Eric Fisch
Texas A&M University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Eric Fisch.
annual computer security applications conference | 1994
Eric Fisch; Gregory B. White; Udo W. Pooch
Discusses the design of a tool that automatically removes security-sensitive information from intruder activity log files collected at a compromised site. The sanitization of sensitive information enables researchers to study the log files without further compromising the security of the affected sites. This paper begins with a brief discussion of the importance of such a tool and a description of the complete sanitization process. This is followed by an examination of the important design issues of the sanitizer. The paper concludes with the final design of a sanitizer for SunOS-based intruder activity logs.<<ETX>>
Edpacs | 1998
Gregory B. White; Eric Fisch; Udo W. Pooch
Abstract The increase in the number of systems connected to networks and distributed systems connected via networks seen in recent years will continue. With networks, an additional level of complexity for security services is introduced. Before examining how security is applied to networks, a basic understanding of network organization is required.
Archive | 1996
Gregory W. White; Udo W. Pooch; Eric Fisch
Archive | 1996
Eric Fisch; Udo W. Pooch
Archive | 2000
Eric Fisch; Gregory B. White
Archive | 1999
Eric Fisch; Gregory B. White
Information Systems Security | 1997
Gregory B. White; Eric Fisch; Udo W. Pooch
Archive | 1999
Eric Fisch; Gregory B. White
Archive | 1999
Eric Fisch; Gregory B. White
Archive | 1999
Eric Fisch; Gregory B. White