1. Anderson, J., 1980. Computer security threat monitoring and surveillance. Technical Report, Fort Washington, PA.
2. High dictionary compression for proactive password checking;Bergadano;ACM Transactions on Information and System Security,1998
3. Bishop, M., 1991. Password management. In: Proceedings of COMPCON 1991, pp. 167–169
4. Bishop, M., 1992a. Anatomy of a proactive password checker. In: Proceedings of the Third UNIX Security Symposium, pp. 130–139
5. Bishop, M., 1992b. Proactive password checking. In: Proceedings of the Fourth Workshop on Computer Security Incident Handling, pp. W11:1–9