Search the dblp DataBase
Eugene H. Spafford :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Gene H. Kim , Eugene H. Spafford The Design and Implementation of Tripwire: A File System Integrity Checker. [Citation Graph (1, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:18-29 [Conf ] Thomas E. Daniels , Eugene H. Spafford A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:178-187 [Conf ] J. S. Balasubramaniyan , J. O. Garcia-Fernandez , D. Isacoff , Eugene H. Spafford , Diego Zamboni An Architecture for Intrusion Detection Using Autonomous Agents. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:13-24 [Conf ] Eric Bryant , James P. Early , Rajeev Gopalakrishna , Gregory Roth , Eugene H. Spafford , Keith Watson , Paul Williams , Scott Yost Poly2 Paradigm: A Secure Network Service Architecture. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:342-351 [Conf ] Christoph L. Schuba , Eugene H. Spafford A Reference Model for Firewall Technology. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:133-0 [Conf ] Eugene H. Spafford A Failure to Learn from the Past. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:217-233 [Conf ] Richard A. DeMillo , Hsin Pan , Eugene H. Spafford Failure and Fault Analysis for Software Debugging. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1997, pp:515-521 [Conf ] Brian D. Carrier , Eugene H. Spafford Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. [Citation Graph (0, 0)][DBLP ] DFRWS, 2005, pp:- [Conf ] Bingrui Foo , Yu-Sung Wu , Yu-Chun Mao , Saurabh Bagchi , Eugene H. Spafford ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:508-517 [Conf ] Eugene H. Spafford The Internet Worm Incident. [Citation Graph (0, 0)][DBLP ] ESEC, 1989, pp:446-468 [Conf ] Steve J. Chapin , Eugene H. Spafford Constructing Distributed Schedulers Using the MESSIAHS Interface Language. [Citation Graph (0, 0)][DBLP ] HICSS (2), 1994, pp:425-434 [Conf ] Xuxian Jiang , Aaron Walters , Dongyan Xu , Eugene H. Spafford , Florian P. Buchholz , Yi-Min Wang Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. [Citation Graph (0, 0)][DBLP ] ICDCS, 2006, pp:38- [Conf ] Mohd A. Bashar , Ganesh Krishnan , Markus G. Kuhn , Eugene H. Spafford , Samuel S. Wagstaff Jr. Low-threat security patches and tools. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:306-313 [Conf ] Hiralal Agrawal , Richard A. DeMillo , Eugene H. Spafford Dynamic Slicing in the Presence of Unconstrained Pointers. [Citation Graph (0, 0)][DBLP ] Symposium on Testing, Analysis, and Verification, 1991, pp:60-73 [Conf ] Richard A. DeMillo , Hsin Pan , Eugene H. Spafford Critical Slicing for Software Fault Localization. [Citation Graph (0, 0)][DBLP ] ISSTA, 1996, pp:121-134 [Conf ] Bryn Dole , Steven W. Lodin , Eugene H. Spafford Misplaced Trust: Kerberos 4 Session Keys. [Citation Graph (0, 0)][DBLP ] NDSS, 1997, pp:- [Conf ] Eugene H. Spafford , Diego Zamboni New directions for the AAFID architecture. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Xuxian Jiang , Dongyan Xu , Helen J. Wang , Eugene H. Spafford Virtual Playgrounds for Worm Behavior Investigation. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:1-21 [Conf ] Eugene H. Spafford The Hidden Meta-Requirements of Security and Privacy. [Citation Graph (0, 0)][DBLP ] RE, 2001, pp:10- [Conf ] Becky Bace , Gary Christoph , Tsutomu Shimomura , Eugene H. Spafford Information Superhighway or Road to Ruin? [Citation Graph (0, 0)][DBLP ] SC, 1995, pp:- [Conf ] Brent Auernheimer , Vinton G. Cerf , Susan Estrada , Russ Hobby , Craig Partridge , Eugene H. Spafford , Steven S. Wolff Networking in the nineties (panel session). [Citation Graph (0, 0)][DBLP ] SIGCSE, 1990, pp:252- [Conf ] Donald Gotterbarn , Deborah G. Johnson , Keith Miller , Eugene H. Spafford Methods of integrating the study of ethics into the computer science curriculum (panel session). [Citation Graph (0, 0)][DBLP ] SIGCSE, 1990, pp:268- [Conf ] Eugene H. Spafford What star isstar information security? [Citation Graph (0, 0)][DBLP ] SIGCSE, 2004, pp:342- [Conf ] Rajeev Gopalakrishna , Eugene H. Spafford , Jan Vitek Efficient Intrusion Detection using Automaton Inlining. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2005, pp:18-31 [Conf ] Christoph L. Schuba , Ivan Krsul , Markus G. Kuhn , Eugene H. Spafford , Aurobindo Sundaram , Diego Zamboni Analysis of a Denial of Service Attack on TCP. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:208-223 [Conf ] Daniel Farmer , Eugene H. Spafford The COPS Security Checker System. [Citation Graph (0, 0)][DBLP ] USENIX Summer, 1990, pp:165-170 [Conf ] Mikhail J. Atallah , K. N. Pantazopoulos , John R. Rice , Eugene H. Spafford Secure outsourcing of scientific computations. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2001, v:54, n:, pp:216-272 [Journal ] Eugene H. Spafford Computer Viruses as Artificial Life. [Citation Graph (0, 0)][DBLP ] Artificial Life, 1994, v:1, n:3, pp:249-265 [Journal ] James Joshi , Walid G. Aref , Arif Ghafoor , Eugene H. Spafford Security models for web-based applications. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:38-44 [Journal ] Jackie Rees , Subhajyoti Bandyopadhyay , Eugene H. Spafford PFIRES: a policy framework for information security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:7, pp:101-106 [Journal ] Barbara Simons , Eugene H. Spafford Risks of total surveillance. