Bc

[3424] Anonymous. In brief. Network Secu-rity, 2013(3):3, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700370.

Anonymous:2013:BRW

[3425] Anonymous. Book review: Win-dows PowerShell 3.0 Step by Step,by Ed Wilson. Microsoft Press. ISBN978-0-7356-6339-8 (print), 978-0-7356-6337-4 (ebook). Network Security,2013(3):4, March 2013. CODEN

Page 417: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 417

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700382.

Pitt:2013:TCR

[3426] Dan Pitt. Trust in the cloud: therole of SDN. Network Security,2013(3):5–6, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700394.

Nachreiner:2013:BSA

[3427] Corey Nachreiner. Beat security au-ditors at their own game. Net-work Security, 2013(3):7–11, March2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700400.

Winter:2013:SVH

[3428] Robert Winter. SSD vs HDD —data recovery and destruction. Net-work Security, 2013(3):12–14, March2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700412.

Bassill:2013:HAS

[3429] Peter Bassill. The holistic approachto security. Network Security, 2013(3):14–17, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700424.

Fehr:2013:FNB

[3430] Shannon Fehr. Flexible networks forbetter security. Network Security,2013(3):17–20, March 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700436.

Anonymous:2013:ECc

[3431] Anonymous. Events calendar. Net-work Security, 2013(3):20, March2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700448.

Anonymous:2013:SDA

[3432] Anonymous. Spamhaus DDoS at-tack fails to take down Internet.Network Security, 2013(4):1–2, April2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581370045X.

Anonymous:2013:UBCa

[3433] Anonymous. US bans Chinese technol-ogy. Network Security, 2013(4):2, April2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700461.

Anonymous:2013:Bd

[3434] Anonymous. In brief. Network Secu-rity, 2013(4):3, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700473.

Page 418: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 418

Anonymous:2013:BRI

[3435] Anonymous. Book review: In-stant Penetration Testing: SettingUp a Test Lab How-to, by Vyach-eslav Fadyushin. Packt Publishing.ISBN 1-84969-412-5. Network Secu-rity, 2013(4):4, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700485.

Walters:2013:BIS

[3436] Richard Walters. Bringing IT outof the shadows. Network Security,2013(4):5–11, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700497.

Tokuyoshi:2013:SIB

[3437] Brian Tokuyoshi. The security impli-cations of BYOD. Network Security,2013(4):12–13, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700503.

Caldwell:2013:INP

[3438] Tracey Caldwell. Identity — thenew perimeter. Network Security,2013(4):14–18, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700515.

Newbold:2013:SMH

[3439] Gary Newbold. Secure mobility inhealthcare networks for optimal pa-tient care. Network Security, 2013

(4):18–20, April 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700527.

Anonymous:2013:ECd

[3440] Anonymous. Events calendar. Net-work Security, 2013(4):20, April 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700539.

Anonymous:2013:UBCb

[3441] Anonymous. US blames China forhacking, again. Network Security,2013(5):1–2, May 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700540.

Anonymous:2013:UTS

[3442] Anonymous. US takes down Syr-ian domains. Network Security,2013(5):2, May 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700552.

Anonymous:2013:Be

[3443] Anonymous. In brief. Network Secu-rity, 2013(5):3, May 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700564.

Anonymous:2013:BRT

[3444] Anonymous. Book review: TallinnManual on the International Law Ap-

Page 419: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 419

plicable to Cyber Warfare, editedby Michael Schmitt. CambridgeUniversity Press. ISBN 978-1-107-61377-5 (paperback), 978-1-107-02443-4 (hardback). Network Security,2013(5):4, May 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700576.

McGregory:2013:PND

[3445] Steve McGregory. Preparing for thenext DDoS attack. Network Secu-rity, 2013(5):5–6, May 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700588.

Caldwell:2013:SDL

[3446] Tracey Caldwell. Security at thedata level. Network Security, 2013(5):6–12, May 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581370059X.

Grafton:2013:AFP

[3447] Jane Grafton. Avoiding the five pit-falls of privileged accounts. Net-work Security, 2013(5):12–14, May2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700606.

Gold:2013:BEM

[3448] Steve Gold. Black Hat Europe:mobile attack vectors in the spot-light. Network Security, 2013(5):14–18, May 2013. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700618.

Hirst:2013:RSP

[3449] Mark Hirst. Rack security andprotection. Network Security, 2013(5):18–20, May 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581370062X.

Anonymous:2013:ECe

[3450] Anonymous. Events calendar. Net-work Security, 2013(5):20, May 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700631.

Anonymous:2013:PSF

[3451] Anonymous. PandaLabs says thefight against cybercrime is be-ing won. Network Security, 2013(6):1–2, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700643.

Anonymous:2013:MSB

[3452] Anonymous. McAfee says it’s busi-ness as usual. Network Security,2013(6):2, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700655.

Page 420: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 420

Anonymous:2013:Bf

[3453] Anonymous. In brief. Network Secu-rity, 2013(6):3, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700667.

Anonymous:2013:BRV

[3454] Anonymous. Book review: ViolentPython, by T. J. O’Connor. Syngress.ISBN 978-1-59749-957-6. Network Se-curity, 2013(6):4, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700679.

Barker:2013:SII

[3455] Keith Barker. The security impli-cations of IPv6. Network Security,2013(6):5–9, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700680.

Gold:2013:GLI

[3456] Steve Gold. Getting lost onthe Internet: the problem withanonymity. Network Security, 2013(6):10–13, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700692.

Brooks:2013:CEI

[3457] Tim Brooks. Classic enterprise IT:the castle approach. Network Security,2013(6):14–16, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700709.

Mansfield-Devine:2013:QCT

[3458] Steve Mansfield-Devine. Q&A:Colin Tankard — raising securityawareness. Network Security, 2013(6):16–19, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700710.

Anonymous:2013:UWI

[3459] Anonymous. US warns of increasedcyber-attacks by Iran. Network Se-curity, 2013(6):19–20, June 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700722.

Anonymous:2013:JTD

[3460] Anonymous. Journalists threatenedwith data protection laws after usingexposed information. Network Secu-rity, 2013(6):20, June 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700734.

Anonymous:2013:NUA

[3461] Anonymous. NATO under attack.Network Security, 2013(6):20, June2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700746.

Page 421: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 421

Anonymous:2013:ECf

[3462] Anonymous. Events calendar. Net-work Security, 2013(6):20, June 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700758.

Anonymous:2013:WSW

[3463] Anonymous. Web is still theweakest point. Network Security,2013(7):1–2, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581370076X.

Anonymous:2013:CFF

[3464] Anonymous. Crypto flaw foundin Android. Network Security,2013(7):2, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700771.

Anonymous:2013:Bg

[3465] Anonymous. In brief. Network Secu-rity, 2013(7):3, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700783.

Anonymous:2013:BRH

[3466] Anonymous. Book review: HackingWeb Apps, by Mike Shema. Syngress.ISBN 978-1-59749-951-4. Network Se-curity, 2013(7):4, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700795.

Ring:2013:MSI

[3467] Tim Ring. IT’s megatrends: thesecurity impact. Network Security,2013(7):5–8, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700801.

Bradbury:2013:OD

[3468] Danny Bradbury. Offensive de-fence. Network Security, 2013(7):9–12, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700813.

Scully:2013:ULK

[3469] Patrick Scully. Under lock andkey: protecting the network fromattack. Network Security, 2013(7):12–15, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700825.

Begg:2013:SSA

[3470] Norman Begg. Securely sharing accessto sensitive data. Network Security,2013(7):15–18, July 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700837.

Kerpan:2013:BCB

[3471] Patrick Kerpan and Sam Mitchell.Bringing control to the business ap-plication layer. Network Security,2013(7):18–20, July 2013. CODEN

Page 422: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 422

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700849.

Anonymous:2013:ECg

[3472] Anonymous. Events calendar. Net-work Security, 2013(7):20, July 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700850.

Anonymous:2013:TAP

[3473] Anonymous. TOR attacked — possi-bly by the NSA. Network Security,2013(8):1–2, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700862.

Anonymous:2013:MIM

[3474] Anonymous. Mobile insecuritiesmultiply. Network Security, 2013(8):2, 20, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700874.

Anonymous:2013:Bh

[3475] Anonymous. In brief. Network Secu-rity, 2013(8):3, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700886.

Anonymous:2013:BRBa

[3476] Anonymous. Book review: TheBasics of Web Hacking, by Josh

Pauli. Syngress. ISBN 978-0-12-416600-4. Network Security, 2013(8):4, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700898.

Anonymous:2013:BRBb

[3477] Anonymous. Book review: TheBasics of Web Hacking, by JoshPauli. Syngress. ISBN 978-0-12-416600-4. Network Security, 2013(8):4, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700904.

Thielens:2013:WAC

[3478] John Thielens. Why APIs are centralto a BYOD security strategy. Net-work Security, 2013(8):5–6, August2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700916.

Gaffney:2013:FFW

[3479] Tom Gaffney. Following in the foot-steps of Windows: how Android mal-ware development is looking veryfamiliar. Network Security, 2013(8):7–10, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700928.

Mansfield-Devine:2013:IME

[3480] Steve Mansfield-Devine. Inter-view: Mick Ebsworth — a matterof trust. Network Security, 2013

Page 423: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 423

(8):11–13, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581370093X.

Gold:2013:SCT

[3481] Steve Gold. Subverting cellulartechnology: evolution, not revo-lution. Network Security, 2013(8):14–19, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700941.

Anonymous:2013:FMI

[3482] Anonymous. Firms making it easy forattackers, says KMPG. Network Secu-rity, 2013(8):20, August 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813700953.

Anonymous:2013:ECh

[3483] Anonymous. Events calendar. Net-work Security, 2013(8):20, August2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700965.

Anonymous:2013:NCI

[3484] Anonymous. NSA has cracked In-ternet encryption protocols. Net-work Security, 2013(9):1–2, September2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700977.

Anonymous:2013:Bi

[3485] Anonymous. In brief. Network Se-curity, 2013(9):3, September 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700989.

Anonymous:2013:IOH

[3486] Anonymous. Instant OSSEC host-based intrusion detection. Net-work Security, 2013(9):4, September2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813700990.

Anonymous:2013:SSD

[3487] Anonymous. Simple steps to dataencryption. Network Security, 2013(9):4, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701004.

Arean:2013:DRC

[3488] Oscar Arean. Disaster recovery inthe cloud. Network Security, 2013(9):5–7, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701016.

Kenyon:2013:RAW

[3489] Tony Kenyon. The role of ADCs withinsecure application delivery. NetworkSecurity, 2013(9):8–12, September2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701028.

Page 424: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 424

Dunford:2013:MFT

[3490] Dan Dunford. Managed file trans-fer: the next stage for data in mo-tion? Network Security, 2013(9):12–15, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581370103X.

Hibbert:2013:CTC

[3491] Richard Hibbert. Calling timeon compliance spreadsheet over-load. Network Security, 2013(9):15–17, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701041.

Mansfield-Devine:2013:IJC

[3492] Steve Mansfield-Devine. Inter-view: Jon Callas, Silent Cir-cle. Network Security, 2013(9):17–20, September 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701053.

Anonymous:2013:ECi

[3493] Anonymous. Events calendar. Net-work Security, 2013(9):20, September2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701065.

Anonymous:2013:SRO

[3494] Anonymous. Silk Road online drugmarket taken down. Network Security,2013(10):1–2, October 2013. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701077.

Anonymous:2013:MMT

[3495] Anonymous. Mobile malware topsone million, but Google says prob-lem exaggerated. Network Security,2013(10):2, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701089.

Anonymous:2013:Bj

[3496] Anonymous. In brief. NetworkSecurity, 2013(10):3, October 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701090.

Anonymous:2013:ICW

[3497] Anonymous. Introduction to cyber-warfare. Network Security, 2013(10):4, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701107.

Anonymous:2013:ACS

[3498] Anonymous. Applied cyber-securityand the Smart Grid. Network Security,2013(10):4, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701119.

Page 425: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 425

Small:2013:DBI

[3499] Mike Small. From data breach to infor-mation stewardship. Network Security,2013(10):5–8, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701120.

Erdheim:2013:DMN

[3500] Sam Erdheim. Deployment andmanagement with next-generationfirewalls. Network Security, 2013(10):8–12, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701132.

Chappell:2013:PMI

[3501] Brian Chappell. Privilege manage-ment — the industry’s best kept se-cret. Network Security, 2013(10):12–14, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701144.

Baker:2013:IBT

[3502] Scott Baker. IP-based technology— the future of the security in-dustry. Network Security, 2013(10):14–17, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701156.

Mansfield-Devine:2013:ISH

[3503] Steve Mansfield-Devine. Inter-view: Seth Hallem, Mobile Helix

— the right way to mobile secu-rity. Network Security, 2013(10):18–20, October 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701168.

Anonymous:2013:ECj

[3504] Anonymous. Events calendar. Net-work Security, 2013(10):20, October2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581370117X.

Anonymous:2013:WMF

[3505] Anonymous. Women may be the fu-ture of infosecurity. Network Security,2013(11):1–2, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701181.

Anonymous:2013:SOG

[3506] Anonymous. Security officers getgreater voice in boardrooms. Net-work Security, 2013(11):2, November2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701223.

Anonymous:2013:Bk

[3507] Anonymous. In brief. Network Se-curity, 2013(11):3, November 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701235.

Page 426: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 426

Anonymous:2013:ICN

[3508] Anonymous. Introduction to com-puter and network security. Net-work Security, 2013(11):4, November2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701247.

Anonymous:2013:MPT

[3509] Anonymous. Metasploit penetrationtesting cookbook [Book Review: Mo-bile Security: How to Secure, Priva-tize, and Recover Your Devices, by Ab-hinav Singh. Packt Publishing. ISBN978-1-84951-742-3]. Network Security,2013(11):4, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701259.

Macrae:2013:ITR

[3510] Alistair Macrae. Identifying threatsin real time. Network Security, 2013(11):5–8, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701193.

Shaw:2013:DE

[3511] John Shaw. Dealing with encryp-tion. Network Security, 2013(11):8–11, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581370120X.

Allen:2013:IDP

[3512] Phil Allen. The importance ofdata protection inside your enter-

prise. Network Security, 2013(11):12–14, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701211.

Hilbert:2013:LC

[3513] EJ Hilbert. Living with cyber-crime. Network Security, 2013(11):15–17, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701260.

Mansfield-Devine:2013:CTD

[3514] Steve Mansfield-Devine. ColinTankard, digital pathways: confusionin the cloud. Network Security, 2013(11):17–20, November 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701272.

Anonymous:2013:ECk

[3515] Anonymous. Events calendar. Net-work Security, 2013(11):20, November2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701284.

Anonymous:2013:FFC

[3516] Anonymous. Firms failing to cope withtargeted attacks. Network Security,2013(12):1–2, December 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701296.

Page 427: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 427

Anonymous:2013:CRR

[3517] Anonymous. CryptoLocker runs ram-pant, but drops ransom price. Net-work Security, 2013(12):2, December2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701302.

Anonymous:2013:Bl

[3518] Anonymous. In brief. Network Se-curity, 2013(12):3, December 2013.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701314.

Anonymous:2013:BRM

[3519] Anonymous. Book review: Mal-ware Forensics Field Guide for Win-dows Systems, James Aquilina, Syn-gress, ISBN 978-1-59749-472-4. Net-work Security, 2013(12):4, December2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701326.

Anonymous:2013:IIS

[3520] Anonymous. Introduction to infor-mation security. Network Security,2013(12):4, December 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701338.

Johnson:2013:BIS

[3521] Steve Johnson. Bringing IT out ofthe shadows. Network Security, 2013(12):5–6, December 2013. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581370134X.

Hipgrave:2013:SFI

[3522] Shaun Hipgrave. Smarter fraud in-vestigations with big data analyt-ics. Network Security, 2013(12):7–9, December 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701351.

Meulensteen:2013:CIG

[3523] Marc Meulensteen. Critical infras-tructure gets streetwise. NetworkSecurity, 2013(12):10–11, December2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701363.

Mansfield-Devine:2013:JLI

[3524] Steve Mansfield-Devine. John Lyons,ICSPA: Resetting the clock on in-ternational co-operation. NetworkSecurity, 2013(12):12–15, December2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701375.

Gold:2013:UDF

[3525] Steve Gold. Understanding the digi-tal fingerprint. Network Security, 2013(12):15–18, December 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701387.

Page 428: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 428

Austwick:2013:UOA

[3526] Tim Austwick. Using Oracle Apex se-curely. Network Security, 2013(12):19–20, December 2013. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485813701399.

Anonymous:2013:ECl

[3527] Anonymous. Events calendar. Net-work Security, 2013(12):20, December2013. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485813701405.

Anonymous:2014:MNR

[3528] Anonymous. More NSA revelations:backdoors, snooping tools and world-wide reactions. Network Security, 2014(1):1–2, 19–20, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700017.

Anonymous:2014:Ba

[3529] Anonymous. In brief. Network Secu-rity, 2014(1):3, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700029.

Anonymous:2014:CS

[3530] Anonymous. Cyber-security. Net-work Security, 2014(1):4, January2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700030.

Anonymous:2014:IIC

[3531] Anonymous. Investigating Inter-net crimes. Network Security, 2014(1):4, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700042.

Watts:2014:PYI

[3532] Steve Watts. Protecting your iden-tity when working remotely. Net-work Security, 2014(1):5–7, January2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700054.

Shteiman:2014:WCP

[3533] Barry Shteiman. Why CMS plat-forms are breeding security vulner-abilities. Network Security, 2014(1):7–9, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700066.

Patterson:2014:INT

[3534] Mike Patterson. An index for networkthreat detection. Network Security,2014(1):9–11, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700078.

Mansfield-Devine:2014:ICN

[3535] Steve Mansfield-Devine. Interview:Corey Nachreiner, WatchGuard — se-curity visibility. Network Security, 2014(1):11–15, January 2014. CODEN

Page 429: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 429

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581470008X.

Moulds:2014:GDP

[3536] Richard Moulds. The global data pro-tection conundrum. Network Security,2014(1):16–17, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700091.

Constantine:2014:BDI

[3537] Conrad Constantine. Big data: aninformation security context. Net-work Security, 2014(1):18–19, January2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700108.

Anonymous:2014:YAS

[3538] Anonymous. Yahoo ads spreadmalware. Network Security, 2014(1):20, January 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581470011X.

Anonymous:2014:CSL

[3539] Anonymous. CryptoLocker successleads to more malware. NetworkSecurity, 2014(1):20, January 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700121.

Anonymous:2014:ECa

[3540] Anonymous. Events calendar. Net-work Security, 2014(1):20, January2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700133.

Anonymous:2014:ERE

[3541] Anonymous. Encryption on the rise,but not enough. Network Security,2014(2):1–2, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700145.

Anonymous:2014:DAR

[3542] Anonymous. DDoS attacks on therise — by criminals and spies. Net-work Security, 2014(2):2, February2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700157.

Anonymous:2014:Bb

[3543] Anonymous. In brief. NetworkSecurity, 2014(2):3, February 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700169.

Anonymous:2014:MSH

[3544] Anonymous. Mobile security: Howto secure, privatize and recover yourdevices. Network Security, 2014(2):4, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700170.

