IT Security Research and Education in Synergy

作者: Stefan Lindskog , Ulf Lindqvist , Erland Jonsson

DOI:

关键词:

摘要: This paper presents experience from laboratory projects performed by students in Applied Computer Security, a course given at Chalmers University of Technology. From this, we conclude that the comb ...

参考文章(22)
E. Jonsson, L. J. Janczewski, A taxonomy and overview of information security experiments information security. pp. 139- 150 ,(1997) , 10.1007/978-0-387-35259-6_12
Tomas Olovsson, Ulf Gustafson, Erland Jonsson, Security Evaluation of a PC Network based on Intrusion Experiments computer and communications security. pp. 187- 203 ,(1996)
Hans Hedbom, Stefan Lindskog, Erland Jonsson, A Preliminary Evaluation of the Security of a Non-Distributed Version of Windows NT Proceedings of the Second Nordic Workshop on Secure Computer Systems (NordSec 1997). ,(1997)
Ulf Gustafson, Erland Jonsson, Tomas Olovsson, On the modelling of preventive security based on a PC network intrusion experiment australasian conference on information security and privacy. ,vol. 1172, pp. 242- 252 ,(1996) , 10.1007/BFB0023303
Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst, Bev Littlewood, Towards operational measures of computer security: Experimentation and modelling Predictably Secure Computing Systems. pp. 555- 569 ,(1995) , 10.1007/978-3-642-79789-7_31
Hans Hedbom, Stefan Lindskog, Erland Jonsson, Stefan Axelsson, An Analysis of the Security of Windows NT ,(1998)
Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi, A Taxonomy of Computer Program Security Flaws, with Examples Defense Technical Information Center. ,(1994) , 10.21236/ADA465587
Georgory Nordstrom, Georgory White, Security across the curriculum: using computer security to teach computer science principles Internet besieged. pp. 519- 525 ,(1997)
U. Lindqvist, E. Jonsson, A map of security risks associated with using COTS IEEE Computer. ,vol. 31, pp. 60- 66 ,(1998) , 10.1109/2.683009