{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:47:29Z","timestamp":1773859649781,"version":"3.50.1"},"reference-count":61,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0167-4048(97)85785-9","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T03:00:05Z","timestamp":1027652405000},"page":"29-46","source":"Crossref","is-referenced-by-count":48,"title":["Information system attacks: A preliminary classification scheme"],"prefix":"10.1016","volume":"16","author":[{"given":"Fred","family":"Cohen","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(97)85785-9_BIB1","series-title":"Joint Program Office for Special Technology Countermeasures","article-title":"Assessment of Electric Power Control Systems Security","author":"Agudo","year":"1996"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB2","series-title":"Secure Computer Systems: Mathematical Foundations and Model","author":"Bell","year":"1973"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB3","series-title":"ACM SIGCOMM Computer Communications Review","first-page":"32","article-title":"Security Problems in the TCP\/IP Protocol Suite","author":"Bellovin","year":"1989"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB4","series-title":"Proceedings of the Third Usenix UNIX Security Symposium","article-title":"There Be Dragons","author":"Bellovin","year":"1992"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB5","series-title":"Integrity Considerations for Secure Computer Systems","author":"Biba","year":"1977"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB6","series-title":"Checking for Race Conditions in File Access","author":"Bishop","year":"1996"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB7","series-title":"IFIP Congress","first-page":"229","article-title":"A Unified Method for the Specification and Verification of Protocols","author":"Bochmann","year":"1977"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB8","series-title":"Firewalls and Internet Security \u2014 Repelling the Wiley Hacker","author":"Cheswick","year":"1994"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB9","series-title":"IFIP TC-11 Conference","article-title":"Computer Viruses \u2014 Theory and Experiments","author":"Cohen","year":"1984"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB10","first-page":"35","article-title":"Algorithmic Authentication of Identification","volume":"7","author":"Cohen","year":"1985","journal-title":"Information Age"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB11","series-title":"IFIP, TC-11","first-page":"189","article-title":"A Secure Computer Network Design","volume":"Vol. 4","author":"Cohen","year":"1985"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB12","series-title":"Computer Viruses","author":"Cohen","year":"1986"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB13","series-title":"IFIP-TC11","first-page":"118","article-title":"Protection and Administration of Information Networks under Partial Orderings","volume":"Vol. 6","author":"Cohen","year":"1987"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB14","series-title":"Introductory Information Protection","author":"Cohen","year":"1987"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB15","article-title":"A New Integrity-Based Model for Limited Protection Against Computer Viruses","author":"Cohen","year":"1988"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB16","series-title":"IFIP-TC11","article-title":"Models of Practical Defenses Against Computer Viruses","volume":"Vol. 7","author":"Cohen","year":"1988"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB17","series-title":"A Short Course on Systems Administration and Security Under Unix","author":"Cohen","year":"1991"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB18","series-title":"A Short Course on Computer Viruses","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB19","series-title":"IFIP-TC11","article-title":"Operating Systems Protection Through Program Evolution","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB20","series-title":"It's Alive!!!","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB21","series-title":"Protection and Security on the Information Superhighway","author":"Cohen","year":"1995"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB22","article-title":"Defensive Information Warfare - Information Assurance","author":"Cohen","year":"1993"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB23","series-title":"IFIP-TC11","article-title":"Experiments on the Impact of Computer Viruses on Modern Computer Networks","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB24","series-title":"National Info-Sec Technical Baseline \u2014 Intrusion Detection and Response","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB25","series-title":"IFIP-TC11","article-title":"A Secure World-Wide-Web Server","author":"Cohen","year":"1997"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB26","series-title":"Assessment of Information Assurance for the Utility Industry","author":"Dagle","year":"1996"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB27","series-title":"Computer Network Architectures and Protocols","article-title":"Protocol Representation with Finite State Machines","author":"Danthine","year":"1982"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB28","article-title":"Secure Information Flow in Computer Systems","author":"Denning","year":"1975"},{"issue":"No. 5","key":"10.1016\/S0167-4048(97)85785-9_BIB29","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","article-title":"A Lattice Model of Secure Information Flow","volume":"Vol. 19","author":"Denning","year":"1976","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB30","series-title":"Cryptography and Data Security","author":"Denning","year":"1982"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB31","series-title":"Victory and Deceit \u2014 Dirty Tricks at War","author":"Dunnigan","year":"1995"},{"issue":"No. 7","key":"10.1016\/S0167-4048(97)85785-9_BIB32","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TC.1973.5009130","article-title":"On the Advantages of Tagged Architecture","author":"Feustal","year":"1973","journal-title":"IEEE Trans. on Computers C-22]"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB33","series-title":"Generally Accepted System Security Principles","author":"GASSP","year":"1995"},{"issue":"No. 1","key":"10.1016\/S0167-4048(97)85785-9_BIB34","article-title":"Modular Verification