Page 430: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 430

Anonymous:2014:CIR

[3545] Anonymous. Computer incidentresponse and forensics team man-agement. Network Security, 2014(2):4, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700182.

Kedgley:2014:FIM

[3546] Mark Kedgley. File integrity mon-itoring in the modern threat land-scape. Network Security, 2014(2):5–8, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700194.

Heim:2014:QCD

[3547] Peter Heim. The quest for clar-ity on data protection and secu-rity. Network Security, 2014(2):8–10, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700200.

Allen:2014:MDS

[3548] Stephen Allen. Medical device soft-ware under the microscope. Net-work Security, 2014(2):11–12, February2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700212.

Zhang:2014:VCS

[3549] Hongwen Zhang. A vision for cloudsecurity. Network Security, 2014

(2):12–15, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700224.

Gold:2014:SNP

[3550] Steve Gold. In search of a newperimeter. Network Security, 2014(2):15–20, February 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700236.

Anonymous:2014:ECb

[3551] Anonymous. Events calendar. Net-work Security, 2014(2):20, February2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700248.

Anonymous:2014:TIM

[3552] Anonymous. Threats increase on mo-bile platforms — especially Android —as popularity grows. Network Secu-rity, 2014(3):1–2, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581470025X.

Anonymous:2014:NAW

[3553] Anonymous. Nearly all web and mobileapplications have flaws. Network Secu-rity, 2014(3):2, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700261.

Page 431: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 431

Anonymous:2014:Bc

[3554] Anonymous. In brief. Network Secu-rity, 2014(3):3, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700273.

Anonymous:2014:BRPa

[3555] Anonymous. Book review: Profes-sional Penetration Testing, SecondEdition. Thomas Wilhelm. Syngress.ISBN 978-1-59749-993-4. Network Se-curity, 2014(3):4, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700285.

Caldwell:2014:CDF

[3556] Tracey Caldwell. Call the digi-tal fire brigade. Network Security,2014(3):5–8, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700297.

Barnes:2014:UDP

[3557] Pat Barnes. Using DNS to protectnetworks from threats within. Net-work Security, 2014(3):9–11, March2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700303.

vanLeeuwen:2014:BYO

[3558] Danielle van Leeuwen. Bring yourown software. Network Security, 2014(3):12–13, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700315.

Bradbury:2014:CWM

[3559] Danny Bradbury. Can we makeemail secure? Network Security,2014(3):13–16, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700327.

Malecki:2014:CNB

[3560] Florian Malecki. The cost of network-based attacks. Network Security,2014(3):17–18, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700339.

Keightley:2014:LXD

[3561] Mike Keightley. The loomingXP disaster in industrial environ-ments. Network Security, 2014(3):18–20, March 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700340.

Anonymous:2014:ECc

[3562] Anonymous. Events calendar. Net-work Security, 2014(3):20, March2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700352.

Anonymous:2014:HFL

[3563] Anonymous. ‘Heartbleed’ flawleaves millions of websites, email

Page 432: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 432

servers and other services vulnera-ble to attack. Network Security,2014(4):1–2, April 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700364.

Anonymous:2014:WXN

[3564] Anonymous. Windows XP nowmore vulnerable than ever as Mi-crosoft support ends. Network Secu-rity, 2014(4):2, April 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700376.

Anonymous:2014:Bd

[3565] Anonymous. In brief. Network Secu-rity, 2014(4):3, April 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700388.

Anonymous:2014:CC

[3566] Anonymous. Cybersecurity and cyber-war. Network Security, 2014(4):4, April2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581470039X.

Brewer:2014:APT

[3567] Ross Brewer. Advanced persistentthreats: minimising the damage.Network Security, 2014(4):5–9, April2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700406.

Sverdlove:2014:JVL

[3568] Harry Sverdlove. The Java vulner-ability landscape. Network Security,2014(4):9–14, April 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700418.

Bradbury:2014:UDW

[3569] Danny Bradbury. Unveiling thedark web. Network Security, 2014(4):14–17, April 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581470042X.

Bird:2014:SLS

[3570] Keith Bird. Sandboxing: a linein the sand against malware. Net-work Security, 2014(4):18–20, April2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700431.

Anonymous:2014:ECd

[3571] Anonymous. Events calendar. Net-work Security, 2014(4):20, April 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700443.

Anonymous:2014:HBL

[3572] Anonymous. Heartbleed bug leads toforking and funding. Network Secu-rity, 2014(5):1–2, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700455.

Page 433: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 433

Anonymous:2014:HPB

[3573] Anonymous. High-profile breaches fail-ing to make financial firms tightentheir security. Network Security,2014(5):2, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700467.

Anonymous:2014:Be

[3574] Anonymous. In brief. Network Secu-rity, 2014(5):3, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700479.

Anonymous:2014:DFP

[3575] Anonymous. Digital forensics process-ing and procedures. Network Secu-rity, 2014(5):4, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700480.

Maisey:2014:MAL

[3576] Martin Maisey. Moving to analysis-led cyber-security. Network Security,2014(5):5–12, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700492.

Southam:2014:DWI

[3577] Mark Southam. DNSSEC: What it isand why it matters. Network Security,2014(5):12–15, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700509.

Inns:2014:EAS

[3578] Jon Inns. The evolution and ap-plication of SIEM systems. Net-work Security, 2014(5):16–17, May2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700510.

Blizzard:2014:DFH

[3579] Sonia Blizzard. Don’t feed the hack-ers: how your attitude to data securitycould affect business. Network Security,2014(5):18–20, May 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700522.

Anonymous:2014:ECe

[3580] Anonymous. Events calendar. Net-work Security, 2014(5):20, May 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700534.

Anonymous:2014:TPC

[3581] Anonymous. TrueCrypt project can-celled by its developers. Network Secu-rity, 2014(6):1–2, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700546.

Anonymous:2014:CTC

[3582] Anonymous. Cyber tensions withChina heat up after US indicts mem-

Page 434: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 434

bers of the PLA. Network Secu-rity, 2014(6):2, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700558.

Anonymous:2014:Bf

[3583] Anonymous. In brief. Network Secu-rity, 2014(6):3, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581470056X.

Anonymous:2014:TCA

[3584] Anonymous. Targeted cyber-attacks.Network Security, 2014(6):4, June2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700571.

Radford:2014:CSP

[3585] CJ Radford. Challenges and solu-tions protecting data within Ama-zon Web services. Network Secu-rity, 2014(6):5–8, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700583.

Bradbury:2014:TDB

[3586] Danny Bradbury. Testing the de-fences of bulletproof hosting com-panies. Network Security, 2014(6):8–12, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700595.

Gold:2014:CAD

[3587] Steve Gold. Challenges aheadon the digital forensics and au-dit trails. Network Security, 2014(6):12–17, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700601.

Marrison:2014:DAV

[3588] Chris Marrison. DNS as an attackvector — and how businesses cankeep it secure. Network Security,2014(6):17–20, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700613.

Anonymous:2014:GWB

[3589] Anonymous. Gartner warns of bigdata security problems. Network Secu-rity, 2014(6):20, June 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700625.

Anonymous:2014:ECf

[3590] Anonymous. Events calendar. Net-work Security, 2014(6):20, June 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700637.

Anonymous:2014:WEF

[3591] Anonymous. Western energy firmscome under concerted and success-ful cyber-attack. Network Security,2014(7):1–2, July 2014. CODEN

Page 435: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 435

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700649.

Anonymous:2014:OFF

[3592] Anonymous. One in five firms hitby APTs. Network Security, 2014(7):2, 20, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700650.

Anonymous:2014:Bg

[3593] Anonymous. In brief. Network Secu-rity, 2014(7):3, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700662.

Anonymous:2014:PT

[3594] Anonymous. Penetration testing.Network Security, 2014(7):4, July2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700674.

Bisiaux:2014:DTM

[3595] Jean-Yves Bisiaux. DNS threats andmitigation strategies. Network Secu-rity, 2014(7):5–9, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700686.

Storey:2014:TNS

[3596] Allen Storey. There’s nothing‘smart’ about insecure connecteddevices. Network Security, 2014

(7):9–12, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700698.

Bedwell:2014:FNA

[3597] Patrick Bedwell. Finding a new ap-proach to SIEM to suit the SME en-vironment. Network Security, 2014(7):12–16, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700704.

Mansfield-Devine:2014:BS

[3598] Steve Mansfield-Devine. Buildingin security. Network Security, 2014(7):16–19, July 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700716.

Anonymous:2014:CET

[3599] Anonymous. Cybercrime and espi-onage are a threat to Internet it-self. Network Security, 2014(7):20, July2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700728.

Anonymous:2014:ECg

[3600] Anonymous. Events calendar. Net-work Security, 2014(7):20, July 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581470073X.

Page 436: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 436

Anonymous:2014:RGA

[3601] Anonymous. Russian gang amassesbiggest-ever haul of stolen credentials,claims security firm. Network Security,2014(8):1–2, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700741.

Anonymous:2014:LSI

[3602] Anonymous. Lack of security in Inter-net of Things devices. Network Secu-rity, 2014(8):2, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700753.

Anonymous:2014:Bh

[3603] Anonymous. In brief. Network Secu-rity, 2014(8):3, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700765.

Anonymous:2014:KLA

[3604] Anonymous. Kali Linux — assur-ing security by penetration testing.Network Security, 2014(8):4, August2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700777.

Bridge:2014:EPP

[3605] Phil Bridge. EU puts pressure on busi-nesses to erase data. Network Security,2014(8):5–8, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700789.

Tang:2014:GPT

[3606] Andrew Tang. A guide to pene-tration testing. Network Security,2014(8):8–11, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700790.

Lowe:2014:DAC

[3607] Mark Lowe. Defending againstcyber-criminals targeting businesswebsites. Network Security, 2014(8):11–13, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700807.

Mansfield-Devine:2014:CC

[3608] Steve Mansfield-Devine. Not cop-ing with change. Network Security,2014(8):14–17, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700819.

Watts:2014:ICB

[3609] Steve Watts. Intelligent combination— the benefits of tokenless two-factorauthentication. Network Security, 2014(8):17–20, August 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700820.

Page 437: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 437

Anonymous:2014:ECh

[3610] Anonymous. Events calendar. Net-work Security, 2014(8):20, August2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700832.

Anonymous:2014:NAN

[3611] Anonymous. NATO adopts new pol-icy calling for collective defence againstcyber-attacks. Network Security, 2014(9):1–2, September 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700844.

Anonymous:2014:ODW

[3612] Anonymous. ‘One-day wonder’ web-sites used to launch attacks. Net-work Security, 2014(9):2, September2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700856.

Anonymous:2014:Bi

[3613] Anonymous. In brief. Network Se-curity, 2014(9):3, September 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700868.

Anonymous:2014:BRPb

[3614] Anonymous. Book review: PythonForensics, Chet Hosmer, Syngress.ISBN 978-0-12-418676-7 (print), 978-0-12-418683-5 (e-book). Network Se-curity, 2014(9):4, September 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S135348581470087X.

Anonymous:2014:BIS

[3615] Anonymous. The basics of infor-mation security. Network Security,2014(9):4, September 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700881.

Saunders:2014:PAE

[3616] Simon Saunders. Protecting againstespionage. Network Security, 2014(9):5–7, September 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700893.

Beckett:2014:BPP

[3617] Phil Beckett. BYOD — popular andproblematic. Network Security, 2014(9):7–9, September 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581470090X.

Lockner:2014:DYK

[3618] Julie Lockner. Do you know whereyour sensitive data is kept? NetworkSecurity, 2014(9):10–12, September2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700911.

Mansfield-Devine:2014:HIS

[3619] Steve Mansfield-Devine. Hacking on anindustrial scale. Network Security, 2014(9):12–16, September 2014. CODEN

Page 438: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 438

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700923.

Gonda:2014:UTS

[3620] Oded Gonda. Understanding thethreat to SCADA networks. NetworkSecurity, 2014(9):17–18, September2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700935.

Andresen:2014:OSF

[3621] Lasse Andresen. Open sourcing the fu-ture of IAM. Network Security, 2014(9):18–20, September 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700947.

Anonymous:2014:ECi

[3622] Anonymous. Events calendar. Net-work Security, 2014(9):20, September2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700959.

Anonymous:2014:SBS

[3623] Anonymous. Shellshock bug has se-curity experts in a panic and hack-ers searching for exploits. Net-work Security, 2014(10):1–2, October2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700960.

Anonymous:2014:SCM

[3624] Anonymous. Spam creates ma-jor disruption. Network Security,2014(10):2, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700972.

Anonymous:2014:Bj

[3625] Anonymous. In brief. NetworkSecurity, 2014(10):3, October 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814700984.

Anonymous:2014:PNS

[3626] Anonymous. The practice of networksecurity monitoring. Network Security,2014(10):4, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814700996.

Brazil:2014:SMM

[3627] Jody Brazil. Security metrics to man-age change. Network Security, 2014(10):5–7, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581470100X.

Boldyreva:2014:MEW

[3628] Alexandra Boldyreva and Paul Grubbs.Making encryption work in thecloud. Network Security, 2014(10):8–10, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),

Page 439: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 439

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701011.

Bradbury:2014:APG

[3629] Danny Bradbury. Anonymity andprivacy: a guide for the per-plexed. Network Security, 2014(10):10–14, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701023.

Martini:2014:SAW

[3630] Paul Martini. A secure approach towearable technology. Network Secu-rity, 2014(10):15–17, October 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701035.

Mansfield-Devine:2014:MSD

[3631] Steve Mansfield-Devine. Masking sen-sitive data. Network Security, 2014(10):17–20, October 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701047.

Anonymous:2014:ECj

[3632] Anonymous. Events calendar. Net-work Security, 2014(10):20, October2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701059.

Anonymous:2014:ITB

[3633] Anonymous. Insider threat becom-ing more significant, says Kasper-

sky. Network Security, 2014(11):1–2, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701060.

Anonymous:2014:FFI

[3634] Anonymous. Four-fold increase inDDoS attacks. Network Security,2014(11):2, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701072.

Anonymous:2014:Bk

[3635] Anonymous. In brief. Network Se-curity, 2014(11):3, November 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701084.

Anonymous:2014:WFA

[3636] Anonymous. Windows forensic anal-ysis toolkit. Network Security, 2014(11):4, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701096.

Anonymous:2014:SEP

[3637] Anonymous. Social engineering pen-etration testing. Network Security,2014(11):4, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701102.

Page 440: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 440

Munro:2014:ASA

[3638] Ken Munro. Android scraping: ac-cessing personal data on mobile de-vices. Network Security, 2014(11):5–9, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701114.

Taylor:2014:FIS

[3639] Mark Taylor, John Haggerty, DavidGresty, Peter Almond, and TomBerry. Forensic investigation of so-cial networking applications. NetworkSecurity, 2014(11):9–16, November2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701126.

Mansfield-Devine:2014:MSA

[3640] Steve Mansfield-Devine. Mobile secu-rity: it’s all about behaviour. NetworkSecurity, 2014(11):16–20, November2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701138.

Anonymous:2014:RGL

[3641] Anonymous. Russian Governmentlikely behind APTs, says Fire-Eye. Network Security, 2014(11):20, November 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581470114X.

Anonymous:2014:ECk

[3642] Anonymous. Events calendar. Net-work Security, 2014(11):20, November

2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701151.

Anonymous:2014:SSM

[3643] Anonymous. Sony suffers major databreach as attackers leak files and de-stroy hard drives. Network Security,2014(12):1–2, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701163.

Anonymous:2014:RSS

[3644] Anonymous. Is Regin the son ofStuxnet? Network Security, 2014(12):2, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701175.

Anonymous:2014:Bl

[3645] Anonymous. In brief. Network Se-curity, 2014(12):3, December 2014.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701187.

Anonymous:2014:HPT

[3646] Anonymous. Hacking and pene-tration testing with low power de-vices. Network Security, 2014(12):4, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701199.

Page 441: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 441

Tipping:2014:RTV

[3647] David Tipping. The rising threats fromVoice over IP. Network Security, 2014(12):5–6, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701205.

Kalra:2014:TAE

[3648] Gursev Singh Kalra. Threat anal-ysis of an enterprise messaging sys-tem. Network Security, 2014(12):7–13, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701217.

Jones:2014:TDD

[3649] Robert Jones and Tony Dearsley.Time for a data detox. NetworkSecurity, 2014(12):13–15, December2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701229.

Goldberg:2014:TUT

[3650] Joe Goldberg. Tackling unknownthreats. Network Security, 2014(12):16–17, December 2014. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701230.

Lane:2014:CDS

[3651] Ashley Lane. Cross domain so-lutions — and why they mat-ter. Network Security, 2014(12):18–20, December 2014. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485814701242.

Anonymous:2014:ECl

[3652] Anonymous. Events calendar. Net-work Security, 2014(12):20, December2014. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485814701254.

Anonymous:2015:DRW

[3653] Anonymous. Doubts remain overwhether North Korea was responsi-ble for massive hack of Sony Pic-tures. Network Security, 2015(1):1–2, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700012.

Anonymous:2015:TUA

[3654] Anonymous. Tor under attack,again. Network Security, 2015(1):2, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700024.

Anonymous:2015:SG

[3655] Anonymous. Steve Gold — 1956–2015. Network Security, 2015(1):3, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700036.

Page 442: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 442

Anonymous:2015:Ba

[3656] Anonymous. In brief. Network Secu-rity, 2015(1):3, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700048.

Anonymous:2015:BRP

[3657] Anonymous. Book review: Penetra-tion Testing with the Bash Shell, byKeith Makan. Packt Publishing. ISBN978-1-84969-510-7. Network Security,2015(1):4, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581570005X.

Anonymous:2015:BRL

[3658] Anonymous. Book review: Learn-ing PHP, MySQL, JavaScript, CSS& HTML5, by Robin Nixon. ThirdEdition. O’Reilly. ISBN 978-1-4919-4946-7. Network Security, 2015(1):4, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700061.

Densham:2015:TCS

[3659] Ben Densham. Three cyber-securitystrategies to mitigate the impact ofa data breach. Network Security,2015(1):5–8, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700073.

Patel:2015:NPC

[3660] Ashish Patel. Network perfor-mance without compromising se-curity. Network Security, 2015(1):9–12, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700085.

Lafuente:2015:BDS

[3661] Guillermo Lafuente. The big data se-curity challenge. Network Security,2015(1):12–14, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700097.

Mansfield-Devine:2015:MIC

[3662] Steve Mansfield-Devine. Man-aging identity for a competitiveedge. Network Security, 2015(1):14–18, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700103.

Zhang:2015:BYO

[3663] Hongwen Zhang. Bring your ownencryption: balancing security withpracticality. Network Security, 2015(1):18–20, January 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815700115.

Anonymous:2015:ECa

[3664] Anonymous. Events calendar. Net-work Security, 2015(1):20, January

Page 443: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 443

2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815700127.

Anonymous:2015:EOS

[3665] Anonymous. European organisationsare still not ready for forthcoming dataprotection rules. Network Security,2015(2):1–2, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300015.

Anonymous:2015:LHA

[3666] Anonymous. Linux hit by anotherlong-term flaw. Network Security,2015(2):2, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300027.

Anonymous:2015:Bb

[3667] Anonymous. In brief. NetworkSecurity, 2015(2):3, February 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300039.

