The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Richard Ford: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Attila Ondi, Richard Ford
    Modeling malcode with Hephaestus: beyond simple spread. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2007, pp:379-384 [Conf]
  2. Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
    Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:393-396 [Conf]
  3. Richard Ford
    Evolution of a teleprocessing network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1978, v:1, n:3, pp:145-148 [Journal]
  4. Richard Ford
    What a littledefinution can do. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:2, pp:110-114 [Journal]
  5. Richard Ford
    May you live in interesting times. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:7, pp:575-578 [Journal]
  6. Richard Ford
    Malware: Troy revisited. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:2, pp:105-108 [Journal]
  7. Richard Ford
    No suprises in Melissa Land. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:4, pp:300-302 [Journal]
  8. Richard Ford, Mark Bush, Alexander Bulatov
    Predation and the cost of replication: New approaches to malware prevention? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:4, pp:257-264 [Journal]
  9. Sarah Gordon, Richard Ford
    Cyberterrorism? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:636-647 [Journal]
  10. Richard Ford
    The Wrong Stuff? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:86-89 [Journal]
  11. Richard Ford
    Malcode Mysteries Revealed. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:72-75 [Journal]
  12. James A. Whittaker, Richard Ford
    How to Think about Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:68-71 [Journal]
  13. Herbert H. Thompson, Richard Ford
    Perfect Storm: The Insider, Naivety, and Hostility. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2004, v:2, n:4, pp:58-65 [Journal]
  14. Richard Ford
    Open vs. closed: which source is more secure? [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2007, v:5, n:1, pp:32-38 [Journal]
  15. Ibrahim K. El-Far, Richard Ford, Attila Ondi, Manan Pancholi
    Suppressing the Spread of Email Malcode using Short-term Message Recall. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2005, v:1, n:1-2, pp:4-12 [Journal]
  16. Sarah Gordon, Richard Ford
    On the definition and classification of cybercrime. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2006, v:2, n:1, pp:13-20 [Journal]
  17. Richard Ford, Sarah Gordon
    Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:3-10 [Conf]
  18. Geoffrey Mazeroff, Jens Gregor, Michael G. Thomason, Richard Ford
    Probabilistic suffix models for API sequence analysis of Windows XP applications. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2008, v:41, n:1, pp:90-101 [Journal]
  19. Attila Ondi, Richard Ford
    How good is good enough? Metrics for worm/anti-worm evaluation. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:2, pp:93-101 [Journal]

  20. Generic Danger Detection for Mission Continuity. [Citation Graph (, )][DBLP]


  21. Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls. [Citation Graph (, )][DBLP]


  22. Network Distribution of Security Policies via Ant-like Foraging Behavior. [Citation Graph (, )][DBLP]


Search in 1.008secs, Finished in 1.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002