Verifying the secure setup of UNIX client/servers and detection of network intrusion

Richard Feingold, Harry R. Bruestle, Tony Bartoletti, R. A. Saroyan, John M. Fisher, Viktor E. Hampel, Clifford B. Neuman, John P. Barlow
1996 Information Protection and Network Security  
doi:10.1117/12.232268 fatcat:tozhdgx5fva7np5eradefwrsby