Anonymous:2015:BRK

[3668] Anonymous. Book reviewKali LinuxNetwork Scanning Cookbook, by JustinHutchens. Packt Publishing. ISBN978-1-78398-214-1. Network Security,2015(2):4, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300040.

Mansfield-Devine:2015:PD

[3669] Steve Mansfield-Devine. The privacydilemma. Network Security, 2015(2):5–10, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300052.

Nielsen:2015:ICK

[3670] Poul Nielsen. The importance ofcontext in keeping end users se-cure. Network Security, 2015(2):10–13, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300064.

Green:2015:SAC

[3671] John Green. Staying ahead of cyber-attacks. Network Security, 2015(2):13–16, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300076.

Millard:2015:CMT

[3672] Gavin Millard. Continuous moni-toring for transient devices. Net-work Security, 2015(2):16–18, February2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300088.

Beckett:2015:IAS

[3673] Phil Beckett. An intelligent approachto security. Network Security, 2015(2):18–20, February 2015. CODENNTSCF5. ISSN 1353-4858 (print),

Page 444: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 444

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530009X.

Anonymous:2015:ECb

[3674] Anonymous. Events calendar. Net-work Security, 2015(2):20, February2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300106.

Anonymous:2015:MSL

[3675] Anonymous. More Snowden leaksreveal hacking by NSA and GCHQagainst communications firm. Net-work Security, 2015(3):1–2, March2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300118.

Anonymous:2015:NTH

[3676] Anonymous. NSA also targetshard drives. Network Security,2015(3):2, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530012X.

Anonymous:2015:Bc

[3677] Anonymous. In brief. Network Secu-rity, 2015(3):3, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300131.

Anonymous:2015:BRI

[3678] Anonymous. Book review: Indus-trial Network Security, by Eric Knappand Joel Langill. Syngress. ISBN

978-0-12-420114-9. Network Secu-rity, 2015(3):4, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300143.

Anonymous:2015:BRGa

[3679] Anonymous. Book review: GoogleEarth Forensics, by Michael Harring-ton and Michael Cross. Syngress. ISBN978-0-12-800216-2. Network Secu-rity, 2015(3):4, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300155.

Tankard:2015:HSY

[3680] Colin Tankard. How secure isyour building? Network Security,2015(3):5–8, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300167.

Cates:2015:ESI

[3681] Sol Cates. The evolution of secu-rity intelligence. Network Security,2015(3):8–10, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300179.

Everett:2015:SDN

[3682] Cath Everett. Should the dark netbe taken out? Network Security,2015(3):10–13, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

Page 445: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 445

//www.sciencedirect.com/science/

article/pii/S1353485815300180.

Buesnel:2015:TSN

[3683] Guy Buesnel. Threats to satellite nav-igation systems. Network Security,2015(3):14–18, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300192.

Newe:2015:DIT

[3684] Gary Newe. Delivering the Inter-net of Things. Network Security,2015(3):18–20, March 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300209.

Anonymous:2015:ECc

[3685] Anonymous. Events calendar. Net-work Security, 2015(3):20, March2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300210.

Anonymous:2015:MVO

[3686] Anonymous. Mobile vulnerabilitiesare opening the door to cyber-attackson corporates. Network Security,2015(4):1–2, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300222.

Anonymous:2015:BAA

[3687] Anonymous. British Airways amonglatest breaches. Network Security,2015(4):2, 20, April 2015. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300234.

Anonymous:2015:Bd

[3688] Anonymous. In brief. Network Secu-rity, 2015(4):3, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300246.

Anonymous:2015:BRBa

[3689] Anonymous. Book review: Black HatPython, Justin Seitz. No Starch Press.ISBN 978-1-59327-590-7. Network Se-curity, 2015(4):4, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300258.

Clay:2015:MTR

[3690] Peter Clay. A modern threat re-sponse framework. Network Security,2015(4):5–10, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530026X.

Kedgley:2015:IYC

[3691] Mark Kedgley. If you can’tstop the breach, at least spot thebreach. Network Security, 2015(4):11–12, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300271.

Page 446: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 446

Auty:2015:AAP

[3692] Mike Auty. Anatomy of an advancedpersistent threat. Network Security,2015(4):13–16, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300283.

Amigorena:2015:RKU

[3693] Francois Amigorena. Relevance isthe key to users’ security under-standing. Network Security, 2015(4):17–18, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300295.

Beckett:2015:GYB

[3694] Phil Beckett. Getting your back-updata back up to date. Network Security,2015(4):18–20, April 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300301.

Anonymous:2015:ECd

[3695] Anonymous. Events calendar. Net-work Security, 2015(4):20, April 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300313.

Anonymous:2015:MMG

[3696] Anonymous. Mobile malware goesstraight for the money, says Kaspersky.Network Security, 2015(5):1–2, May2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485815300325.

Anonymous:2015:DAG

[3697] Anonymous. DDoS attacks grow. Net-work Security, 2015(5):2, 20, May2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300337.

Anonymous:2015:Be

[3698] Anonymous. In brief. Network Secu-rity, 2015(5):3, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300349.

Anonymous:2015:BRBb

[3699] Anonymous. Book review: Build-ing an Information Security Aware-ness Program, Bill Gardner and Va-lerie Thomas. Syngress. ISBN 978-0-12-419967-5. Network Security,2015(5):4, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300350.

Anonymous:2015:BRGb

[3700] Anonymous. Book review: TheGNU Make Book, John Graham-Cumming. No Starch Press. ISBN978-1-59327-649-2. Network Secu-rity, 2015(5):4, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300362.

Page 447: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 447

Brewer:2015:CTR

[3701] Ross Brewer. Cyber threats: reduc-ing the time to detection and response.Network Security, 2015(5):5–8, May2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300374.

Tankard:2015:DCF

[3702] Colin Tankard. Data classifica-tion — the foundation of informa-tion security. Network Security,2015(5):8–11, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300386.

Caldwell:2015:HGH

[3703] Tracey Caldwell. Hacktivism goeshardcore. Network Security, 2015(5):12–17, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300398.

German:2015:DUV

[3704] Paul German. The dangers of un-secured voice. Network Security,2015(5):18–19, May 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300404.

Anonymous:2015:IMR

[3705] Anonymous. IoT multiplies risk ofattack. Network Security, 2015(5):20, May 2015. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371

(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485815300416.

Anonymous:2015:ECe

[3706] Anonymous. Events calendar. Net-work Security, 2015(5):20, May 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300428.

Anonymous:2015:DLS

[3707] Anonymous. Darknet less se-cure than many think, say re-searchers. Network Security, 2015(6):1–2, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530043X.

Anonymous:2015:LLL

[3708] Anonymous. Logjam is latestlong-term flaw. Network Security,2015(6):2, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300441.

Anonymous:2015:Bf

[3709] Anonymous. In brief. Network Secu-rity, 2015(6):3, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300453.

Anonymous:2015:BRAa

[3710] Anonymous. Book review: An-droid Security Internals, NikolayElenkov. No Starch Press. ISBN

Page 448: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 448

978-1-59327-581-5. Network Secu-rity, 2015(6):4, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300465.

Ring:2015:KTT

[3711] Tim Ring. Keeping tabs on track-ing technology. Network Security,2015(6):5–8, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300477.

Hooson:2015:SYD

[3712] Stuart Hooson. Smarten your datasecurity before new EU legislation orrisk corporate loss. Network Secu-rity, 2015(6):8–10, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300489.

Stange:2015:DMA

[3713] Szilard Stange. Detecting malwareacross operating systems. NetworkSecurity, 2015(6):11–14, June 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300490.

Hald:2015:RRA

[3714] David Hald and Alex Udakis. Rethink-ing remote authentication: time to kisstokens goodbye? Network Security,2015(6):15–17, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300507.

Huard:2015:DQP

[3715] Boris Huard. The data qualityparadox. Network Security, 2015(6):18–20, June 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300519.

Anonymous:2015:ECf

[3716] Anonymous. Events calendar. Net-work Security, 2015(6):20, June 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300520.

Anonymous:2015:SSF

[3717] Anonymous. Surveillance softwarefirm Hacking Team is hacked. Net-work Security, 2015(7):1–2, July 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300532.

Anonymous:2015:ESS

[3718] Anonymous. Europol sets sights onIS. Network Security, 2015(7):2, July2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300544.

Anonymous:2015:Bg

[3719] Anonymous. In brief. Network Secu-rity, 2015(7):3, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

Page 449: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 449

//www.sciencedirect.com/science/

article/pii/S1353485815300556.

Anonymous:2015:BRM

[3720] Anonymous. Book review: The MobileApplication Hacker’s Handbook, by Do-minic Chell, Tyrone Erasmus, ShaunColley, and Ollie Whitehouse Wiley.ISBN 978-1-118-95850-6. Network Se-curity, 2015(7):4, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300568.

Kingswood:2015:CCW

[3721] Matt Kingswood. Climate changewill require more agile business con-tinuity planning. Network Security,2015(7):5–10, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530057X.

Ring:2015:CSF

[3722] Tim Ring. Cloud security fears:fact or FUD? Network Security,2015(7):10–14, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300581.

McKenna:2015:HFA

[3723] Matthew McKenna. How federalagencies can secure their cloud mi-grations. Network Security, 2015(7):14–16, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300593.

Larson:2015:ITW

[3724] Dave Larson and Stephen Gates.Is it true that what you can’t seecan’t hurt you? Network Security,2015(7):17–18, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530060X.

Watts:2015:NDP

[3725] Steve Watts. NFC and 2FA: the deathof the password? Network Security,2015(7):19–20, July 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300611.

Anonymous:2015:ECg

[3726] Anonymous. Events calendar. Net-work Security, 2015(7):20, July 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300623.

Anonymous:2015:ASV

[3727] Anonymous. Android stagefright vul-nerability threatens all devices —and fixing it isn’t that easy. Net-work Security, 2015(8):1–2, August2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300635.

Anonymous:2015:UPS

[3728] Anonymous. UK public sectorweak on security. Network Security,2015(8):2, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),

Page 450: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 450

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300647.

Anonymous:2015:Bh

[3729] Anonymous. In brief. Network Secu-rity, 2015(8):3, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300659.

SM-D:2015:BRH

[3730] SM-D. Book review: Hacking Web In-telligence, [by Sudhanshu Chauhan andNutan Kumar Panda. Syngress. ISBN978-0-12-801867-5]. Network Secu-rity, 2015(8):4, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300660.

SM-D:2015:BRB

[3731] SM-D. Book review: The Bookof GNS3 [by Jason Neumann. NoStarch Press. ISBN 978-1-59327-554-9]. Network Security, 2015(8):4, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300672.

Smyth:2015:CSF

[3732] Vincent Smyth. Cyber-securityfortresses built on quicksand. Net-work Security, 2015(8):5–8, August2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300684.

Simmonds:2015:DII

[3733] Paul Simmonds. The digital iden-tity issue. Network Security, 2015(8):8–13, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300696.

Richter:2015:MYD

[3734] Chris Richter. Managing your datarisk: back to basics. Network Security,2015(8):13–15, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300702.

Knights:2015:MID

[3735] Ricky Knights and Emma Mor-ris. Move to intelligence-drivensecurity. Network Security, 2015(8):15–18, August 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300714.

Anstee:2015:PTT

[3736] Darren Anstee. Preparing for to-morrow’s threat landscape. Net-work Security, 2015(8):18–20, August2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300726.

Anonymous:2015:ECh

[3737] Anonymous. Events calendar. Net-work Security, 2015(8):20, August2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 451: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 451

URL http://www.sciencedirect.

com/science/article/pii/S1353485815300738.

Anonymous:2015:DAR

[3738] Anonymous. DDoS attacks on the riseand being used to mask other, moresignificant breaches. Network Security,2015(9):1–2, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530074X.

Anonymous:2015:MHD

[3739] Anonymous. Malvertising hits dat-ing websites. Network Security, 2015(9):2, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300751.

Anonymous:2015:Bi

[3740] Anonymous. In brief. Network Se-curity, 2015(9):3, September 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300763.

Anonymous:2015:BRSa

[3741] Anonymous. Book review: SecuringSQL Server, by Denny Cherry. Syn-gress. ISBN 978-0-12-801275-8. Net-work Security, 2015(9):4, September2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300775.

Anonymous:2015:BRDa

[3742] Anonymous. Book review: Dig-ital Identity Management, Mary-

line Laurent and Samia Bouzefrane.ISTE Press/Elsevier. ISBN 978-1-78548-004-1. Network Security, 2015(9):4, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300787.

Bocek:2015:HEP

[3743] Kevin Bocek. Is HTTPS enough to pro-tect governments? Network Security,2015(9):5–8, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300799.

Mansfield-Devine:2015:AMA

[3744] Steve Mansfield-Devine. The AshleyMadison affair. Network Security, 2015(9):8–16, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300805.

Kirk:2015:CFI

[3745] Richard Kirk. Cars of the future:the Internet of Things in the automo-tive industry. Network Security, 2015(9):16–18, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300817.

Rozanski:2015:UCD

[3746] Shahaf Rozanski. Using clouddata to accelerate forensic investi-gations. Network Security, 2015(9):19–20, September 2015. CODENNTSCF5. ISSN 1353-4858 (print),

Page 452: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 452

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300829.

Anonymous:2015:ECi

[3747] Anonymous. Events calendar. Net-work Security, 2015(9):20, September2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300830.

Anonymous:2015:HOS

[3748] Anonymous. Healthcare organi-sations struggle to maintain se-curity. Network Security, 2015(10):1–2, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300842.

Anonymous:2015:CC

[3749] Anonymous. The cost of cyber-crime. Network Security, 2015(10):2, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300854.

Anonymous:2015:Bj

[3750] Anonymous. In brief. NetworkSecurity, 2015(10):3, October 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300866.

Anonymous:2015:BRSb

[3751] Anonymous. Book review: Suc-cess Strategies from Women inSTEM, Edited by Peggy A Pritchard

and Christine Grant. Second edi-tion. Academic Press. ISBN 978-0-12-397181-4. Network Security,2015(10):4, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300878.

Anonymous:2015:BRDb

[3752] Anonymous. Book review: Do-ing Math With Python, Amit Saha.No Starch Press. ISBN 978-1-59327-640-9. Network Security, 2015(10):4, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530088X.

Hof:2015:AND

[3753] Jan Hof. Addressing new demands onnetwork security. Network Security,2015(10):5–7, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300891.

Marrison:2015:UTD

[3754] Chris Marrison. Understanding thethreats to DNS and how to se-cure it. Network Security, 2015(10):8–10, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300908.

Harrison:2015:RCS

[3755] Reuven Harrison. Reducing com-plexity in securing heterogeneous net-works. Network Security, 2015(10):

Page 453: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 453

11–13, October 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581530091X.

Mansfield-Devine:2015:GED

[3756] Steve Mansfield-Devine. The growthand evolution of DDoS. Network Se-curity, 2015(10):13–20, October 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300921.

Anonymous:2015:ECj

[3757] Anonymous. Events calendar. Net-work Security, 2015(10):20, October2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300933.

Anonymous:2015:UGB

[3758] Anonymous. UK Government bat-tles tech firms over encryption. Net-work Security, 2015(11):1–2, November2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300945.

Anonymous:2015:RDN

[3759] Anonymous. Ransomware defeated butnew forms emerge. Network Security,2015(11):2, November 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300957.

Anonymous:2015:Bk

[3760] Anonymous. In brief. Network Se-curity, 2015(11):3, November 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300969.

Anonymous:2015:BRH

[3761] Anonymous. Book review: How Soft-ware Works, by V Anton Spraul.No Starch Press. ISBN 978-1-59327-666-9. Network Security, 2015(11):4, November 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300970.

Mansfield-Devine:2015:WAT

[3762] Steve Mansfield-Devine. When adver-tising turns nasty. Network Security,2015(11):5–8, November 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815300982.

German:2015:CSC

[3763] Paul German. Counting the secu-rity cost of cheap calls. NetworkSecurity, 2015(11):9–11, November2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815300994.

Ring:2015:CCN

[3764] Tim Ring. Connected cars — thenext target for hackers. NetworkSecurity, 2015(11):11–16, November2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 454: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 454

URL http://www.sciencedirect.

com/science/article/pii/S1353485815301008.

Beckett:2015:BRU

[3765] Phil Beckett. The business risks ofusing smartphones. Network Secu-rity, 2015(11):16–17, November 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581530101X.

Maule-ffinch:2015:KTI

[3766] Bradley Maule-ffinch. Key trendsin information security. NetworkSecurity, 2015(11):18–20, November2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815301021.

Anonymous:2015:ECk

[3767] Anonymous. Events calendar. Net-work Security, 2015(11):20, November2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815301033.

Anonymous:2015:FUC

[3768] Anonymous. A fifth of UK con-sumers are victims of theft via databreaches. Network Security, 2015(12):1–2, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301045.

Anonymous:2015:FFW

[3769] Anonymous. Four out of five web appsfail key tests. Network Security, 2015(12):2, 20, December 2015. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301057.

Anonymous:2015:Bl

[3770] Anonymous. In brief. Network Se-curity, 2015(12):3, December 2015.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485815301069.

Anonymous:2015:BRC

[3771] Anonymous. Book review: Cocoa Pro-gramming for OS X, by Aaron Hille-gass, Adam Preble and Nate Chandler.Fifth edition. Big Nerd Ranch. ISBN978-0-13-407695-9. Network Security,2015(12):4, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301070.

Anonymous:2015:BRAb

[3772] Anonymous. Book review: An-droid Programming, by Bill Phillips,Chris Stewart, Brian Hardy &Kristin Marsicano. Second edition,Big Nerd Ranch. ISBN 978-0-13-417145-6. Network Security, 2015(12):4, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301082.

Kirk:2015:TSN

[3773] Richard Kirk. Threat sharing —a neighbourhood watch for securitypractitioners. Network Security, 2015(12):5–7, December 2015. CODEN

Page 455: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 455

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301094.

Caldwell:2015:TAD

[3774] Tracey Caldwell. Taking agile develop-ment beyond software — what are thesecurity risks? Network Security, 2015(12):8–11, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301100.

Adato:2015:NOP

[3775] Leon Adato. Network outages — pickyour battles. Network Security, 2015(12):12–13, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301112.

Mansfield-Devine:2015:UR

[3776] Steve Mansfield-Devine. Under theradar. Network Security, 2015(12):14–18, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301124.

Watts:2015:HGA

[3777] Steve Watts. The holy grail of au-thentication. Network Security, 2015(12):18–19, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301136.

Anonymous:2015:WRD

[3778] Anonymous. Wide range of devices vul-nerable to hacking. Network Security,2015(12):20, December 2015. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485815301148.

Anonymous:2015:ECl

[3779] Anonymous. Events calendar. Net-work Security, 2015(12):20, December2015. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581530115X.

Anonymous:2016:JFC

[3780] Anonymous. Juniper firewalls con-tain deliberate weakness that pro-vides back door. Network Security,2016(1):1–2, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300010.

Anonymous:2016:MBE

[3781] Anonymous. More battles over encryp-tion & surveillance. Network Secu-rity, 2016(1):2, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300022.

Anonymous:2016:Ba

[3782] Anonymous. In brief. Network Secu-rity, 2016(1):3, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300034.

