The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eugene H. Spafford: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gene H. Kim, Eugene H. Spafford
    The Design and Implementation of Tripwire: A File System Integrity Checker. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:18-29 [Conf]
  2. Thomas E. Daniels, Eugene H. Spafford
    A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:178-187 [Conf]
  3. J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni
    An Architecture for Intrusion Detection Using Autonomous Agents. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:13-24 [Conf]
  4. Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost
    Poly2 Paradigm: A Secure Network Service Architecture. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:342-351 [Conf]
  5. Christoph L. Schuba, Eugene H. Spafford
    A Reference Model for Firewall Technology. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:133-0 [Conf]
  6. Eugene H. Spafford
    A Failure to Learn from the Past. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:217-233 [Conf]
  7. Richard A. DeMillo, Hsin Pan, Eugene H. Spafford
    Failure and Fault Analysis for Software Debugging. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1997, pp:515-521 [Conf]
  8. Brian D. Carrier, Eugene H. Spafford
    Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. [Citation Graph (0, 0)][DBLP]
    DFRWS, 2005, pp:- [Conf]
  9. Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
    ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:508-517 [Conf]
  10. Eugene H. Spafford
    The Internet Worm Incident. [Citation Graph (0, 0)][DBLP]
    ESEC, 1989, pp:446-468 [Conf]
  11. Steve J. Chapin, Eugene H. Spafford
    Constructing Distributed Schedulers Using the MESSIAHS Interface Language. [Citation Graph (0, 0)][DBLP]
    HICSS (2), 1994, pp:425-434 [Conf]
  12. Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang
    Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:38- [Conf]
  13. Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr.
    Low-threat security patches and tools. [Citation Graph (0, 0)][DBLP]
    ICSM, 1997, pp:306-313 [Conf]
  14. Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford
    Dynamic Slicing in the Presence of Unconstrained Pointers. [Citation Graph (0, 0)][DBLP]
    Symposium on Testing, Analysis, and Verification, 1991, pp:60-73 [Conf]
  15. Richard A. DeMillo, Hsin Pan, Eugene H. Spafford
    Critical Slicing for Software Fault Localization. [Citation Graph (0, 0)][DBLP]
    ISSTA, 1996, pp:121-134 [Conf]
  16. Bryn Dole, Steven W. Lodin, Eugene H. Spafford
    Misplaced Trust: Kerberos 4 Session Keys. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  17. Eugene H. Spafford, Diego Zamboni
    New directions for the AAFID architecture. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  18. Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford
    Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:1-21 [Conf]
  19. Eugene H. Spafford
    The Hidden Meta-Requirements of Security and Privacy. [Citation Graph (0, 0)][DBLP]
    RE, 2001, pp:10- [Conf]
  20. Becky Bace, Gary Christoph, Tsutomu Shimomura, Eugene H. Spafford
    Information Superhighway or Road to Ruin? [Citation Graph (0, 0)][DBLP]
    SC, 1995, pp:- [Conf]
  21. Brent Auernheimer, Vinton G. Cerf, Susan Estrada, Russ Hobby, Craig Partridge, Eugene H. Spafford, Steven S. Wolff
    Networking in the nineties (panel session). [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1990, pp:252- [Conf]
  22. Donald Gotterbarn, Deborah G. Johnson, Keith Miller, Eugene H. Spafford
    Methods of integrating the study of ethics into the computer science curriculum (panel session). [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1990, pp:268- [Conf]
  23. Eugene H. Spafford
    What starisstar information security? [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2004, pp:342- [Conf]
  24. Rajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek
    Efficient Intrusion Detection using Automaton Inlining. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:18-31 [Conf]
  25. Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni
    Analysis of a Denial of Service Attack on TCP. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:208-223 [Conf]
  26. Daniel Farmer, Eugene H. Spafford
    The COPS Security Checker System. [Citation Graph (0, 0)][DBLP]
    USENIX Summer, 1990, pp:165-170 [Conf]
  27. Mikhail J. Atallah, K. N. Pantazopoulos, John R. Rice, Eugene H. Spafford
    Secure outsourcing of scientific computations. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2001, v:54, n:, pp:216-272 [Journal]
  28. Eugene H. Spafford
    Computer Viruses as Artificial Life. [Citation Graph (0, 0)][DBLP]
    Artificial Life, 1994, v:1, n:3, pp:249-265 [Journal]
  29. James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford
    Security models for web-based applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:38-44 [Journal]
  30. Jackie Rees, Subhajyoti Bandyopadhyay, Eugene H. Spafford
    PFIRES: a policy framework for information security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:7, pp:101-106 [Journal]