of Computer Communication Protocols","volume":"Vol. 31","author":"Hailpern","year":"1983","journal-title":"IEEE Communications"},{"issue":"No. 8","key":"10.1016\/S0167-4048(97)85785-9_BIB35","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","article-title":"Protection in Operating Systems","volume":"Vol. 19","author":"Harrison","year":"1976","journal-title":"CACM"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB36","article-title":"Rare Conditions \u2014 An Important Cause of Faults","author":"Hecht","year":"1993","journal-title":"IEEE 0-7803-1251-1\/93"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB37","series-title":"Rogue Programs: Viruses, Worms, and Trojan Horses","author":"Hoffman","year":"1990"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB38","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1080\/0161-117891852802","article-title":"Cryptanalysts Corner","volume":"Vol. 1","author":"Knight","year":"1978","journal-title":"Cryptologia"},{"issue":"1","key":"10.1016\/S0167-4048(97)85785-9_BIB39","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","article-title":"A Note on the Confinement Problem","volume":"16","author":"Lampson","year":"1973","journal-title":"CACM"},{"issue":"No. 7","key":"10.1016\/S0167-4048(97)85785-9_BIB40","doi-asserted-by":"crossref","DOI":"10.1109\/MC.1983.1654445","article-title":"The Best Available Technologies for Computer Security","volume":"Vol. 16","author":"Landwehr","year":"1983","journal-title":"IEEE Computer"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB41","series-title":"AIFIPS National Computer Conference","first-page":"361","article-title":"Operating System Penetration","author":"Lande","year":"1985"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB42","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/0167-4048(92)90175-Q","article-title":"Intrusion Detection: Its Role and Validation","volume":"Vol. 11","author":"Liepins","year":"1982","journal-title":"Computers & Security"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB43","author":"Lyu","year":"1995","journal-title":"Handbook of Software Reliability Engineering"},{"issue":"No. 11","key":"10.1016\/S0167-4048(97)85785-9_BIB44","article-title":"Specification and Validation of Protocols","volume":"Vol. 27","author":"Merlin","year":"1979","journal-title":"IEEE Communications"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB45_1","series-title":"Computer Related Risks","author":"Neumann","year":"1995"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB45_2","series-title":"Proceedings of the 12th National Computer Conference","article-title":"A Summary of Computer Misuse Techniques","author":"Neumann","year":"1989"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB46","series-title":"National Security Telecommunication Advisory Committee, Information Assurance Task Force - Electric Power Information Assurance Risk Assessment","author":"NSTAC","year":"1996"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB47","series-title":"A Survey of Protocol Verification Techniques","author":"Palmer","year":"1986"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB48","article-title":"Restoration in a Flash \u2014 Using DS3 Cross-connects","author":"Pekarske","year":"1990","journal-title":"Telephony"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB49","series-title":"Computer Communications Review","article-title":"A New Technique for Generating Protocol Tests","author":"Sabnani","year":"1985"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB50","series-title":"Information Warfare \u2014 Legal, Regulatory, Policy, and Organizational Considerations for Assurance","author":"SAIC-IW","year":"1995"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB51","series-title":"Protocol Specftication, Testing, and Verification II","article-title":"Some Experience with Test Sequence Generation for Protocols","author":"Sarikaya","year":"1982"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB52","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communications Theory of Secrecy Systems","author":"Shannon","year":"1949","journal-title":"Bell Systems Technical journal"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB53","series-title":"Common System Vulnerabilities","author":"Spafford","year":"1992"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB54","doi-asserted-by":"crossref","DOI":"10.1109\/MC.1979.1658889","article-title":"Formal Techniques for Protocol Specification and Verification","author":"Sunshine","year":"1979","journal-title":"IEEE Computer"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB55","first-page":"26","article-title":"Weak Links","author":"Thyfault","year":"1992","journal-title":"Information Week"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB56","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1112\/plms\/s2-42.1.230","article-title":"On Computable Numbers, with an Application to the Entscheidungs Problem","volume":"Vol 42","author":"Turing","year":"1936","journal-title":"London Math Soc. Ser 2"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB57","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","article-title":"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?","volume":"Vol 4","author":"van Eck","year":"1985","journal-title":"Computers & Security"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB58","series-title":"IFIP-TC11","first-page":"275","article-title":"A Model for Detecting the Existence of Software Corruptions in Real-Time","volume":"Vol. 12","author":"Voas","year":"1993"},{"issue":"No. 3","key":"10.1016\/S0167-4048(97)85785-9_BIB59","first-page":"7","article-title":"Misdirected phone call shuts down local power","volume":"Vol. 20","author":"Winkelman","year":"1995","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"10.1016\/S0167-4048(97)85785-9_BIB60","series-title":"WSCC Preliminary System Disturbance Report","article-title":"Western Systems Coordinating Council","author":"WSCC","year":"1996"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897857859?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897857859?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T00:53:41Z","timestamp":1555203221000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404897857859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S0167404897857859"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(97)85785-9","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}