Page 456: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 456

Anonymous:2016:BRH

[3783] Anonymous. Book review: Howto Attack and Defend Your Website,by Henry Dalziel. Syngress. ISBN978-0-12-802754-7. Network Security,2016(1):4, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300046.

Anonymous:2016:BRS

[3784] Anonymous. Book review: Secur-ing Social Media in the Enterprise,by Henry Dalziel. Syngress. ISBN978-0-12-804180-2. Network Security,2016(1):4, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300058.

Shaulov:2016:BMS

[3785] Michael Shaulov. Bridging mobilesecurity gaps. Network Security,2016(1):5–8, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581630006X.

Fimin:2016:BBA

[3786] Michael Fimin. Breaking bad:avoiding the 10 worst IT adminhabits. Network Security, 2016(1):8–11, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300071.

Touchette:2016:EM

[3787] Fred Touchette. The evolution ofmalware. Network Security, 2016(1):11–14, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300083.

Wilkinson:2016:CDI

[3788] William Wilkinson. Cyber discoveryin investigations. Network Security,2016(1):15–17, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300095.

King:2016:KCS

[3789] Jason King and Dan Evans. Key cri-teria for selecting a secure cloud wire-less net work. Network Security, 2016(1):17–20, January 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300101.

Anonymous:2016:ECa

[3790] Anonymous. Events calendar. Net-work Security, 2016(1):20, January2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300113.

Anonymous:2016:IIP

[3791] Anonymous. Impending Investi-gatory Powers Bill comes underfire. Network Security, 2016(2):1–2, February 2016. CODENNTSCF5. ISSN 1353-4858 (print),

Page 457: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 457

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300125.

Anonymous:2016:FWP

[3792] Anonymous. Firms willing to payransoms. Network Security, 2016(2):2, 20, February 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300137.

Anonymous:2016:Bb

[3793] Anonymous. In brief. NetworkSecurity, 2016(2):3, February 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300149.

Anonymous:2016:BRI

[3794] Anonymous. Book review: iOS Ap-plication Security, by David Thiel.No Starch Press. ISBN 978-1-59327-601-0. Network Security, 2016(2):4, February 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300150.

Muscat:2016:WVI

[3795] Ian Muscat. Web vulnerabili-ties: identifying patterns and reme-dies. Network Security, 2016(2):5–10, February 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300162.

Everett:2016:PFD

[3796] Cath Everett. Are passwords fi-nally dying? Network Security, 2016(2):10–14, February 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300174.

Mansfield-Devine:2016:SGB

[3797] Steve Mansfield-Devine. Security guar-antees: building credibility for secu-rity vendors. Network Security, 2016(2):14–18, February 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300186.

Ganesan:2016:SSP

[3798] Rajesh Ganesan. Stepping up se-curity with password managementcontrol. Network Security, 2016(2):18–19, February 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300198.

Anonymous:2016:ESF

[3799] Anonymous. Energy sector firms facephysically damaging attacks. Net-work Security, 2016(2):20, February2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300204.

Anonymous:2016:ECb

[3800] Anonymous. Events calendar. Net-work Security, 2016(2):20, February2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 458: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 458

URL http://www.sciencedirect.

com/science/article/pii/S1353485816300216.

Anonymous:2016:REA

[3801] Anonymous. Ransomware expands,attacks hospitals and local author-ities, and moves to new plat-forms. Network Security, 2016(3):1–2, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300228.

Anonymous:2016:Bc

[3802] Anonymous. In brief. Network Secu-rity, 2016(3):3, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581630023X.

SM-D:2016:BRA

[3803] SM-D. Book review: Automating OpenSource Intelligence [edited by RobertLayton and Paul Watters, Syngress.ISBN 978-0-12-802916-9]. Network Se-curity, 2016(3):4, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300241.

SM-D:2016:BRI

[3804] SM-D. Book review: Infosec Man-agement Fundamentals, Henry Dalziel[Syngress. ISBN 978-0-12-804172-7].Network Security, 2016(3):4, March2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300253.

Larson:2016:DDS

[3805] Dave Larson. Distributed denialof service attacks — holding backthe flood. Network Security, 2016(3):5–7, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300265.

Gross:2016:DDB

[3806] Garrett Gross. Detecting and de-stroying botnets. Network Security,2016(3):7–10, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300277.

Haughey:2016:ANF

[3807] Hamish Haughey, Gregory Epiphan-iou, and Haider M. Al-Khateeb.Anonymity networks and the fragilecyber ecosystem. Network Security,2016(3):10–18, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300289.

German:2016:NMN

[3808] Paul German. A new month, anew data breach. Network Security,2016(3):18–20, March 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300290.

Anonymous:2016:ECc

[3809] Anonymous. Events calendar. Net-work Security, 2016(3):20, March

Page 459: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 459

2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300307.

Anonymous:2016:HBM

[3810] Anonymous. Hospitals become majortarget for ransomware. Network Secu-rity, 2016(4):1–2, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300319.

Anonymous:2016:CAF

[3811] Anonymous. Car alarm at the FBI.Network Security, 2016(4):2, April2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300320.

Anonymous:2016:Bd

[3812] Anonymous. In brief. Network Secu-rity, 2016(4):3, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300332.

Anonymous:2016:BRCa

[3813] Anonymous. Book review: TheCar Hacker’s Handbook, by CraigSmith. No Starch Press. ISBN 978-1-59327-703-1. Network Security,2016(4):4, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300344.

Anonymous:2016:BRN

[3814] Anonymous. Book review: Next Gen-eration Red Teaming, by Henry Dalziel.Syngress. ISBN 978-0-12-804171-0.Network Security, 2016(4):4, April2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300356.

Furnell:2016:VMP

[3815] Steve Furnell. Vulnerability man-agement: not a patch on wherewe should be? Network Security,2016(4):5–9, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300368.

Harwood:2016:LPG

[3816] Will Harwood. Locking up pass-words — for good. Network Security,2016(4):10–13, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581630037X.

Mansfield-Devine:2016:YLY

[3817] Steve Mansfield-Devine. Your life inyour hands: the security issues withhealthcare apps. Network Security,2016(4):14–18, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300381.

Rozanski:2016:PTC

[3818] Shahaf Rozanski. Peering throughthe cloud. Network Security, 2016

Page 460: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 460

(4):19–20, April 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300393.

Anonymous:2016:ECd

[3819] Anonymous. Events calendar. Net-work Security, 2016(4):20, April 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581630040X.

Anonymous:2016:UGS

[3820] Anonymous. UK Government saystwo-thirds of firms under attack.Network Security, 2016(5):1–2, May2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300411.

Anonymous:2016:OTB

[3821] Anonymous. Outside threats arethe biggest concern. Network Secu-rity, 2016(5):2, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300423.

Anonymous:2016:Be

[3822] Anonymous. In brief. Network Secu-rity, 2016(5):3, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300435.

Anonymous:2016:BRA

[3823] Anonymous. Book review: Auto-mated Security Analysis of Android

and iOS Applications with Mobile Se-curity Framework, by Henry Dalzieland Ajin Abraham. Syngress. ISBN978-0-12-805105-4. Network Secu-rity, 2016(5):4, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300447.

Anonymous:2016:BRCb

[3824] Anonymous. Book review: CISSPStudy Guide, by Eric Conrad, Seth Mis-enar and Joshua Feldman. Third edi-tion. Syngress. ISBN 978-0-12-802437-9. Network Security, 2016(5):4, May2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300459.

Grimm:2016:PCU

[3825] John Grimm. PKI: crumbling un-der the pressure. Network Security,2016(5):5–7, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300460.

Taylor:2016:AMS

[3826] Mark Taylor, John Haggerty, DavidGresty, Chris Wren, and Tom Berry.Avoiding the misuse of social me-dia by employees. Network Security,2016(5):8–11, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300472.

Page 461: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 461

Pittenger:2016:KYO

[3827] Mike Pittenger. Know your opensource code. Network Security, 2016(5):11–15, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300484.

Mansfield-Devine:2016:CSO

[3828] Steve Mansfield-Devine. Creat-ing security operations centres thatwork. Network Security, 2016(5):15–18, May 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300496.

Liu:2016:ABN

[3829] Cricket Liu. Actively boosting net-work security with passive DNS. Net-work Security, 2016(5):18–20, May2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300502.

Anonymous:2016:ECe

[3830] Anonymous. Events calendar. Net-work Security, 2016(5):20, May 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300514.

Anonymous:2016:MUC

[3831] Anonymous. Millions of user cre-dentials for popular sites sold ondark markets. Network Security,2016(6):1–2, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300526.

Anonymous:2016:Bf

[3832] Anonymous. In brief. Network Secu-rity, 2016(6):3, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300538.

Anonymous:2016:BRMa

[3833] Anonymous. Book review: MobileData Loss: Threats and Countermea-sures, by Michael Raggo. Syngress.ISBN 978-0-12-802864-3. Network Se-curity, 2016(6):4, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581630054X.

Anonymous:2016:BRT

[3834] Anonymous. Book review: Traf-fic Anomaly Detection, by An-tonio Cuadra-Sanchez and JavierAracil. Iste Press. ISBN 978-1-78548-012-6. Network Security,2016(6):4, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300551.

Tankard:2016:WGM

[3835] Colin Tankard. What the GDPRmeans for businesses. Network Secu-rity, 2016(6):5–8, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300563.

Page 462: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 462

Hall:2016:WPK

[3836] Mark Hall. Why people are keyto cyber-security. Network Security,2016(6):9–10, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300575.

Mansfield-Devine:2016:BP

[3837] Steve Mansfield-Devine. The bat-tle for privacy. Network Security,2016(6):11–15, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300587.

Dixit:2016:HFB

[3838] Sameer Dixit. Holding the fort:a business case for testing se-curity. Network Security, 2016(6):16–18, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300599.

German:2016:SSF

[3839] Paul German. The SIP securityfallacy. Network Security, 2016(6):18–20, June 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300605.

Anonymous:2016:ECf

[3840] Anonymous. Events calendar. Net-work Security, 2016(6):20, June 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485816300617.

Anonymous:2016:ALB

[3841] Anonymous. Authorities losing thebattle against cybercrime, says UK Na-tional Crime Agency. Network Secu-rity, 2016(7):1–2, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300629.

Anonymous:2016:PBT

[3842] Anonymous. Police breached thou-sands of times. Network Secu-rity, 2016(7):2, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300630.

Anonymous:2016:Bg

[3843] Anonymous. In brief. Network Secu-rity, 2016(7):3, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300642.

Anonymous:2016:BRMb

[3844] Anonymous. Book review: MalwareDiffusion Models for Modern ComplexNetworks, by Vasileios Karyotis andM. H. R. Khouzani. Morgan Kaufman.ISBN 978-0-12-802714-1. Network Se-curity, 2016(7):4, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300654.

Page 463: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 463

Anonymous:2016:BRE

[3845] Anonymous. Book review: EssentialSkills for Hackers, by Kevin Card-well, Henry Dalziel. Syngress. ISBN978-0-12-804755-2. Network Secu-rity, 2016(7):4, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300666.

Murphy:2016:NPH

[3846] Malcolm Murphy. No place tohide as DNS comes under attack.Network Security, 2016(7):5–7, July2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300678.

Hack:2016:IAB

[3847] Michael Hack. The implications ofApple’s battle with the FBI. Net-work Security, 2016(7):8–10, July2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581630068X.

Bush:2016:HDB

[3848] Don Bush. How data breacheslead to fraud. Network Security,2016(7):11–13, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300691.

Mansfield-Devine:2016:SSM

[3849] Steve Mansfield-Devine. Secur-ing small and medium-size busi-nesses. Network Security, 2016

(7):14–20, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300708.

Anonymous:2016:E

[3850] Anonymous. Events. Network Secu-rity, 2016(7):20, July 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581630071X.

Anonymous:2016:RMG

[3851] Anonymous. Ransomware menacegrows as new threats emerge. Net-work Security, 2016(8):1–2, August2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300721.

Anonymous:2016:Bh

[3852] Anonymous. In brief. Network Secu-rity, 2016(8):3, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300733.

Anonymous:2016:BRBa

[3853] Anonymous. Book review: Bit-coin and Cryptocurrency Technolo-gies, Arvind Narayanan, Joseph Bon-neau, Edward Felten, Andrew Millerand Steven Goldfeder. Network Secu-rity, 2016(8):4, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300745.

Page 464: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 464

Eddolls:2016:MCP

[3854] Matt Eddolls. Making cyber-crime prevention the highest pri-ority. Network Security, 2016(8):5–8, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300757.

German:2016:FFY

[3855] Paul German. Face the facts — yourorganisation will be breached. Net-work Security, 2016(8):9–10, August2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300769.

Rafferty:2016:DSG

[3856] Ben Rafferty. Dangerous skillsgap leaves organisations vulnera-ble. Network Security, 2016(8):11–13, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300770.

Everett:2016:SES

[3857] Cath Everett. Should encryption soft-ware be banned? Network Security,2016(8):14–17, August 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300782.

Hughes:2016:SRN

[3858] Duncan Hughes. Silent risk: new incar-nations of longstanding threats. Net-work Security, 2016(8):17–20, August

2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300794.

Anonymous:2016:ECg

[3859] Anonymous. Events calendar. Net-work Security, 2016(8):20, August2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300800.

Anonymous:2016:UUG

[3860] Anonymous. US and UK govern-ment agencies criticised over secu-rity. Network Security, 2016(9):1–2, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300812.

Anonymous:2016:TTF

[3861] Anonymous. Two-thirds of firms maybreak data laws. Network Security,2016(9):2, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300824.

Anonymous:2016:Bi

[3862] Anonymous. In brief. Network Se-curity, 2016(9):3, September 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300836.

Anonymous:2016:BRBb

[3863] Anonymous. Book review: TheBook of R, by Tilman Davies. No

Page 465: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 465

Starch Press. ISBN 978-1-59327-651-5. Network Security, 2016(9):4, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300848.

Anonymous:2016:BRCc

[3864] Anonymous. Book review: CyberGuerilla, by Jelle van Haaster, RickeyGevers and Martijn Sprengers. Syn-gress. ISBN 978-0-12-805197-9. Net-work Security, 2016(9):4, September2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581630085X.

Brewer:2016:RAD

[3865] Ross Brewer. Ransomware at-tacks: detection, prevention andcure. Network Security, 2016(9):5–9, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300861.

Sollars:2016:RBS

[3866] Marc Sollars. Risk-based security: staffcan play the defining role in secur-ing assets. Network Security, 2016(9):9–12, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300873.

Crawley:2016:HH

[3867] Adrian Crawley. Hiring hack-ers. Network Security, 2016(9):13–15, September 2016. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300885.

Burdette:2016:TA

[3868] Phil Burdette. Timeline of an at-tack. Network Security, 2016(9):16–17, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300897.

Zhang:2016:HDS

[3869] Hongwen Zhang. How to dis-infect and secure the Internet ofThings. Network Security, 2016(9):18–20, September 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300903.

Anonymous:2016:ECh

[3870] Anonymous. Events calendar. Net-work Security, 2016(9):20, September2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300915.

Anonymous:2016:UOA

[3871] Anonymous. US officially accuses Rus-sia of DNC hack while election systemscome under attack. Network Security,2016(10):1–2, October 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300927.

Page 466: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 466

Anonymous:2016:Bj

[3872] Anonymous. In brief. NetworkSecurity, 2016(10):3, October 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300939.

Anonymous:2016:BRDa

[3873] Anonymous. Book review: DataBreach Preparation and Response, byKevvie Fowler. Syngress. ISBN 978-0-12-803451-4. Network Security,2016(10):4, October 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300940.

Buratowski:2016:DSB

[3874] Michael Buratowski. The DNC serverbreach: who did it and what doesit mean? Network Security, 2016(10):5–7, October 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300952.

Mansfield-Devine:2016:RTB

[3875] Steve Mansfield-Devine. Ransomware:taking businesses hostage. Net-work Security, 2016(10):8–17, October2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816300964.

Anonymous:2016:RTR

[3876] Anonymous. Ransomware: threatand response. Network Security, 2016(10):17–19, October 2016. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300976.

Tankard:2016:SBN

[3877] Colin Tankard. Smart buildings needjoined-up security. Network Security,2016(10):20, October 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816300988.

Anonymous:2016:ECi

[3878] Anonymous. Events calendar. Net-work Security, 2016(10):20, October2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581630099X.

Anonymous:2016:UGL

[3879] Anonymous. UK Government launchesnew £1.9bn cyber-security strat-egy. Network Security, 2016(11):1–2, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301003.

Anonymous:2016:Bk

[3880] Anonymous. In brief. Network Se-curity, 2016(11):3, November 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816301015.

Anonymous:2016:BRDb

[3881] Anonymous. Book review: DNSSecurity, by Allan Liska and Geof-

Page 467: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 467

frey Stowe. Syngress. ISBN 978-0-12-803306-7. Network Security, 2016(11):4, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301027.

Fenton:2016:REC

[3882] Mike Fenton. Restoring execu-tive confidence: Red Team oper-ations. Network Security, 2016(11):5–7, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301039.

Mansfield-Devine:2016:DGM

[3883] Steve Mansfield-Devine. DDoSgoes mainstream: how headline-grabbing attacks could make thisthreat an organisation’s biggest night-mare. Network Security, 2016(11):7–13, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301040.

Snyder:2016:PHT

[3884] Patrick Snyder and Alien Vault. Play-ing hackers at their own game. NetworkSecurity, 2016(11):14–16, November2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816301052.

Higgins:2016:AAL

[3885] David Higgins. Anatomy of an at-tack: ‘lights out’ in Ukraine. NetworkSecurity, 2016(11):17–19, November

2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816301064.

Anonymous:2016:ECj

[3886] Anonymous. Events calendar. Net-work Security, 2016(11):20, November2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816301076.

Renaud:2016:NUI

[3887] Karen Renaud. No, users are notirrational. Network Security, 2016(11):20, November 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301088.

Anonymous:2016:MIT

[3888] Anonymous. Major ISPs targetedin Internet of Things botnet at-tacks. Network Security, 2016(12):1–2, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581630109X.

Anonymous:2016:RCM

[3889] Anonymous. Ransomware claimsmore victims. Network Security, 2016(12):2, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301106.

Page 468: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 468

Anonymous:2016:Bl

[3890] Anonymous. In brief. Network Se-curity, 2016(12):3, December 2016.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816301118.

Anonymous:2016:BRU

[3891] Anonymous. Book review: Under-standing ECMAScript 6, by NicholasC Zakas. No Starch Press. ISBN 978-1-59327-757-4. Network Security, 2016(12):4, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581630112X.

Anonymous:2016:BRW

[3892] Anonymous. Book review: WickedCool Shell Scripts, by Dave Tay-lor and Brandon Perry. Second edi-tion. No Starch Press. ISBN 978-1-59327-602-7. Network Security, 2016(12):4, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301131.

Pittenger:2016:ASC

[3893] Mike Pittenger. Addressing the se-curity challenges of using contain-ers. Network Security, 2016(12):5–8, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301143.

Dixit:2016:OVR

[3894] Sameer Dixit. Opportunity vs riskwith the Internet of Things. NetworkSecurity, 2016(12):8–10, December2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485816301155.

Mansfield-Devine:2016:DCK

[3895] Steve Mansfield-Devine. Data classi-fication: keeping track of your mostprecious asset. Network Security, 2016(12):10–15, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301167.

