Fred Cohen Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen. [Citation Graph (0, 0)][DBLP] Comput. J., 2001, v:44, n:4, pp:326-327 [Journal]
Fred Cohen A Mathematical Structure of Simple Defensive Network Deception. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:520-528 [Journal]
Fred Cohen Information system attacks: A preliminary classification scheme. [Citation Graph (0, 0)][DBLP] Computers & Security, 1997, v:16, n:1, pp:29-46 [Journal]
Fred Cohen Information system defences: A preliminary classification scheme. [Citation Graph (0, 0)][DBLP] Computers & Security, 1997, v:16, n:2, pp:94-114 [Journal]
Fred Cohen A note on the role of deception in information protection. [Citation Graph (0, 0)][DBLP] Computers & Security, 1998, v:17, n:6, pp:483-506 [Journal]
Fred Cohen Simulating cyber attacks, defences, and consequences. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:6, pp:479-518 [Journal]