The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fred Cohen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fred Cohen
    Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2001, v:44, n:4, pp:326-327 [Journal]
  2. Fred Cohen
    A Mathematical Structure of Simple Defensive Network Deception. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:6, pp:520-528 [Journal]
  3. Fred Cohen
    Information system attacks: A preliminary classification scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:1, pp:29-46 [Journal]
  4. Fred Cohen
    Information system defences: A preliminary classification scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1997, v:16, n:2, pp:94-114 [Journal]
  5. Fred Cohen
    A note on the role of deception in information protection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:6, pp:483-506 [Journal]
  6. Fred Cohen
    Simulating cyber attacks, defences, and consequences. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:6, pp:479-518 [Journal]
  7. Fred Cohen, Deanna Koike
    Leading attackers through attack graphs with deceptions. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:402-411 [Journal]
  8. Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler
    A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:3, pp:211-221 [Journal]

  9. Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images. [Citation Graph (, )][DBLP]


  10. Two Models of Digital Forensic Examination. [Citation Graph (, )][DBLP]


  11. Sensor Beams, Obstacles, and Possible Paths. [Citation Graph (, )][DBLP]


  12. Computational aspects of computer viruses. [Citation Graph (, )][DBLP]


  13. Models of practical defenses against computer viruses. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002