Wagner:2016:HTA

[3896] Mathias Wagner. The hard truth abouthardware in cyber-security: it’s moreimportant. Network Security, 2016(12):16–19, December 2016. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485816301179.

Tankard:2016:DW

[3897] Colin Tankard. The danger within.Network Security, 2016(12):20, De-cember 2016. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485816301180.

Anonymous:2016:ECk

[3898] Anonymous. Events calendar. Net-work Security, 2016(12):20, December2016. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 469: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 469

URL http://www.sciencedirect.

com/science/article/pii/S1353485816301192.

Anonymous:2017:RBMa

[3899] Anonymous. Ransomware becomesmost popular form of attack as pay-outs approach $1bn a year. Net-work Security, 2017(1):1–2, January2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300016.

Anonymous:2017:Ba

[3900] Anonymous. In brief. Network Secu-rity, 2017(1):3, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300028.

Anonymous:2017:BRUa

[3901] Anonymous. Book review: Un-derstanding Social Engineering-BasedScams, edited by Markus Jakob-sson. Springer. ISBN 978-1-4939-6455-0. Network Security, 2017(1):4, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730003X.

Graves:2017:DFM

[3902] Jamie Graves. Data flow manage-ment: why and how. Network Security,2017(1):5–6, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300041.

Mansfield-Devine:2017:OSS

[3903] Steve Mansfield-Devine. Open sourcesoftware: determining the real riskposed by vulnerabilities. Network Se-curity, 2017(1):7–12, January 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300053.

Wood:2017:HMS

[3904] Michael Wood. How to make SD-WAN secure. Network Security, 2017(1):12–14, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300065.

German:2017:YSB

[3905] Paul German. Is your session bor-der controller providing a false senseof security? Network Security, 2017(1):14–16, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300077.

Welch:2017:EWS

[3906] Bill Welch. Exploiting the weak-nesses of SS7. Network Security, 2017(1):17–19, January 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300089.

Renaud:2017:WCP

[3907] Karen Renaud. Webcam cover-ing phenomenon. Network Security,2017(1):20, January 2017. CODEN

Page 470: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 470

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300090.

Anonymous:2017:ECa

[3908] Anonymous. Events calendar. Net-work Security, 2017(1):20, January2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300107.

Anonymous:2017:RBMb

[3909] Anonymous. Ransomware becomesthe most prevalent form of mal-ware and hits an ever-wider rangeof victims. Network Security, 2017(2):1–2, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300119.

Anonymous:2017:Bb

[3910] Anonymous. In brief. NetworkSecurity, 2017(2):3, February 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300120.

Anonymous:2017:BRUb

[3911] Anonymous. Book review: Un-derstanding the Digital World, byBrian Kernighan. Princeton Univer-sity Press. ISBN 978-0-691-17654-3.Network Security, 2017(2):4, February2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300132.

Lilly:2017:ICH

[3912] Andy Lilly. IMSI catchers: hack-ing mobile communications. Net-work Security, 2017(2):5–7, February2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300144.

Bedell-Pearce:2017:WBD

[3913] Jack Bedell-Pearce. When big dataand Brexit collide. Network Security,2017(2):8–9, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300156.

Graves:2017:WIP

[3914] Jamie Graves. What is intellec-tual property and how do you pro-tect it? Network Security, 2017(2):9–11, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300168.

Schenk:2017:RMF

[3915] Gert-Jan Schenk. Retailers must fo-cus on the growing cyberthreat land-scape. Network Security, 2017(2):12–13, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730017X.

Mansfield-Devine:2017:PDS

[3916] Steve Mansfield-Devine. A processof defence — securing industrial con-trol systems. Network Security, 2017

Page 471: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 471

(2):14–19, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300181.

Erridge:2017:ORM

[3917] Tim Erridge. Optimising risk man-agement. Network Security, 2017(2):20, February 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300193.

Anonymous:2017:ECb

[3918] Anonymous. Events calendar. Net-work Security, 2017(2):20, February2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581730020X.

Anonymous:2017:FIB

[3919] Anonymous. Financial institu-tions become more confident aboutcyber-security but weaknesses re-main. Network Security, 2017(3):1–2, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300211.

Anonymous:2017:ZDL

[3920] Anonymous. Zero-days last for years.Network Security, 2017(3):2, March2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300223.

Anonymous:2017:Bc

[3921] Anonymous. In brief. Network Secu-rity, 2017(3):3, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300235.

Anonymous:2017:BRM

[3922] Anonymous. Book review: TheMathematics of Secrets, by JoshuaHolden. Princeton University Press.ISBN 978-0-691-14175-6. Network Se-curity, 2017(3):4, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300247.

Tankard:2017:ECB

[3923] Colin Tankard. Encryption asthe cornerstone of big data se-curity. Network Security, 2017(3):5–7, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300259.

Henderson:2017:NIN

[3924] Lewis Henderson. National infras-tructure — the next step for sea-soned hackers. Network Security,2017(3):8–10, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300260.

Smyth:2017:SVM

[3925] Vincent Smyth. Software vulnerabil-ity management: how intelligence helps

Page 472: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 472

reduce the risk. Network Security,2017(3):10–12, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300272.

Hawkins:2017:WCV

[3926] Nick Hawkins. Why communi-cation is vital during a cyber-attack. Network Security, 2017(3):12–14, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300284.

Ring:2017:RCS

[3927] Tim Ring. The Russians are com-ing! Are security firms over-hypingthe hacker threat? Network Security,2017(3):15–18, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300296.

Green:2017:RG

[3928] Andy Green. Ransomware and theGDPR. Network Security, 2017(3):18–19, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300302.

Tankard:2017:FEC

[3929] Colin Tankard. The firewall: The eS-ignature comes of age. Network Secu-rity, 2017(3):20, March 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300314.

Anonymous:2017:ECc

[3930] Anonymous. Events calendar. Net-work Security, 2017(3):20, March2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300326.

Anonymous:2017:RCN

[3931] Anonymous. The Russian connection:new attacks and arrests. Network Secu-rity, 2017(4):1–2, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300338.

Anonymous:2017:Bd

[3932] Anonymous. In brief. Network Secu-rity, 2017(4):3, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730034X.

SM-D:2017:BRH

[3933] SM-D. Book review: Hiding Be-hind the Keyboard, by Brett Shaversand John Bair, Syngress. ISBN 978-0-12-803340-1. Network Security,2017(4):4, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300351.

Adato:2017:MAE

[3934] Leon Adato. Monitoring and au-tomation: it’s easier than youthink. Network Security, 2017

Page 473: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 473

(4):5–7, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300363.

Mansfield-Devine:2017:FAC

[3935] Steve Mansfield-Devine. Fileless at-tacks: compromising targets with-out malware. Network Security,2017(4):7–11, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300375.

Zeichick:2017:EIO

[3936] Alan Zeichick. Enabling inno-vation by opening up the net-work. Network Security, 2017(4):12–14, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300387.

Talwar:2017:AIN

[3937] Rohit Talwar and April Koury. Ar-tificial intelligence — the next fron-tier in IT security? Network Security,2017(4):14–17, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300399.

Hickman:2017:TI

[3938] Mark Hickman. The threat frominside. Network Security, 2017(4):18–19, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300405.

Renaud:2017:FDC

[3939] Karen Renaud. Facts do notchange minds. Network Security,2017(4):20, April 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300417.

Anonymous:2017:ECd

[3940] Anonymous. Events calendar. Net-work Security, 2017(4):20, April 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300429.

Anonymous:2017:SES

[3941] Anonymous. Social engineeringscams ensnare Google, Facebookand their users. Network Security,2017(5):1–2, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300430.

Anonymous:2017:FSM

[3942] Anonymous. Firms struggle tomanage networks. Network Secu-rity, 2017(5):2, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300442.

Anonymous:2017:Be

[3943] Anonymous. In brief. Network Secu-rity, 2017(5):3, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),

Page 474: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 474

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300454.

SM-D:2017:BRP

[3944] SM-D. Book review: Practical PacketAnalysis, Chris Sanders. Network Se-curity, 2017(5):4, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300466.

SM-D:2017:BRW

[3945] SM-D. Book review: We KnowAll About You, Rhodri Jeffreys-Jones.Network Security, 2017(5):4, May2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300478.

Newman:2017:SPG

[3946] Sean Newman. Service providers:the gatekeepers of Internet security.Network Security, 2017(5):5–7, May2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581730048X.

Gajek:2017:MMD

[3947] Jacob Gajek. Macro malware:dissecting a malicious Word doc-ument. Network Security, 2017(5):8–13, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300491.

Mansfield-Devine:2017:THA

[3948] Steve Mansfield-Devine. Threat hunt-ing: assuming the worst to strengthenresilience. Network Security, 2017(5):13–17, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300508.

Farral:2017:API

[3949] Travis Farral. The attribution prob-lem with information security at-tacks. Network Security, 2017(5):17–19, May 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730051X.

Erridge:2017:GS

[3950] Tim Erridge. Gaining strength.Network Security, 2017(5):20, May2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300521.

Anonymous:2017:ECe

[3951] Anonymous. Events calendar. Net-work Security, 2017(5):20, May 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300533.

Anonymous:2017:NLS

[3952] Anonymous. NSA leak shows Rus-sian attack on US electoral sys-tem. Network Security, 2017(6):1–2, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),

Page 475: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 475

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300545.

Anonymous:2017:AI

[3953] Anonymous. Attacks on industry.Network Security, 2017(6):2, June2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300557.

Anonymous:2017:Bf

[3954] Anonymous. In brief. Network Secu-rity, 2017(6):3, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300569.

Anonymous:2017:BRPa

[3955] Anonymous. Book review: Prac-tical Forensic Imaging, by BruceNikkel. No Starch Press. ISBN 978-1-59327-793-2. Network Security,2017(6):4, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300570.

Anonymous:2017:BRPb

[3956] Anonymous. Book review: ThePlot to Hack America, by MalcolmNance. Skyhorse Publishing. ISBN978-1-5107-2332-0. Network Secu-rity, 2017(6):4, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300582.

Shugrue:2017:FAT

[3957] Daniel Shugrue. Fighting ap-plication threats with cloud-basedWAFs. Network Security, 2017(6):5–8, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300594.

Zerlang:2017:GMC

[3958] Jesper Zerlang. GDPR: a mile-stone in convergence for cyber-securityand compliance. Network Security,2017(6):8–11, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300600.

Botelho:2017:HAD

[3959] Jay Botelho. How automatingdata collection can improve cyber-security. Network Security, 2017(6):11–13, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300612.

Mansfield-Devine:2017:LRK

[3960] Steve Mansfield-Devine. Leaks andransoms — the key threats to health-care organisations. Network Security,2017(6):14–19, June 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300624.

Tankard:2017:SE

[3961] Colin Tankard. Securing emails.Network Security, 2017(6):20, June

Page 476: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 476

2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300636.

Anonymous:2017:ECf

[3962] Anonymous. Events calendar. Net-work Security, 2017(6):20, June 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300648.

Anonymous:2017:NAO

[3963] Anonymous. National Accounting Of-fice demands action. Network Secu-rity, 2017(7):1–2, July 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730065X.

Anonymous:2017:PA

[3964] Anonymous. Parliament attacked.Network Security, 2017(7):2, July2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300661.

Anonymous:2017:Bg

[3965] Anonymous. In brief. Network Secu-rity, 2017(7):3, July 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300673.

Anonymous:2017:BRG

[3966] Anonymous. Book review: GrayHat C#, by Brandon Perry. NoStarch Press. ISBN 978-1-59327-759-8. Network Security, 2017(7):4, July

2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300685.

Parkinson:2017:UAC

[3967] Simon Parkinson. Use of access con-trol to minimise ransomware impact.Network Security, 2017(7):5–8, July2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300697.

Wood:2017:TRS

[3968] Michael Wood. Top requirementson the SD-WAN security checklist.Network Security, 2017(7):9–11, July2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300703.

Taylor:2017:ACM

[3969] Mark Taylor, Denis Reilly, and BrettLempereur. An access control man-agement protocol for Internet ofThings devices. Network Security,2017(7):11–17, July 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300715.

Murphy:2017:ITT

[3970] Malcolm Murphy. The Internetof Things and the threat it posesto DNS. Network Security, 2017(7):17–19, July 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300727.

Page 477: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 477

Renaud:2017:IMY

[3971] Karen Renaud. It makes youWanna Cry. Network Security,2017(7):20, July 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300739.

Anonymous:2017:ECg

[3972] Anonymous. Events calendar. Net-work Security, 2017(7):20, July 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300740.

Anonymous:2017:TID

[3973] Anonymous. Two illicit dark webmarketplaces taken down. Net-work Security, 2017(8):1–2, August2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300752.

Anonymous:2017:IBH

[3974] Anonymous. Italian bank hit withmajor breach. Network Security,2017(8):2, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300764.

Anonymous:2017:Bh

[3975] Anonymous. In brief. Network Secu-rity, 2017(8):3, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300776.

Anonymous:2017:BRT

[3976] Anonymous. Book review: ThreatForecasting, by John Pirc, DavidDeSanto, Iain Davison, and WillGragido. Syngress. ISBN 978-0-12-800006-9. Network Security, 2017(8):4, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300788.

Anonymous:2017:BRI

[3977] Anonymous. Book review: Inter-cept: The Secret History of Computersand Spies [by Gordon Corera, Weiden-feld and Nicolson, London, UK 2015,ISBN 1-78022-784-1]. Network Secu-rity, 2017(8):4, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730079X.

Luszcz:2017:HMD

[3978] Jeff Luszcz. How maverick develop-ers can create risk in the software andIoT supply chain. Network Security,2017(8):5–7, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300806.

Haggerty:2017:HDT

[3979] Eileen Haggerty. Healthcare and digi-tal transformation. Network Security,2017(8):7–11, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300818.

Page 478: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 478

Major:2017:WTI

[3980] Tom Major. Weaponising threat in-telligence data. Network Security,2017(8):11–13, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730082X.

German:2017:TBD

[3981] Paul German. Time to bury ded-icated hardware-based security so-lutions. Network Security, 2017(8):13–15, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300831.

Mansfield-Devine:2017:ADP

[3982] Steve Mansfield-Devine. Adapt-ing to the disappearing perime-ter. Network Security, 2017(8):15–19, August 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300843.

Erridge:2017:GWH

[3983] Tim Erridge. Good will hunting.Network Security, 2017(8):20, August2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300855.

Anonymous:2017:ECh

[3984] Anonymous. Events calendar. Net-work Security, 2017(8):20, August2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485817300867.

Anonymous:2017:SBH

[3985] Anonymous. State-backed hack-ers target US and European en-ergy sectors. Network Security, 2017(9):1–2, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301071.

Anonymous:2017:RIA

[3986] Anonymous. Ransomware and IoTamong leading threats. Network Se-curity, 2017(9):2, September 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301083.

Anonymous:2017:Bi

[3987] Anonymous. In brief. Network Se-curity, 2017(9):3, September 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301095.

Anonymous:2017:BRD

[3988] Anonymous. Book review: Deceptionin the Digital Age, by Cameron Ma-lin, Terry Gudaitis, Thomas Holt, andMax Kilger. Academic Press. ISBN978-0-12-411630-6. Network Security,2017(9):4, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301101.

Page 479: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 479

Farral:2017:NSA

[3989] Travis Farral. Nation-state attacks:practical defences against advancedadversaries. Network Security, 2017(9):5–7, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301113.

Condra:2017:ANS

[3990] Jon Condra. Assessing nation statethreats. Network Security, 2017(9):8–10, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301125.

Vincent:2017:SSH

[3991] Adam Vincent. State-sponsoredhackers: the new normal for busi-ness. Network Security, 2017(9):10–12, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301137.

Robinson:2017:DDG

[3992] Nick Robinson and Keith Martin.Distributed denial of government:the Estonian Data Embassy Initia-tive. Network Security, 2017(9):13–16, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301149.

Beckett:2017:DIN

[3993] Phil Beckett. Data and IP are the newnuclear: facing up to state-sponsored

threats. Network Security, 2017(9):17–19, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301150.

Tankard:2017:WA

[3994] Colin Tankard. Who are the at-tackers? Network Security, 2017(9):20, September 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301162.

Anonymous:2017:ECi

[3995] Anonymous. Events calendar. Net-work Security, 2017(9):20, September2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301174.

Anonymous:2017:NRM

[3996] Anonymous. NCSC reports morethan 1,000 cyber-attacks in firstyear. Network Security, 2017(10):1–2, October 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300983.

Anonymous:2017:Bj

[3997] Anonymous. In brief. NetworkSecurity, 2017(10):3, October 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300995.

Page 480: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 480

Anonymous:2017:BRCa

[3998] Anonymous. Book review: Cybercrimeand Business, by Sanford Moskowitz.Butterworth-Heinemann. ISBN 978-0-12-800353-4. Network Security,2017(10):4, October 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301009.

Lundbohm:2017:UNS

[3999] Eric Lundbohm. Understandingnation-state attacks. Network Security,2017(10):5–8, October 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301010.

Bambenek:2017:NSA

[4000] John Bambenek. Nation-state attacks:the new normal. Network Security,2017(10):8–10, October 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301022.

Laing:2017:CGW

[4001] Brian Laing. Cyber global warming:six steps towards meltdown. NetworkSecurity, 2017(10):11–13, October2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301034.

Mansfield-Devine:2017:WIT

[4002] Steve Mansfield-Devine. Weaponis-ing the Internet of Things. NetworkSecurity, 2017(10):13–19, October

2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301046.

Renaud:2017:PPL

[4003] Karen Renaud and Gareth Re-naud. To phish, or not tophish . . . . Network Security, 2017(10):20, October 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301058.

Anonymous:2017:ECj

[4004] Anonymous. Events calendar. Net-work Security, 2017(10):20, October2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581730106X.

Anonymous:2017:BRR

[4005] Anonymous. Bad Rabbit ransomwareattacks Russia and Ukraine. Net-work Security, 2017(11):1–2, November2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300879.

Anonymous:2017:WFA

[4006] Anonymous. Wifi flaw affects nearlyall devices. Network Security, 2017(11):2, November 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300880.

Page 481: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 481

Anonymous:2017:Bk

[4007] Anonymous. In brief. Network Se-curity, 2017(11):3, November 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300892.

Anonymous:2017:BRCb

[4008] Anonymous. Book review: Com-puter and Information Security Hand-book, Third edition, edited by JohnR Vacca. Morgan Kaufmann. ISBN978-0-12-803843-7. Network Security,2017(11):4, November 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300909.

Anonymous:2017:BRB

[4009] Anonymous. Book review: Big Data:a very short introduction, by Dawn E.Holmes. Oxford University Press. ISBN978-0-19-877957-5. Network Security,2017(11):4, November 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300910.

Steffen:2017:SJB

[4010] Chris Steffen. Should jump box serversbe consigned to history? Net-work Security, 2017(11):5–6, November2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300922.

Thompson:2017:PSH

[4011] Nick Thompson. Putting secu-rity at the heart of app devel-

opment. Network Security, 2017(11):7–8, November 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300934.

Bhardwaj:2017:SCC

[4012] Akashdeep Bhardwaj and Sam Goundar.Security challenges for cloud-basedemail infrastructure. Network Secu-rity, 2017(11):8–15, November 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300946.