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:3, pp:120- [Journal ] Eugene H. Spafford Crisis and Aftermath. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1989, v:32, n:6, pp:678-687 [Journal ] Eugene H. Spafford , Diego Zamboni Intrusion detection using autonomous agents. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:34, n:4, pp:547-570 [Journal ] Steve J. Chapin , Eugene H. Spafford Dissemination of state information in distributed autonomous systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:11, pp:969-979 [Journal ] Ivan Krsul , Eugene H. Spafford Authorship analysis: identifying the author of a program. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:3, pp:233-257 [Journal ] Eugene H. Spafford OPUS: Preventing weak password choices. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:3, pp:273-278 [Journal ] Eugene H. Spafford , Stephen A. Weeber Software forensics: Can we track code to its authors? [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:6, pp:585-595 [Journal ] James Joshi , Arif Ghafoor , Walid G. Aref , Eugene H. Spafford Digital Government Security Infrastructure Design Challenges. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2001, v:34, n:2, pp:66-72 [Journal ] Florian P. Buchholz , Eugene H. Spafford On the role of file system metadata in digital forensics. [Citation Graph (0, 0)][DBLP ] Digital Investigation, 2004, v:1, n:4, pp:298-309 [Journal ] Brian D. Carrier , Eugene H. Spafford Categories of digital investigation analysis techniques based on the computer history model. [Citation Graph (0, 0)][DBLP ] Digital Investigation, 2006, v:3, n:Supplement-1, pp:121-130 [Journal ] Sean W. Smith , Eugene H. Spafford Grand Challenges in Information Security: Process and Output. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:1, pp:69-71 [Journal ] Eugene H. Spafford IC Online: Infosecurity Summit at the White House. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2000, v:4, n:2, pp:108- [Journal ] Thomas E. Daniels , Eugene H. Spafford Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:3-35 [Journal ] Florian Kerschbaum , Eugene H. Spafford , Diego Zamboni Using Internal Sensors and Embedded Detectors for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:1/2, pp:23-70 [Journal ] Eugene H. Spafford Are computer hacker break-ins ethical? [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1992, v:17, n:1, pp:41-47 [Journal ] Christoph L. Schuba , Eugene H. Spafford , Berry Kercheval Prototyping experiences with classical IP and ARP over signaled ATM connections. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:44, n:1, pp:31-43 [Journal ] Charles Koelbel , Eugene H. Spafford , George Leach Workshop on Experiences with Building Distributed and Multiprocessor Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1990, v:24, n:2, pp:2-6 [Journal ] Mahesh V. Tripunitara , Eugene H. Spafford Connectivity provisioning with security attributes. [Citation Graph (0, 0)][DBLP ] Software Focus, 2001, v:2, n:3, pp:112-116 [Journal ] Hiralal Agrawal , Richard A. DeMillo , Eugene H. Spafford An Execution-Backtracking Approach to Debugging. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1991, v:8, n:3, pp:21-26 [Journal ] James P. Anderson , Sheila Brand , Li Gong , Thomas Haigh , Steven B. Lipner , Teresa F. Lunt , Ruth Nelson , William Neugent , Hilarie K. Orman , Marcus J. Ranum , Roger R. Schell , Eugene H. Spafford Firewalls: An Expert Roundtable. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1997, v:14, n:5, pp:60-66 [Journal ] Hiralal Agrawal , Richard A. DeMillo , Eugene H. Spafford Debugging with Dynamic Slicing and Backtracking. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1993, v:23, n:6, pp:589-616 [Journal ] Eugene H. Spafford Extending Mutation Testing to Find Environmental Bugs. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1990, v:20, n:2, pp:181-189 [Journal ] Yu-Sung Wu , Bingrui Foo , Yu-Chun Mao , Saurabh Bagchi , Eugene H. Spafford Automated adaptive intrusion containment in systems of interacting services. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:5, pp:1334-1360 [Journal ] Paul D. Williams , Eugene H. Spafford CuPIDS: An exploration of highly focused, co-processor-based information system protection. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:5, pp:1284-1298 [Journal ] Some Challenges in Digital Forensics. [Citation Graph (, )][DBLP ] Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. [Citation Graph (, )][DBLP ] Inspiration and trust. [Citation Graph (, )][DBLP ] USACM's policy role. [Citation Graph (, )][DBLP ] Privacy and security - Answering the wrong questions is no answer. [Citation Graph (, )][DBLP ] Remembrances of things pest. [Citation Graph (, )][DBLP ] Run-time label propagation for forensic audit data. [Citation Graph (, )][DBLP ] A distributed requirements management framework for legal compliance and accountability. [Citation Graph (, )][DBLP ] Editorial. [Citation Graph (, )][DBLP ] Editorial. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.458secs