Computer emergency response—an international problem

@inproceedings{Pethia1991ComputerER,
  title={Computer emergency response—an international problem},
  author={Rich Pethia},
  booktitle={ICSE '91},
  year={1991}
}
c ins in this case utilized the same attack methods over and over ( such as repeatedly guessing ommon and system default usernam e/ password combinations, exploiting well known security , m holes which had not yet been fixed by the system administrators, etc.) ; through diligent ethodical application of these methods, the intruders were successful at entering dozens of hhhhhhhhhhhhhhhhhh ‡ Sponsored by the U.S. Department of Defense 

From This Paper

Figures, tables, results, connections, and topics extracted from this paper.
5 Extracted Citations
0 Extracted References
Similar Papers

Citing Papers

Publications influenced by this paper.

Similar Papers

Loading similar papers…