Mansfield-Devine:2017:GCA

[4013] Steve Mansfield-Devine. Going crit-ical: attacks against national infras-tructure. Network Security, 2017(11):16–19, November 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817300958.

Tankard:2017:BNK

[4014] Colin Tankard. BYOE: New kid onthe block. Network Security, 2017(11):20, November 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730096X.

Anonymous:2017:ECk

[4015] Anonymous. Events calendar. Net-work Security, 2017(11):20, November2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817300971.

Page 482: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 482

Anonymous:2017:NCT

[4016] Anonymous. NHS to create a£20m SOC and pen-testing opera-tion. Network Security, 2017(12):1–2, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301186.

Anonymous:2017:UGA

[4017] Anonymous. UK Government an-nounces interim strategy. NetworkSecurity, 2017(12):2, December 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301198.

Anonymous:2017:B

[4018] Anonymous. In brief. Network Se-curity, 2017(12):3, December 2017.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301204.

Anonymous:2017:SWA

[4019] Anonymous. Safety of Web ap-plications. Network Security, 2017(12):4, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301216.

Furnell:2017:SEA

[4020] Steven Furnell and Ismini Vasileiou. Se-curity education and awareness: justlet them burn? Network Security,2017(12):5–9, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301228.

Lauria:2017:HFR

[4021] Filippo Lauria. How to footprint, re-port and remotely secure compromisedIoT devices. Network Security, 2017(12):10–16, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581730123X.

Mansfield-Devine:2017:RRH

[4022] Steve Mansfield-Devine. The right re-sponse: how organisations should re-act to security incidents. NetworkSecurity, 2017(12):16–19, December2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301241.

Erridge:2017:FT

[4023] Tim Erridge. A framework forthreats. Network Security, 2017(12):20, December 2017. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485817301253.

Anonymous:2017:EC

[4024] Anonymous. Events calendar. Net-work Security, 2017(12):20, December2017. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485817301265.

Page 483: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 483

Anonymous:2018:NKB

[4025] Anonymous. North Korea blamedfor WannaCry, PoS attacks and Bit-coin phishing. Network Security,2018(1):1–2, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300011.

Anonymous:2018:Ba

[4026] Anonymous. In brief. Network Secu-rity, 2018(1):3, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300023.

Anonymous:2018:SITa

[4027] Anonymous. Securing the Inter-net of Things. Network Security,2018(1):4, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300035.

Anonymous:2018:NR

[4028] Anonymous. Network routing. Net-work Security, 2018(1):4, January2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300047.

Luszcz:2018:ASH

[4029] Jeff Luszcz. Apache Struts 2: howtechnical and development gaps causedthe Equifax Breach. Network Security,2018(1):5–8, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300059.

Boireau:2018:SBA

[4030] Olivier Boireau. Securing theblockchain against hackers. Net-work Security, 2018(1):8–11, January2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300060.

Nicholson:2018:BBB

[4031] Dave Nicholson. Blurring the bound-aries between networking and ITsecurity. Network Security, 2018(1):11–13, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300072.

Farha:2018:MRA

[4032] Fadi Farha and Hongsong Chen. Mit-igating replay attacks with ZigBeesolutions. Network Security, 2018(1):13–19, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300084.

Tankard:2018:TPP

[4033] Colin Tankard. Tackling push pay-ment scams. Network Security, 2018(1):20, January 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300096.

Page 484: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 484

Anonymous:2018:ECa

[4034] Anonymous. Events calendar. Net-work Security, 2018(1):20, January2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300102.

Anonymous:2018:CCH

[4035] Anonymous. Crypto-currencies hit byhacking attacks, theft and fraud. Net-work Security, 2018(2):1–2, February2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300114.

Anonymous:2018:Bb

[4036] Anonymous. In brief. NetworkSecurity, 2018(2):3, February 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300126.

Anonymous:2018:STM

[4037] Anonymous. Seeking the truth frommobile evidence. Network Security,2018(2):4, February 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300138.

Wickes:2018:COD

[4038] James Wickes. CCTV: an open doorinto enterprise and national infras-tructure. Network Security, 2018(2):5–8, February 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581830014X.

Al-Azzam:2018:SRC

[4039] Saad Al-Azzam, Ahmad Sharieh, Az-zam Sleit, and Nedaa Al-Azzam. Se-curing robot communication usingpacket encryption distribution. Net-work Security, 2018(2):8–14, February2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300151.

Mansfield-Devine:2018:OSI

[4040] Steve Mansfield-Devine. Open sourceand the Internet of Things. Net-work Security, 2018(2):14–19, February2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300163.

Renaud:2018:GTC

[4041] Karen Renaud and Lynsay Shepherd.GDPR: its time has come. Net-work Security, 2018(2):20, February2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300175.

Anonymous:2018:ECb

[4042] Anonymous. Events calendar. Net-work Security, 2018(2):20, February2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300187.

Anonymous:2018:CBH

[4043] Anonymous. Cyber-breaches hittwice as hard in past year, saysCisco. Network Security, 2018(3):1–2, March 2018. CODEN

Page 485: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 485

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300199.

Anonymous:2018:UGL

[4044] Anonymous. UK Government launchesIoT code. Network Security, 2018(3):2, March 2018. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485818300205.

Anonymous:2018:Bc

[4045] Anonymous. In brief. Network Secu-rity, 2018(3):3, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300217.

Anonymous:2018:SWA

[4046] Anonymous. Safety of Web appli-cations. Network Security, 2018(3):4, March 2018. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S1353485818300229.

Scott:2018:HZT

[4047] Barry Scott. How a zero trustapproach can help to secure yourAWS environment. Network Security,2018(3):5–8, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300230.

Shipulin:2018:WNT

[4048] Kirill Shipulin. We need to talk aboutIDS signatures. Network Security,2018(3):8–13, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300242.

Ayrour:2018:MCA

[4049] Yassine Ayrour, Amine Raji, and Mah-moud Nassar. Modelling cyber-attacks:a survey study. Network Security,2018(3):13–19, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300254.

Tankard:2018:TFT

[4050] Colin Tankard. The threat of file-less trojans. Network Security,2018(3):20, March 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300266.

Anonymous:2018:ECc

[4051] Anonymous. Events calendar. Net-work Security, 2018(3):20, March2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300278.

Anonymous:2018:UOS

[4052] Anonymous. UK organisations se-riously unprepared for cyber-attacks.Network Security, 2018(4):1–2, April2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 486: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 486

URL http://www.sciencedirect.

com/science/article/pii/S135348581830028X.

Anonymous:2018:Bd

[4053] Anonymous. In brief. Network Secu-rity, 2018(4):3, April 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300291.

Anonymous:2018:PC

[4054] Anonymous. Port cybersecurity. Net-work Security, 2018(4):4, April 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300308.

Anonymous:2018:BBa

[4055] Anonymous. Bit by bit. Network Secu-rity, 2018(4):4, April 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581830031X.

Mackey:2018:BOS

[4056] Tim Mackey. Building open sourcesecurity into agile application builds.Network Security, 2018(4):5–8, April2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300321.

Bajpai:2018:AMI

[4057] Pranshu Bajpai, Aditya K. Sood, andRichard J. Enbody. The art of mappingIoT devices in networks. Network Secu-rity, 2018(4):8–15, April 2018. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300333.

Bhardwaj:2018:RTS

[4058] Akashdeep Bhardwaj and Sam Goundar.Reducing the threat surface to min-imise the impact of cyber-attacks. Net-work Security, 2018(4):15–19, April2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300345.

Erridge:2018:TCR

[4059] Tim Erridge. True colours ofred teaming. Network Security,2018(4):20, April 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300357.

Anonymous:2018:ECd

[4060] Anonymous. Events calendar. Net-work Security, 2018(4):20, April 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300369.

Anonymous:2018:OYA

[4061] Anonymous. One year after Wan-naCry: assessing the aftermath. Net-work Security, 2018(5):1–2, May 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300370.

Anonymous:2018:EVS

[4062] Anonymous. Equifax vulnerabil-ity still a problem. Network Secu-

Page 487: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 487

rity, 2018(5):2, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300382.

Anonymous:2018:CSB

[4063] Anonymous. Cyber-security BreachesSurvey: fraudulent emails presenta major menace. Network Secu-rity, 2018(5):3, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300394.

Anonymous:2018:Be

[4064] Anonymous. In brief. Network Secu-rity, 2018(5):4, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300400.

Anonymous:2018:BRS

[4065] Anonymous. Book review: Simplify-ing JavaScript, by Joe Morgan. Pub-lished by Pragmatic Bookshelf. ISBN:978-1-68050-288-6. Price: $39.95, 282pgs, paperback. Network Secu-rity, 2018(5):5, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300412.

James:2018:MCS

[4066] Lee James. Making cyber-securitya strategic business priority. Net-work Security, 2018(5):6–8, May 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485818300424.

Aminzade:2018:CIA

[4067] Michael Aminzade. Confidentiality, in-tegrity and availability — finding a bal-anced IT framework. Network Secu-rity, 2018(5):9–11, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300436.

Sim:2018:DAM

[4068] Greg Sim. Defending against themalware flood. Network Security,2018(5):12–13, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300448.

Mansfield-Devine:2018:IWP

[4069] Steve Mansfield-Devine. The intel-ligent way to protect complex envi-ronments. Network Security, 2018(5):13–17, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581830045X.

Wilkins:2018:AIH

[4070] Jonathan Wilkins. Is artificial intel-ligence a help or hindrance? Net-work Security, 2018(5):18–19, May2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300461.

Page 488: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 488

Renaud:2018:CSA

[4071] Karen Renaud. Cooking up securityawareness & training. Network Secu-rity, 2018(5):20, May 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300473.

Anonymous:2018:ECe

[4072] Anonymous. Events calendar. Net-work Security, 2018(5):20, May 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300485.

Anonymous:2018:SRC

[4073] Anonymous. Sharp rise in costsand damage from DNS-related at-tacks. Network Security, 2018(6):1–2, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300497.

Anonymous:2018:HUA

[4074] Anonymous. Healthcare under at-tack. Network Security, 2018(6):2, June2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300503.

Anonymous:2018:SOS

[4075] Anonymous. Synopsis: Open sourcesecurity and risk analysis. Network Se-curity, 2018(6):3, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300515.

Anonymous:2018:Bf

[4076] Anonymous. In brief. Network Secu-rity, 2018(6):4, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300527.

Anonymous:2018:RMC

[4077] Anonymous. Research methods forcyber security. Network Security,2018(6):5, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300539.

Townsley:2018:BGC

[4078] Chris Townsley. Are businesses get-ting complacent when it comes toDDoS mitigation? Network Secu-rity, 2018(6):6–9, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300540.

Simmonds:2018:ICD

[4079] Mike Simmonds. Instilling a cul-ture of data security throughoutthe organisation. Network Security,2018(6):9–12, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300552.

Macy:2018:HBS

[4080] Jason Macy. How to build a se-cure API gateway. Network Security,2018(6):12–14, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),

Page 489: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 489

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300564.

Khan:2018:NCC

[4081] Javid Khan. The need for contin-uous compliance. Network Security,2018(6):14–15, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300576.

Mansfield-Devine:2018:FFH

[4082] Steve Mansfield-Devine. Friendlyfire: how penetration testing can re-duce your risk. Network Security,2018(6):16–19, June 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300588.

Tankard:2018:SDD

[4083] Colin Tankard. Streamlining data dis-covery. Network Security, 2018(6):20, June 2018. CODEN NTSCF5.ISSN 1353-4858 (print), 1872-9371(electronic). URL http://www.

sciencedirect.com/science/article/

pii/S135348581830059X.

Anonymous:2018:ECf

[4084] Anonymous. Events calendar. Net-work Security, 2018(6):20, June 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300606.

Anonymous:2018:NCSa

[4085] Anonymous. New cyber-security guide-lines for government departments.

Network Security, 2018(7):1–2, July2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300618.

Anonymous:2018:HTS

[4086] Anonymous. HMRC takes down20,000 sites. Network Security,2018(7):2, 5, July 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581830062X.

Anonymous:2018:HNK

[4087] Anonymous. Harvey Nash & KPMG:CIO Survey 2018 & growing pains.Network Security, 2018(7):3, July2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300631.

Anonymous:2018:Bg

[4088] Anonymous. In brief. Network Secu-rity, 2018(7):4, July 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300643.

Anonymous:2018:BRM

[4089] Anonymous. Book review: ModernVim. Network Security, 2018(7):5, July2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300655.

Anonymous:2018:FCM

[4090] Anonymous. Firms collect more datathan they can handle. Network Secu-

Page 490: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 490

rity, 2018(7):5, July 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300667.

Beecher:2018:EGN

[4091] Phil Beecher. Enterprise-grade net-works: the answer to IoT secu-rity challenges. Network Security,2018(7):6–9, July 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300679.

Dennis:2018:WPM

[4092] Colin Dennis. Why is patch man-agement necessary? Network Secu-rity, 2018(7):9–13, July 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300680.

Chadd:2018:DAP

[4093] Anthony Chadd. DDoS attacks: past,present and future. Network Security,2018(7):13–15, July 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300692.

Mansfield-Devine:2018:DFR

[4094] Steve Mansfield-Devine. DevOps: find-ing room for security. Network Security,2018(7):15–20, July 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300709.

Anonymous:2018:ECg

[4095] Anonymous. Events calendar. Net-work Security, 2018(7):20, July 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300710.

Anonymous:2018:RAB

[4096] Anonymous. Russian attackers breachUS electricity network. NetworkSecurity, 2018(8):1–3, August 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300722.

Anonymous:2018:Ta

[4097] Anonymous. Threatwatch. Net-work Security, 2018(8):3, August2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300734.

Anonymous:2018:GRI

[4098] Anonymous. GDPR reduces insiderthreats. Network Security, 2018(8):3, 19, August 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300746.

Anonymous:2018:QIR

[4099] Anonymous. Quarterly Incident Re-sponse Threat Report, July 2018.Network Security, 2018(8):4, August2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300758.

Page 491: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 491

Anonymous:2018:Bh

[4100] Anonymous. In brief. Network Secu-rity, 2018(8):5, August 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581830076X.

Mason:2018:ORP

[4101] Mike Mason. Overcoming the risksof privileged user abuse in Sales-force. Network Security, 2018(8):6–8, August 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300771.

Caldwell:2018:PIOa

[4102] Tracey Caldwell. Plugging IT/OTvulnerabilities — part 1. Net-work Security, 2018(8):9–14, August2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300783.

Mansfield-Devine:2018:KWY

[4103] Steve Mansfield-Devine. Knowing whatyou have: the road to effective datadiscovery. Network Security, 2018(8):15–19, August 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300795.

Anonymous:2018:VSS

[4104] Anonymous. Vulnerabilities staythe same. Network Security, 2018(8):19, August 2018. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300801.

Fay:2018:BRC

[4105] Oliver Fay. BEC reality check. Net-work Security, 2018(8):20, August2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300813.

Anonymous:2018:ECh

[4106] Anonymous. Events calendar. Net-work Security, 2018(8):20, August2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300825.

Anonymous:2018:TFT

[4107] Anonymous. Tech firms tacklefake accounts and political hack-ers. Network Security, 2018(9):1–3, September 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300837.

Anonymous:2018:Tb

[4108] Anonymous. Threatwatch. Net-work Security, 2018(9):3, September2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300849.

Anonymous:2018:BBb

[4109] Anonymous. BA breached. Net-work Security, 2018(9):3, September2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 492: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 492

URL http://www.sciencedirect.

com/science/article/pii/S1353485818300850.

Anonymous:2018:TMU

[4110] Anonymous. Trend Micro: Unseenthreats, imminent losses: 2018 midyearsecurity roundup. Network Security,2018(9):4, September 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300862.

Anonymous:2018:Bi

[4111] Anonymous. In brief. Network Se-curity, 2018(9):5, September 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300874.

Macy:2018:ASW

[4112] Jason Macy. API security: whosejob is it anyway? Network Security,2018(9):6–9, September 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300886.

Caldwell:2018:PIOb

[4113] Tracey Caldwell. Plugging IT/OTvulnerabilities — part 2. NetworkSecurity, 2018(9):10–15, September2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300898.

Keplinger:2018:QCB

[4114] Keegan Keplinger. Is quantum com-puting becoming relevant to cyber-security? Network Security, 2018

(9):16–19, September 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300904.

Renaud:2018:UON

[4115] Karen Renaud and Verena Zim-mermann. A user by any othername. Network Security, 2018(9):20, September 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300916.

Anonymous:2018:ECi

[4116] Anonymous. Events calendar. Net-work Security, 2018(9):20, September2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300928.

Anonymous:2018:CPS

[4117] Anonymous. China put spy chipsin servers, claims Bloomberg. Net-work Security, 2018(10):1–3, October2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581830093X.

Anonymous:2018:Tc

[4118] Anonymous. Threatwatch. Net-work Security, 2018(10):3, October2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300941.

Page 493: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 493

Anonymous:2018:FLG

[4119] Anonymous. Flaw leads to Google+shutting down. Network Security,2018(10):3, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300953.

Anonymous:2018:EIO

[4120] Anonymous. Europol: InternetOrganised Crime Threat Assess-ment. Network Security, 2018(10):4, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300965.

Anonymous:2018:Bj

[4121] Anonymous. In brief. NetworkSecurity, 2018(10):5, October 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818300977.

Sens:2018:RFN

[4122] Ronald Sens. Be ready to fight new5G vulnerabilities. Network Security,2018(10):6–7, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300989.

Hogewoning:2018:IRS

[4123] Marco Hogewoning. IoT and reg-ulation — striking the right bal-ance. Network Security, 2018(10):8–10, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818300990.

Sollars:2018:LMW

[4124] Marc Sollars. Love and marriage:why security and SD-WAN need togo together. Network Security, 2018(10):10–12, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301004.

McKenna:2018:MCR

[4125] Benedict McKenna. Measuring cyber-risk. Network Security, 2018(10):12–14, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301016.

Mansfield-Devine:2018:HDA

[4126] Steve Mansfield-Devine. Hackingdemocracy: abusing the Internet forpolitical gain. Network Security, 2018(10):15–19, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301028.

Tankard:2018:HTA

[4127] Colin Tankard. How trustworthyis AI? Network Security, 2018(10):20, October 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581830103X.

Page 494: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 494

Anonymous:2018:ECj

[4128] Anonymous. Events calendar. Net-work Security, 2018(10):20, October2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818301041.

Anonymous:2018:CSH

[4129] Anonymous. China steps up hack-ing as US issues indictments. Net-work Security, 2018(11):1–2, November2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818301053.

Anonymous:2018:TBR

[4130] Anonymous. Triton blamed onRussia. Network Security, 2018(11):3, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301065.

Anonymous:2018:Td

[4131] Anonymous. Threatwatch. Net-work Security, 2018(11):3, November2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818301077.

Anonymous:2018:NCSb

[4132] Anonymous. National Cyber Se-curity Centre: Annual Review2018. Network Security, 2018(11):4, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301089.

Anonymous:2018:Bk

[4133] Anonymous. In brief. Network Se-curity, 2018(11):5, November 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818301090.

Bedell-Pearce:2018:SDT

[4134] Jack Bedell-Pearce. Safe digital trans-formation for SMEs. Network Security,2018(11):6–7, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301107.