  31. Barbara Simons, Eugene H. Spafford
    Risks of total surveillance. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:3, pp:120- [Journal]
  32. Eugene H. Spafford
    Crisis and Aftermath. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1989, v:32, n:6, pp:678-687 [Journal]
  33. Eugene H. Spafford, Diego Zamboni
    Intrusion detection using autonomous agents. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:547-570 [Journal]
  34. Steve J. Chapin, Eugene H. Spafford
    Dissemination of state information in distributed autonomous systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:11, pp:969-979 [Journal]
  35. Ivan Krsul, Eugene H. Spafford
    Authorship analysis: identifying the author of a program. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:3, pp:233-257 [Journal]
  36. Eugene H. Spafford
    OPUS: Preventing weak password choices. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:3, pp:273-278 [Journal]
  37. Eugene H. Spafford, Stephen A. Weeber
    Software forensics: Can we track code to its authors? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:6, pp:585-595 [Journal]
  38. James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford
    Digital Government Security Infrastructure Design Challenges. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:2, pp:66-72 [Journal]
  39. Florian P. Buchholz, Eugene H. Spafford
    On the role of file system metadata in digital forensics. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:4, pp:298-309 [Journal]
  40. Brian D. Carrier, Eugene H. Spafford
    Categories of digital investigation analysis techniques based on the computer history model. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:Supplement-1, pp:121-130 [Journal]
  41. Sean W. Smith, Eugene H. Spafford
    Grand Challenges in Information Security: Process and Output. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:69-71 [Journal]
  42. Eugene H. Spafford
    IC Online: Infosecurity Summit at the White House. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2000, v:4, n:2, pp:108- [Journal]
  43. Thomas E. Daniels, Eugene H. Spafford
    Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:3-35 [Journal]
  44. Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni
    Using Internal Sensors and Embedded Detectors for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:23-70 [Journal]
  45. Eugene H. Spafford
    Are computer hacker break-ins ethical? [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1992, v:17, n:1, pp:41-47 [Journal]
  46. Christoph L. Schuba, Eugene H. Spafford, Berry Kercheval
    Prototyping experiences with classical IP and ARP over signaled ATM connections. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:44, n:1, pp:31-43 [Journal]
  47. Charles Koelbel, Eugene H. Spafford, George Leach
    Workshop on Experiences with Building Distributed and Multiprocessor Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1990, v:24, n:2, pp:2-6 [Journal]
  48. Mahesh V. Tripunitara, Eugene H. Spafford
    Connectivity provisioning with security attributes. [Citation Graph (0, 0)][DBLP]
    Software Focus, 2001, v:2, n:3, pp:112-116 [Journal]
  49. Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford
    An Execution-Backtracking Approach to Debugging. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1991, v:8, n:3, pp:21-26 [Journal]
  50. James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford
    Firewalls: An Expert Roundtable. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1997, v:14, n:5, pp:60-66 [Journal]
  51. Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford
    Debugging with Dynamic Slicing and Backtracking. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1993, v:23, n:6, pp:589-616 [Journal]
  52. Eugene H. Spafford
    Extending Mutation Testing to Find Environmental Bugs. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1990, v:20, n:2, pp:181-189 [Journal]
  53. Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
    Automated adaptive intrusion containment in systems of interacting services. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:5, pp:1334-1360 [Journal]
  54. Paul D. Williams, Eugene H. Spafford
    CuPIDS: An exploration of highly focused, co-processor-based information system protection. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:5, pp:1284-1298 [Journal]

  55. Some Challenges in Digital Forensics. [Citation Graph (, )][DBLP]


  56. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. [Citation Graph (, )][DBLP]


  57. Inspiration and trust. [Citation Graph (, )][DBLP]


  58. USACM's policy role. [Citation Graph (, )][DBLP]


  59. Privacy and security - Answering the wrong questions is no answer. [Citation Graph (, )][DBLP]


  60. Remembrances of things pest. [Citation Graph (, )][DBLP]


  61. Run-time label propagation for forensic audit data. [Citation Graph (, )][DBLP]


  62. A distributed requirements management framework for legal compliance and accountability. [Citation Graph (, )][DBLP]


  63. Editorial. [Citation Graph (, )][DBLP]


  64. Editorial. [Citation Graph (, )][DBLP]


Search in 0.050secs, Finished in 0.052secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002