Author:
Blundo Carlo,D’Arco Paolo,De Santis Alfredo,Galdi Clemente
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. J. Anderson. Computer Security Threat Monitoring and Surveillance. Fort Washington, PA: James P. Anderson Co. April 1980.
2. F. Bergadano, B. Crispo and G. Ruffo. High Dictionary Compression for Proactive Password Checking. ACM Transactions on Information and System Security. Vol. 1, No. 1, November 1998, Pages 3–25.
3. M. Bishop. Anatomy of a Proactive Password Checker. Proceedings of the Third UNIX Security Symposium, pp. 130–139, September 1992.
4. M. Bishop. Proactive Password Checking. Proceedings of the Fourth Workshop on Computer Security Incident Handling, pp. W11: 1–9 (Aug. 1992).
5. M. Bishop. Improving System Security via Proactive Password Checking. Computers and Security, 14(3) pp. 233–249 (1995)