Roberts:2018:LLD

[4135] Steve Roberts. Learning lessons fromdata breaches. Network Security, 2018(11):8–11, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301119.

Claxson:2018:SVE

[4136] Nick Claxson. Securing VoIP: en-crypting today’s digital telephony sys-tems. Network Security, 2018(11):11–13, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301120.

Timms:2018:BCD

[4137] Paul Timms. Business continuityand disaster recovery — advice forbest practice. Network Security, 2018(11):13–14, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),

Page 495: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 495

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301132.

Mansfield-Devine:2018:NSA

[4138] Steve Mansfield-Devine. Nation-stateattacks: the start of a new ColdWar? Network Security, 2018(11):15–19, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301144.

Green:2018:PTC

[4139] Ranulf Green. Pen-testing thecloud. Network Security, 2018(11):20, November 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301156.

Anonymous:2018:ECk

[4140] Anonymous. Events calendar. Net-work Security, 2018(11):20, November2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818301168.

Anonymous:2018:SITb

[4141] Anonymous. Securing the Internet ofThings — part one. Network Security,2018(12):1, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581830117X.

Anonymous:2018:FFD

[4142] Anonymous. Firms failing to discloseIoT vulnerabilities. Network Security,

2018(12):1–2, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301181.

Anonymous:2018:UBR

[4143] Anonymous. Ukraine blames Russiafor cyber attacks. Network Security,2018(12):2–3, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301193.

Anonymous:2018:Te

[4144] Anonymous. Threatwatch. Net-work Security, 2018(12):3, December2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581830120X.

Anonymous:2018:ILG

[4145] Anonymous. IoT leads growth inendpoint security. Network Security,2018(12):3, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301211.

Anonymous:2018:NTI

[4146] Anonymous. Nokia Threat IntelligenceReport — 2019. Network Security,2018(12):4, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301223.

Page 496: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 496

Anonymous:2018:Bl

[4147] Anonymous. In brief. Network Se-curity, 2018(12):5, December 2018.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818301235.

Baldin:2018:SWS

[4148] Andy Baldin. Securing the weakspots. Network Security, 2018(12):6–8, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301247.

Stone:2018:PCT

[4149] Tim Stone. Protecting connectedtransportation networks. NetworkSecurity, 2018(12):8–10, December2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818301259.

Raghu:2018:MDS

[4150] RV Raghu. The many dimen-sions of successful IoT deploy-ment. Network Security, 2018(12):10–15, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301260.

Mansfield-Devine:2018:GGI

[4151] Steve Mansfield-Devine. Getting togrips with IoT. Network Security, 2018(12):15–19, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301272.

Tankard:2018:LAA

[4152] Colin Tankard. A layered approachto authentication. Network Security,2018(12):20, December 2018. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485818301284.

Anonymous:2018:ECl

[4153] Anonymous. Events calendar. Net-work Security, 2018(12):20, December2018. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485818301296.

Anonymous:2019:SIT

[4154] Anonymous. Securing the Internet ofThings — part two. Network Secu-rity, 2019(1):1, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300017.

Anonymous:2019:UCI

[4155] Anonymous. UK critical infrastructureis wide open to attack, warns parlia-mentary committee. Network Security,2019(1):1–3, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300029.

Anonymous:2019:Ta

[4156] Anonymous. Threatwatch. Net-work Security, 2019(1):3, January

Page 497: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 497

2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300030.

Anonymous:2019:ARH

[4157] Anonymous. Avast report highlightsIoT vulnerabilities. Network Secu-rity, 2019(1):3, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300042.

Anonymous:2019:NKD

[4158] Anonymous. North Korean defec-tors targeted. Network Security,2019(1):3, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300054.

Anonymous:2019:ECE

[4159] Anonymous. ENISA: Cyber Eu-rope 2018 — After Action Re-port. Network Security, 2019(1):4, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300066.

Anonymous:2019:Ba

[4160] Anonymous. In brief. Network Secu-rity, 2019(1):5, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300078.

Perez:2019:PAS

[4161] Gabe Perez. A practical approachto securing IoT. Network Security,2019(1):6–8, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930008X.

Oliveri:2019:SUS

[4162] Andrea Oliveri and Filippo Lau-ria. Sagishi: an undercover soft-ware agent for infiltrating IoT bot-nets. Network Security, 2019(1):9–14, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300091.

Cox:2019:MRS

[4163] Gary Cox. Managing the risks ofshadow IoT. Network Security, 2019(1):14–17, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300108.

Hodgson:2019:SSC

[4164] Roderick Hodgson. Solving the se-curity challenges of IoT with publickey cryptography. Network Security,2019(1):17–19, January 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930011X.

Goslin:2019:KYE

[4165] Ian Goslin. Know your enemy. Net-work Security, 2019(1):20, January

Page 498: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 498

2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300121.

Anonymous:2019:ECa

[4166] Anonymous. Events calendar. Net-work Security, 2019(1):20, January2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300133.

Anonymous:2019:UAH

[4167] Anonymous. US authorities hi-jack North Korea’s Joanap bot-net. Network Security, 2019(2):1–2, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300145.

Anonymous:2019:MDH

[4168] Anonymous. Massive data haul notall it seems. Network Security, 2019(2):2–3, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300157.

Anonymous:2019:Tb

[4169] Anonymous. Threatwatch. Net-work Security, 2019(2):3, February2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300169.

Anonymous:2019:DTP

[4170] Anonymous. Digital transformationputs data at risk. Network Security,

2019(2):3, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300170.

Anonymous:2019:GSI

[4171] Anonymous. Gemalto: State ofIoT security. Network Security,2019(2):4, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300182.

Anonymous:2019:Bb

[4172] Anonymous. In brief. NetworkSecurity, 2019(2):5, February 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300194.

Rutherford:2019:ITS

[4173] Robert Rutherford. Internet of Things— striking the balance between compe-tition and security. Network Security,2019(2):6–8, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300200.

Keef:2019:UAD

[4174] Sean Keef. Using analytics-driven au-tomation to target the biggest vul-nerabilities. Network Security, 2019(2):8–11, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300212.

Page 499: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 499

Vincent:2019:DFP

[4175] Adam Vincent. Don’t feed thephish: how to avoid phishing at-tacks. Network Security, 2019(2):11–14, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300224.

Bindley:2019:JDH

[4176] Phil Bindley. Joining the dots: howto approach compliance and data gov-ernance. Network Security, 2019(2):14–16, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300236.

Yeoman:2019:HSB

[4177] Simon Yeoman. How secure are baremetal servers? Network Security, 2019(2):16–17, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300248.

Newman:2019:URD

[4178] Sean Newman. Under the radar:the danger of stealthy DDoS at-tacks. Network Security, 2019(2):18–19, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930025X.

Pogrebna:2019:MFA

[4179] Ganna Pogrebna, Karen Renaud, andBoris Taratine. The many faces

of active cyber. Network Security,2019(2):20, February 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300261.

Anonymous:2019:ECb

[4180] Anonymous. Events calendar. Net-work Security, 2019(2):20, February2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300273.

Anonymous:2019:DBR

[4181] Anonymous. Data breaches reachrecord levels worldwide. Network Secu-rity, 2019(3):1–2, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300285.

Anonymous:2019:FDB

[4182] Anonymous. Firms delay breachreports. Network Security, 2019(3):2–3, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300297.

Anonymous:2019:Tc

[4183] Anonymous. Threatwatch. Net-work Security, 2019(3):3, March 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300303.

Page 500: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 500

Anonymous:2019:HBS

[4184] Anonymous. Huawei battles secu-rity concerns. Network Security,2019(3):3, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300315.

Anonymous:2019:API

[4185] Anonymous. Accenture/PonemonInstitute: the cost of cybercrime.Network Security, 2019(3):4, March2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300327.

Anonymous:2019:Bc

[4186] Anonymous. In brief. Network Secu-rity, 2019(3):5, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300339.

Klein:2019:MSS

[4187] Dave Klein. Micro-segmentation:securing complex cloud environ-ments. Network Security, 2019(3):6–10, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300340.

Canada:2019:RDW

[4188] Jesse Canada. Is reputationaldamage worse than a regulator’sfine? Network Security, 2019(3):11–12, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300352.

Schofield:2019:YWL

[4189] Greig Schofield. Has your wifi leftyou wide open to cybercrime? Net-work Security, 2019(3):13–14, March2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300364.

Haria:2019:GHS

[4190] Sam Haria. The growth of the hideand seek botnet. Network Security,2019(3):14–17, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300376.

Duncan:2019:HSY

[4191] Rory Duncan. How to secure yoursupply chain. Network Security, 2019(3):18–19, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300388.

Tankard:2019:IRF

[4192] Colin Tankard. IoT regulations:fact or fiction? Network Security,2019(3):20, March 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930039X.

Anonymous:2019:ECc

[4193] Anonymous. Events calendar. Net-work Security, 2019(3):20, March

Page 501: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 501

2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300406.

Anonymous:2019:FCB

[4194] Anonymous. Facebook confronted bya barrage of privacy issues. Net-work Security, 2019(4):1–3, April2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300418.

Anonymous:2019:Td

[4195] Anonymous. Threatwatch. Net-work Security, 2019(4):3, April 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581930042X.

Anonymous:2019:AIM

[4196] Anonymous. Asus issues mali-cious updates. Network Security,2019(4):3, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300431.

Anonymous:2019:DCS

[4197] Anonymous. DCMS: Cyber SecurityBreaches Survey 2019. Network Secu-rity, 2019(4):4, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300443.

Anonymous:2019:Bd

[4198] Anonymous. In brief. Network Secu-rity, 2019(4):5, April 2019. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300455.

Goldberg:2019:LDO

[4199] Daniel Goldberg. Living withdecade-old vulnerabilities in data-centre software. Network Security,2019(4):6–8, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300467.

Jewell:2019:ALA

[4200] Nick Jewell. The analytics lifecycle andthe age of innovation. Network Secu-rity, 2019(4):8–11, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300479.

Giese:2019:EEI

[4201] Sascha Giese. The endpoint epidemicof IoT — just a bad dream? Net-work Security, 2019(4):11–12, April2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300480.

Herbert:2019:PSO

[4202] Sean Herbert. Preventing soft-ware from opening doors to thenetwork. Network Security, 2019(4):13–15, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300492.

Page 502: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 502

Mathews:2019:WCM

[4203] Alex Mathews. What can ma-chine learning do for information se-curity? Network Security, 2019(4):15–17, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300509.

Boughton:2019:PIC

[4204] Nick Boughton. Protecting infras-tructure from cyber attack. Net-work Security, 2019(4):18–19, April2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300510.

Spence:2019:NFR

[4205] Dave Spence. The non-functionalrequirement fallacy. Network Secu-rity, 2019(4):20, April 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300522.

Anonymous:2019:ECd

[4206] Anonymous. Events calendar. Net-work Security, 2019(4):20, April 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300534.

Anonymous:2019:UGO

[4207] Anonymous. UK Government of-fers initiatives and assurances. Net-work Security, 2019(5):1–3, May 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485819300546.

Anonymous:2019:Te

[4208] Anonymous. Threatwatch. Net-work Security, 2019(5):3, May 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300558.

Anonymous:2019:PHV

[4209] Anonymous. Presidential hopefulsvulnerable. Network Security, 2019(5):3, 19, May 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930056X.

Anonymous:2019:HCR

[4210] Anonymous. Hiscox Cyber Readi-ness Report 2019. Network Secu-rity, 2019(5):4, May 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300571.

Anonymous:2019:Be

[4211] Anonymous. In brief. Network Secu-rity, 2019(5):5, May 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300583.

Yaacoubi:2019:REM

[4212] Omar Yaacoubi. The rise of en-crypted malware. Network Security,2019(5):6–9, May 2019. CODENNTSCF5. ISSN 1353-4858 (print),

Page 503: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 503

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300595.

Gordon:2019:MT

[4213] Scott Gordon. A matter of trust.Network Security, 2019(5):9–11, May2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300601.

Nguyen:2019:WAD

[4214] Van-Linh Nguyen, Po-Ching Lin,and Ren-Hung Hwang. Web at-tacks: defeating monetisation at-tempts. Network Security, 2019(5):11–19, May 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300613.

Anonymous:2019:ROS

[4215] Anonymous. Risky open source.Network Security, 2019(5):19, May2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300625.

Goslin:2019:CET

[4216] Ian Goslin. Cyber extortion is threat-ening Industry 4.0. Network Secu-rity, 2019(5):20, May 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300637.

Anonymous:2019:ECf

[4217] Anonymous. Events calendar. Net-work Security, 2019(5):20, May 2019.

CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300649.

Anonymous:2019:RBO

[4218] Anonymous. RDP bug in older Win-dows versions leaves millions vulner-able to ‘wormable’ attack. Net-work Security, 2019(6):1–2, June 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300650.

Anonymous:2019:UFM

[4219] Anonymous. UK fails to makeprogress. Network Security, 2019(6):2–3, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300662.

Anonymous:2019:Tf

[4220] Anonymous. Threatwatch. Net-work Security, 2019(6):3, June 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300674.

Anonymous:2019:ITG

[4221] Anonymous. Insider threat grows.Network Security, 2019(6):3, June2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300686.

Anonymous:2019:MSE

[4222] Anonymous. Mimecast: the State ofEmail Security Report 2019. Net-

Page 504: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 504

work Security, 2019(6):4, June 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300698.

Anonymous:2019:Bf

[4223] Anonymous. In brief. Network Secu-rity, 2019(6):5, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300704.

Team:2019:EEL

[4224] SophosLabs Research Team. Emotetexposed: looking inside highly de-structive malware. Network Security,2019(6):6–11, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300716.

Boughton:2019:PWC

[4225] Nick Boughton. Protecting the worldof connected devices. Network Security,2019(6):11–13, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300728.

Macy:2019:PVT

[4226] Jason Macy. Product vs toolkit: APIand IAM security. Network Security,2019(6):13–15, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930073X.

Bhardwaj:2019:FET

[4227] Akashdeep Bhardwaj and Sam Goundar.A framework for effective threathunting. Network Security, 2019(6):15–19, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300741.

Renaud:2019:EPM

[4228] Karen Renaud and Verena Zim-mermann. Encouraging passwordmanager use. Network Security,2019(6):20, June 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300753.

Anonymous:2019:ECg

[4229] Anonymous. Events calendar. Net-work Security, 2019(6):20, June 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300765.

Anonymous:2019:WBB

[4230] Anonymous. War breaks out be-tween US and Iran in cyberspace.Network Security, 2019(7):1–3, July2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300777.

Anonymous:2019:Tg

[4231] Anonymous. Threatwatch. Net-work Security, 2019(7):3, July 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

Page 505: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 505

URL http://www.sciencedirect.

com/science/article/pii/S1353485819300789.

Anonymous:2019:CAM

[4232] Anonymous. China attacks ma-jor tech firms. Network Security,2019(7):3, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300790.

Anonymous:2019:SMD

[4233] Anonymous. Sikich: 2019 Manu-facturing and Distribution Report.Network Security, 2019(7):4, July2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300807.

Anonymous:2019:Bg

[4234] Anonymous. In brief. Network Secu-rity, 2019(7):5, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300819.

Roytman:2019:CPP

[4235] Michael Roytman and Jay Ja-cobs. The complexity of priori-tising patching. Network Security,2019(7):6–9, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300820.

Herbert:2019:WIS

[4236] Sean Herbert. Why IIoT shouldmake businesses rethink security. Net-work Security, 2019(7):9–11, July

2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300832.

Breitbarth:2019:IGO

[4237] Paul Breitbarth. The impact ofGDPR one year on. Network Security,2019(7):11–13, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300844.

Barker:2019:VHW

[4238] Peter Barker. Visual hacking —why it matters and how to pre-vent it. Network Security, 2019(7):14–17, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300856.

Oetjen:2019:UAI

[4239] Jan Oetjen. Using artificial intelli-gence in the fight against spam. Net-work Security, 2019(7):17–19, July2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300868.

Tankard:2019:WYN

[4240] Colin Tankard. Why you need cy-ber essentials. Network Security,2019(7):20, July 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930087X.

Page 506: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 506

Anonymous:2019:ECh

[4241] Anonymous. Events calendar. Net-work Security, 2019(7):20, July 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300881.

Anonymous:2019:MDB

[4242] Anonymous. More data breaches com-promise millions of records. Net-work Security, 2019(8):1–3, August2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300893.

Anonymous:2019:Th

[4243] Anonymous. Threatwatch. Net-work Security, 2019(8):3, August2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581930090X.

Anonymous:2019:VP

[4244] Anonymous. Vulnerable PCs. Net-work Security, 2019(8):3a–3, August2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819300911.

Anonymous:2019:NAC

[4245] Anonymous. NCSC: Active Cy-ber Defence (ACD) — The Sec-ond Year. Network Security, 2019(8):4, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300923.

Anonymous:2019:Bh

[4246] Anonymous. In brief. Network Secu-rity, 2019(8):5, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300935.

Skelly:2019:WTW

[4247] Keenan Skelly. It’s a war out there:why malicious hackers are beating busi-nesses to the punch — and what wecan do about it. Network Security,2019(8):6–8, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300947.

Ghalaieny:2019:AIN

[4248] Dawood Ghalaieny. Achieving IoTnirvana by protecting cellular net-works. Network Security, 2019(8):8–12, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300959.

OMalley:2019:SFA

[4249] Mike O’Malley. Securing the futureof AgTech. Network Security, 2019(8):12–14, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300960.

Kurpjuhn:2019:DRA

[4250] Thorsten Kurpjuhn. Demystifyingthe role of AI for better networksecurity. Network Security, 2019

Page 507: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 507

(8):14–17, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300972.

Taylor:2019:DST

[4251] Adrian Taylor. Decrypting SSL traffic:best practices for security, complianceand productivity. Network Security,2019(8):17–19, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300984.

Spence:2019:RC

[4252] Dave Spence. Response in thecloud. Network Security, 2019(8):20, August 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819300996.

Anonymous:2019:ECi

[4253] Anonymous. Events calendar. Net-work Security, 2019(8):20, August2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348581930100X.

Anonymous:2019:DRD

[4254] Anonymous. Dramatic rise in databreaches, with Yves Rocher, Mon-ster and ECB among latest to behit. Network Security, 2019(9):1–3, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301011.

Anonymous:2019:Ti

[4255] Anonymous. Threatwatch. Net-work Security, 2019(9):3, September2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301023.

Anonymous:2019:CGW

[4256] Anonymous. Cybercrime groups work-ing together. Network Security, 2019(9):3, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301035.

Anonymous:2019:KSI

[4257] Anonymous. Kaspersky: the stateof industrial cyber security. Net-work Security, 2019(9):4, September2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301047.

Anonymous:2019:Bi

[4258] Anonymous. In brief. Network Se-curity, 2019(9):5, September 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301059.

Young:2019:ASO

[4259] Spencer Young. Automated systemsonly: why CISOs should switch offtheir dumb machines. Network Se-curity, 2019(9):6–8, September 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301060.

Page 508: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 508

Grimes:2019:MWH

[4260] Roger Grimes. The many ways tohack 2FA. Network Security, 2019(9):8–13, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301072.

Baldin:2019:BPF

[4261] Andy Baldin. Best practices forfighting the fileless threat. NetworkSecurity, 2019(9):13–15, September2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301084.

