Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eric Fisch is active.

Publication


Featured researches published by Eric Fisch.


annual computer security applications conference | 1994

The design of an audit trail analysis tool

Eric Fisch; Gregory B. White; Udo W. Pooch

Discusses the design of a tool that automatically removes security-sensitive information from intruder activity log files collected at a compromised site. The sanitization of sensitive information enables researchers to study the log files without further compromising the security of the affected sites. This paper begins with a brief discussion of the importance of such a tool and a description of the complete sanitization process. This is followed by an examination of the important design issues of the sanitizer. The paper concludes with the final design of a sanitizer for SunOS-based intruder activity logs.<<ETX>>


Edpacs | 1998

Network Security Fundamentals

Gregory B. White; Eric Fisch; Udo W. Pooch

Abstract The increase in the number of systems connected to networks and distributed systems connected via networks seen in recent years will continue. With networks, an additional level of complexity for security services is introduced. Before examining how security is applied to networks, a basic understanding of network organization is required.


Archive | 1996

Computer system and network security

Gregory W. White; Udo W. Pooch; Eric Fisch


Archive | 1996

Intrusion damage control and assessment: a taxonomy and implementation of automated responses to intrusive behavior

Eric Fisch; Udo W. Pooch


Archive | 2000

Secure Computers and Networks: Analysis, Design, and Implementation

Eric Fisch; Gregory B. White


Archive | 1999

Risk Assessment and Mitigation

Eric Fisch; Gregory B. White


Information Systems Security | 1997

Government-Based Security Standards

Gregory B. White; Eric Fisch; Udo W. Pooch


Archive | 1999

Access and Information Flow Controls

Eric Fisch; Gregory B. White


Archive | 1999

Fundamentals of Computer Security

Eric Fisch; Gregory B. White


Archive | 1999

Developing Secure Computer Systems

Eric Fisch; Gregory B. White

Collaboration


Dive into the Eric Fisch's collaboration.

Top Co-Authors

Avatar

Gregory B. White

University of Texas at San Antonio

View shared research outputs
Top Co-Authors

Avatar

Gregory B. White

University of Texas at San Antonio

View shared research outputs
Researchain Logo
Decentralizing Knowledge