« PrécédentContinuer »
Article entitled "Toward Optimal Feature Selection" by Koller et. al., in Machine Learning: Proc. of the Thirteenth International Conference, 1996.
Article entitled "MIMEsweeper defuses virus network, 'net mail bombs" by Avery, in Info World, May 20,1996, vol. 12, No. 21, p. Nl.
Article entitled "Stomping out mail viruses" by Wilkerson, in PC Week, Jul. 15, 1996, p. N8.
Article entitled "Securing Electronic Mail Systems" by Serenelli et. al., in Communications-Fusing Command Control and Intelligence: MILCOM '92, 1992, pp. 677-680. Article entitled "Integralis' Minesweeper defuses E-mail bombs" Kramer et. al., in PC Week, Mar. 18, 1996, pp. N17-N23.
Article entitled "A Toolkit and Methods for Internet Firewalls" by Ranum et. al., in Proc. of USENIX Summer 1994 Technical Conference, Jun. 6-10, 1994, pp. 37-44. Article entitled "Firewall Systems: The Next Generation" by McGhie, in Integration Issues in Large Commercial Media Delivery Systems: Proc. of SPIE—The International Society for Optical Engineering, Oct. 23-24, 1995, pp. 270-281. Article entitled "Design of the TTI Prototype Trusted Mail Agent" by Rose et. al., in Computer Message Systems-85: Proc. of the IFIPTC 6 International Symposium on Computer Message Systems, Sep. 5-7, 1985, pp. 377-399. Article entitled "Designing an Academic Firewall: Policy, Practice, and Experience with SURF" by Greenwald et. al., in Proc. of the 1996 Symposium on Network and Distributed Systems Security, 1996, pp. 1-14.
Article entitled "X Through the Firewall, and Other Application Relays" by Treese et. al. in Proc. of the USENIX Summer 1993 Technical Conference, Jun. 21-25, 1993, pp. 87-99.
Article entitled "Firewalls For Sale" by Bryan, in BYTE, Apr., 1995, pp. 99-104.
Article entitled "A DNS Filter and Switch for Packet-filtering Gateways" by Cheswick et. al., in Proc. of the Sixth Annual USENIX Security Symposium: Focusing on Applications of Cryptography, Jul. 22-25, 1996, pp. 15-19.
Article entitled "Safe Use of X Window System Protocol Across A Firewall" by Kahn, in Proc. of the Fifth USENIX UNIX Security Symposium, Jun. 5-7, 1995, pp. 105-116.
Article entitled "Automating the OSI to Internet Management Conversion Through the Use of an Object-Oriented Platforms" by Pavlou et. al, in Proc. ofthelFIP TC6/WG6.4 International Conference on Advanced Information Processing Techniques for LAN and MAN Management, Apr. 7-9, 1993, pp. 245-260.
Article entitled "A Secure Email Gateway (Building an RCAS External Interface)" by Smith, in Tenth Annual Computer Security Applications Conference, Dec. 5-9,1994, pp. 202-211.
Article entitled "Secure External References in Multimedia Email Messages" by Wiegel, in 3rd ACM Conference on Computer and Communications Security, Mar. 14-16,1996, pp. 11-18.
Memo entitled "SOCKS Protocol Version 5" by Leech et. al., in Standards Track, Mar., 1996, pp. 1-9.
Article entitled "Securing the Web: fire walls, proxy servers, and data driven attacks" by Farrow in InfoWorld, Jun. 19, 1995, vol. 17, No. 25, p. 103.
* cited by examiner