Walker:2019:WDP

[4262] Paul Walker. Why do PAM projectsfail? Network Security, 2019(9):15–18, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301096.

Bunting:2019:CSH

[4263] Charlene Bunting. Cloud security:how to protect critical data and stayproductive. Network Security, 2019(9):18–19, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301102.

Goodall:2019:IIS

[4264] Richard Goodall. The ideal indus-trial SOC. Network Security, 2019(9):20, September 2019. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301114.

Anonymous:2019:ECj

[4265] Anonymous. Events calendar. Net-work Security, 2019(9):20, September2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301126.

Anonymous:2019:NWU

[4266] Anonymous. NCSC warns UK universi-ties of cyberthreats. Network Security,2019(10):1–2, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301138.

Anonymous:2019:ULT

[4267] Anonymous. US looks to tightenaircraft security. Network Security,2019(10):2, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930114X.

Anonymous:2019:FIM

[4268] Anonymous. FDA issues medical de-vice warning. Network Security, 2019(10):2–3, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301151.

Anonymous:2019:Tj

[4269] Anonymous. Threatwatch. Net-work Security, 2019(10):3, October

Page 509: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 509

2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301163.

Anonymous:2019:LCA

[4270] Anonymous. Loss of confidenceamong compliance professionals. Net-work Security, 2019(10):3, October2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301175.

Anonymous:2019:BHa

[4271] Anonymous. Bitdefender: Hackedoff! Network Security, 2019(10):4, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301187.

Anonymous:2019:Bj

[4272] Anonymous. In brief. NetworkSecurity, 2019(10):5, October 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301199.

Heritage:2019:PIC

[4273] Ian Heritage. Protecting Industry 4.0:challenges and solutions as IT, OTand IP converge. Network Security,2019(10):6–9, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301205.

Mansfield-Devine:2019:SOT

[4274] Steve Mansfield-Devine. The state ofoperational technology security. Net-work Security, 2019(10):9–13, October2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301217.

Bhardwaj:2019:CSA

[4275] Akashdeep Bhardwaj, Vinay Avasthi,and Sam Goundar. Cyber se-curity attacks on robotic plat-forms. Network Security, 2019(10):13–19, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301229.

Tankard:2019:GSH

[4276] Colin Tankard. Goodbye SIEM, helloSOARX. Network Security, 2019(10):20, October 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301230.

Anonymous:2019:ECk

[4277] Anonymous. Events calendar. Net-work Security, 2019(10):20, October2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301242.

Anonymous:2019:RPI

[4278] Anonymous. Russians pose as Ira-nians to attack Middle East tar-gets. Network Security, 2019(11):1–3, November 2019. CODEN

Page 510: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 510

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301254.

Anonymous:2019:CES

[4279] Anonymous. Child exploitation site isshut down. Network Security, 2019(11):3, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301266.

Anonymous:2019:Tk

[4280] Anonymous. Threatwatch. Net-work Security, 2019(11):3, November2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301278.

Anonymous:2019:NAR

[4281] Anonymous. NCSC Annual Re-view 2019. Network Security, 2019(11):4, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930128X.

Anonymous:2019:Bk

[4282] Anonymous. In brief. Network Se-curity, 2019(11):5, November 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301291.

Knauer:2019:HCC

[4283] Chris Knauer. How contact centrescan leave businesses exposed to cy-bercrime. Network Security, 2019

(11):6–9, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301308.

Stitt:2019:OWR

[4284] Tom Stitt. Office walls and road-blocks: how workflows and termi-nology get in the way of visibil-ity. Network Security, 2019(11):9–13, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930131X.

Homan:2019:IDS

[4285] Stu Homan. The importanceof domains to security manage-ment. Network Security, 2019(11):13–15, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301321.

Aleem:2019:TWW

[4286] Azeem Aleem. Treading water: why or-ganisations are making no progress oncyber security. Network Security, 2019(11):15–18, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301333.

Kunneke-Trenaman:2019:RFR

[4287] Nathalie Kunneke-Trenaman. RPKIand the future of routing secu-rity. Network Security, 2019(11):18–19, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),

Page 511: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 511

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301345.

Renaud:2019:SWS

[4288] Karen Renaud and Marc Dupuis.Should we scare people into behav-ing securely? Network Security, 2019(11):20, November 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301357.

Anonymous:2019:ECl

[4289] Anonymous. Events calendar. Net-work Security, 2019(11):20, November2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301369.

Anonymous:2019:NWR

[4290] Anonymous. New wave of ran-somware hits datacentre and health-care targets. Network Security, 2019(12):1–3, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301370.

Anonymous:2019:Tl

[4291] Anonymous. Threatwatch. Net-work Security, 2019(12):3, December2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301382.

Anonymous:2019:SP

[4292] Anonymous. Selfie phishing. Net-work Security, 2019(12):3, December

2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301394.

Anonymous:2019:BMY

[4293] Anonymous. Bitdefender: Mid-YearThreat Landscape Report 2019. Net-work Security, 2019(12):4, December2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301400.

Anonymous:2019:Bl

[4294] Anonymous. In brief. Network Se-curity, 2019(12):5, December 2019.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301412.

Callan:2019:CEV

[4295] Tim Callan and Chris Bailey. Changesto extended validation indicators putusers at risk. Network Security, 2019(12):6–8, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301424.

Thompson:2019:AAC

[4296] Steve Thompson. Apprenticeshipsas the answer to closing the cyberskills gap. Network Security, 2019(12):9–11, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301436.

Page 512: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 512

Al-kasassbeh:2019:WTD

[4297] Mouhammd Al-kasassbeh and TariqKhairallah. Winning tactics with DNStunnelling. Network Security, 2019(12):12–19, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485819301448.

Spence:2019:RSC

[4298] Dave Spence. Resilience in the sup-ply chain. Network Security, 2019(12):20, December 2019. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348581930145X.

Anonymous:2019:ECm

[4299] Anonymous. Events calendar. Net-work Security, 2019(12):20, December2019. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485819301461.

Anonymous:2020:RUF

[4300] Anonymous. Ring under fire overweakness in video device secu-rity. Network Security, 2020(1):1–2, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300015.

Anonymous:2020:CFT

[4301] Anonymous. Citrix flaw threatenslarge firms. Network Security, 2020(1):2–3, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300027.

Anonymous:2020:Ta

[4302] Anonymous. Threatwatch. Net-work Security, 2020(1):3, January2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300039.

Anonymous:2020:TD

[4303] Anonymous. TikTok dangers. Net-work Security, 2020(1):3, 19, January2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300040.

Anonymous:2020:USG

[4304] Anonymous. Upstream security:2020 Global Automotive Cyber se-curity Report. Network Security,2020(1):4, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300052.

Anonymous:2020:Ba

[4305] Anonymous. In brief. Network Secu-rity, 2020(1):5, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300064.

Reynolds:2020:TRD

[4306] Roy Reynolds. It’s time to rethinkDDoS protection. Network Security,2020(1):6–8, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),

Page 513: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 513

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300076.

Andreu:2020:OTS

[4307] Andres Andreu. Operational tech-nology security — a data per-spective. Network Security, 2020(1):8–13, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300088.

Gordon:2020:SWB

[4308] Scott Gordon. Securing workers be-yond the perimeter. Network Security,2020(1):14–16, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348582030009X.

Bunker:2020:TCA

[4309] Guy Bunker. Targeted cyber at-tacks: how to mitigate the increas-ing risk. Network Security, 2020(1):17–19, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300106.

Tankard:2020:PV

[4310] Colin Tankard. The power ofvoice. Network Security, 2020(1):20, January 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300118.

Anonymous:2020:ECa

[4311] Anonymous. Events calendar. Net-work Security, 2020(1):20, January2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348582030012X.

Anonymous:2020:UNC

[4312] Anonymous. United Nations coveredup hack of dozens of servers. Net-work Security, 2020(2):1–2, February2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300131.

Anonymous:2020:CFR

[4313] Anonymous. Citrix flaw remainscritical. Network Security, 2020(2):2–3, February 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300143.

Anonymous:2020:Tb

[4314] Anonymous. Threatwatch. Net-work Security, 2020(2):3, February2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300155.

Anonymous:2020:NFM

[4315] Anonymous. NSA finds major Win-dows bug. Network Security, 2020(2):3, February 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300167.

Page 514: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 514

Anonymous:2020:IOC

[4316] Anonymous. IBM/ObserveIT: Cost ofinsider threats 2020. Network Security,2020(2):4, February 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300179.

Anonymous:2020:Bb

[4317] Anonymous. In brief. NetworkSecurity, 2020(2):5, February 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300180.

Blake:2020:RRE

[4318] Cindy Blake. Reducing risk withend-to-end application security au-tomation. Network Security, 2020(2):6–8, February 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300192.

Bajpai:2020:DNR

[4319] Pranshu Bajpai and Richard En-body. Dissecting .NET ransomware:key generation, encryption and op-eration. Network Security, 2020(2):8–14, February 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300209.

Bhardwaj:2020:KSC

[4320] Akashdeep Bhardwaj and Sam Goundar.Keyloggers: silent cyber securityweapons. Network Security, 2020

(2):14–19, February 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300210.

MacMillan:2020:STC

[4321] Kate MacMillan. Signs of thingsto come? Network Security, 2020(2):20, February 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300222.

Anonymous:2020:ECb

[4322] Anonymous. Events calendar. Net-work Security, 2020(2):20, February2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300234.

Anonymous:2020:WVF

[4323] Anonymous. Worrying vulnerabilitiesfound in Intel, AMD, Cypress andBroadcom chips. Network Security,2020(3):1–3, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300246.

Anonymous:2020:Tc

[4324] Anonymous. Threatwatch. Net-work Security, 2020(3):3, March 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300258.

Page 515: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 515

Anonymous:2020:MTN

[4325] Anonymous. Microsoft takes downNecurs botnet. Network Security,2020(3):3, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348582030026X.

Anonymous:2020:EVS

[4326] Anonymous. Edgescan: Vulnera-bility stats report. Network Secu-rity, 2020(3):4, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300271.

Anonymous:2020:Bc

[4327] Anonymous. In brief. Network Secu-rity, 2020(3):5, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300283.

Reynolds:2020:FBM

[4328] Roy Reynolds. The four biggest mal-ware threats to UK businesses. Net-work Security, 2020(3):6–8, March2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300295.

Borchani:2020:AMB

[4329] Yessine Borchani. Advanced maliciousbeaconing detection through AI. Net-work Security, 2020(3):8–14, March2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300301.

Dyess:2020:MBB

[4330] Colby Dyess. Maintaining a bal-ance between agility and security inthe cloud. Network Security, 2020(3):14–17, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300313.

Geenens:2020:HWS

[4331] Pascal Geenens. How worriedshould you be about nation-state at-tacks? Network Security, 2020(3):17–19, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300325.

Renaud:2020:SPC

[4332] Karen Renaud. Strong passwords can’tkeep children safe. Network Secu-rity, 2020(3):20, March 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300337.

Anonymous:2020:ECc

[4333] Anonymous. Events calendar. Net-work Security, 2020(3):20, March2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300349.

Anonymous:2020:RPI

[4334] Anonymous. Ransomware pay-ments increase as more attack-ers leak data. Network Security,2020(4):1–3, April 2020. CODEN

Page 516: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 516

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300350.

Anonymous:2020:Te

[4335] Anonymous. Threatwatch. Net-work Security, 2020(4):3, April 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300362.

Anonymous:2020:CT

[4336] Anonymous. Cybercrime takedowns.Network Security, 2020(4):3, April2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300374.

Anonymous:2020:LSE

[4337] Anonymous. Linux servers exploitedfor a decade. Network Security,2020(4):3, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300386.

Anonymous:2020:WIS

[4338] Anonymous. Watchguard: Internet Se-curity Report Q4 2019. Network Secu-rity, 2020(4):4, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300398.

Anonymous:2020:Bd

[4339] Anonymous. In brief. Network Secu-rity, 2020(4):5, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300404.

Ray:2020:DDN

[4340] Terry Ray. DDoS defence: newtactics for a rising shadow in-dustry. Network Security, 2020(4):6–7, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300416.

Chapman:2020:YIS

[4341] Phil Chapman. Are your IT staffready for the pandemic-driven in-sider threat? Network Security,2020(4):8–11, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300428.

Wright:2020:ESN

[4342] Cary Wright. Essentials for select-ing a network monitoring tool. Net-work Security, 2020(4):11–14, April2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348582030043X.

Kelf:2020:SRC

[4343] Simon Kelf. The security risks cre-ated by cloud migration and how toovercome them. Network Security,2020(4):14–16, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300441.

Page 517: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 517

Higgins:2020:IRW

[4344] David Higgins. Innovation andrisk walk hand-in-hand with 5Gand IoT. Network Security, 2020(4):16–18, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300453.

Hockey:2020:UCS

[4345] Alyn Hockey. Uncovering the cy-ber security challenges in health-care. Network Security, 2020(4):18–19, April 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300465.

Fox:2020:LHT

[4346] David Fox. Losing the human touch.Network Security, 2020(4):20, April2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300477.

Anonymous:2020:ECd

[4347] Anonymous. Events calendar. Net-work Security, 2020(4):20, April 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300489.

Anonymous:2020:CHA

[4348] Anonymous. Chinese hackers attack-ing Covid-19 researchers, US warns.Network Security, 2020(5):1–2, May2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).

URL http://www.sciencedirect.

com/science/article/pii/S1353485820300490.

Anonymous:2020:IMT

[4349] Anonymous. InfinityBlack markettaken down. Network Security,2020(5):2–3, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300507.

Anonymous:2020:Tf

[4350] Anonymous. Threatwatch. Net-work Security, 2020(5):3, May 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300519.

Anonymous:2020:NNK

[4351] Anonymous. New North Ko-rean threats. Network Security,2020(5):3, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300520.

Anonymous:2020:ACR

[4352] Anonymous. AT&T Cybersecurity: therelationship between security maturityand business enablement. Network Se-curity, 2020(5):4, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300532.

Anonymous:2020:Be

[4353] Anonymous. In brief. Network Secu-rity, 2020(5):5, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),

Page 518: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 518

1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300544.

Malecki:2020:OSP

[4354] Florian Malecki. Optimising stor-age processes to reduce the riskof ransomware. Network Security,2020(5):6–8, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300556.

Meryem:2020:HID

[4355] Amar Meryem and Bouabid ElOuahidi. Hybrid intrusion detec-tion system using machine learning.Network Security, 2020(5):8–19, May2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300568.

Tankard:2020:PUN

[4356] Colin Tankard. Pandemic under-pins need for SOAR. Network Secu-rity, 2020(5):20, May 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348582030057X.

Anonymous:2020:ECe

[4357] Anonymous. Events calendar. Net-work Security, 2020(5):20, May 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300581.

Anonymous:2020:RNS

[4358] Anonymous. Russian nation-stateattackers target Exim mail servers.Network Security, 2020(6):1–2, June2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300593.

Anonymous:2020:NWA

[4359] Anonymous. Network and web appattacks increase. Network Security,2020(6):2–3, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S135348582030060X.

Anonymous:2020:Tg

[4360] Anonymous. ThreatWatch. Net-work Security, 2020(6):3, June 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300611.

Anonymous:2020:SEC

[4361] Anonymous. Scammers exploit Covid-19 measures. Network Security,2020(6):3, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300623.

Anonymous:2020:TMS

[4362] Anonymous. Trend micro: Shifts inunderground markets. Network Secu-rity, 2020(6):4, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300635.

Page 519: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 519

Anonymous:2020:Bf

[4363] Anonymous. In brief. Network Secu-rity, 2020(6):5, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300647.

Powell:2020:HDC

[4364] Leila Powell. How data canbe the lingua franca for secu-rity and IT. Network Security,2020(6):6–7, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300659.

Hampton:2020:KSH

[4365] Paul Hampton. Keeping a secure holdon data through modern electronic con-tent management. Network Security,2020(6):8–11, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300660.

Evangelakos:2020:KCA

[4366] Gus Evangelakos. Keeping criti-cal assets safe when teleworking isthe new norm. Network Security,2020(6):11–14, June 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300672.

Bulpett:2020:SAI

[4367] Ben Bulpett. Safeguarding againstthe insider threat. Network Security,2020(6):14–17, June 2020. CODEN

NTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300684.

Deighton:2020:KST

[4368] Thomas Deighton and Michael Wake-field. Keep security top of mindwhen moving into the cloud. Net-work Security, 2020(6):17–19, June2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300696.

MacMillan:2020:TC

[4369] Kate MacMillan. Trusting the CISO.Network Security, 2020(6):20, June2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300702.

Anonymous:2020:ECf

[4370] Anonymous. Events calendar. Net-work Security, 2020(6):20, June 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300714.

Anonymous:2020:AGC

[4371] Anonymous. Australian Govern-ment claims ‘sophisticated’ attack bynation-state actors. Network Secu-rity, 2020(7):1–2, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300726.

Page 520: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 520

Anonymous:2020:CRC

[4372] Anonymous. Call for revisions to Com-puter Misuse Act. Network Secu-rity, 2020(7):2–3, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300738.

Anonymous:2020:Th

[4373] Anonymous. Threatwatch. Net-work Security, 2020(7):3, July 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S135348582030074X.

Anonymous:2020:MDE

[4374] Anonymous. A million dodgy emails.Network Security, 2020(7):3, July2020. CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300751.

Anonymous:2020:ICR

[4375] Anonymous. IBM: 2020 Cyber Re-silient Organisation Report. Net-work Security, 2020(7):4, July 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300763.

Anonymous:2020:Bg

[4376] Anonymous. In brief. Network Secu-rity, 2020(7):5, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300775.

Cope:2020:SSS

[4377] Rod Cope. Strong security starts withsoftware development. Network Secu-rity, 2020(7):6–9, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300787.

Jartelius:2020:DBI

[4378] Martin Jartelius. The 2020 DataBreach Investigations Report — aCSO’s perspective. Network Secu-rity, 2020(7):9–12, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300799.

Lim:2020:AMC

[4379] Mieng Lim. Avoiding the mostcommon vulnerability-managementpitfalls. Network Security, 2020(7):12–14, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300805.

Wood:2020:APD

[4380] Simon Wood. Adhering to pri-vacy by design with identity-as-a-service. Network Security, 2020(7):14–17, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300817.

Murray:2020:OSS

[4381] Dale Murray. Open source and se-curity: why transparency now equals

Page 521: ftp.math.utah.eduftp.math.utah.edu/pub/tex/bib/network-security.pdf · A Complete Bibliography of Publications in Network Security Nelson H. F. Beebe University of Utah Department

REFERENCES 521

strength. Network Security, 2020(7):17–19, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300829.

Renaud:2020:BRR

[4382] Karen Renaud, Zinaida Benenson, andDaniela Oliveira. Balancing resis-tance and resilience. Network Secu-rity, 2020(7):20, July 2020. CODENNTSCF5. ISSN 1353-4858 (print),1872-9371 (electronic). URL http:

//www.sciencedirect.com/science/

article/pii/S1353485820300830.

Anonymous:2020:ECg

[4383] Anonymous. Events calendar. Net-work Security, 2020(7):20, July 2020.CODEN NTSCF5. ISSN 1353-4858 (print), 1872-9371 (electronic).URL http://www.sciencedirect.

com/science/article/pii/S1353485820300842.