2009 | ||
---|---|---|
65 | Eugene H. Spafford: USACM's policy role. Commun. ACM 52(2): 5 (2009) | |
64 | Eugene H. Spafford: Privacy and security - Answering the wrong questions is no answer. Commun. ACM 52(6): 22-24 (2009) | |
2008 | ||
63 | Eugene H. Spafford: Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. ISIPS 2008: 20-33 | |
62 | Eugene H. Spafford: Inspiration and trust. Commun. ACM 51(1): 61-62 (2008) | |
61 | Eugene H. Spafford: James P. Anderson: An Information Security Pioneer. IEEE Security & Privacy 6(1): 9 (2008) | |
60 | Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford: Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distrib. Syst. 19(7): 890-902 (2008) | |
2007 | ||
59 | Paul D. Williams, Eugene H. Spafford: CuPIDS: An exploration of highly focused, co-processor-based information system protection. Computer Networks 51(5): 1284-1298 (2007) | |
58 | Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford: Automated adaptive intrusion containment in systems of interacting services. Computer Networks 51(5): 1334-1360 (2007) | |
57 | Florian P. Buchholz, Eugene H. Spafford: Run-time label propagation for forensic audit data. Computers & Security 26(7-8): 496-513 (2007) | |
2006 | ||
56 | Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang: Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38 | |
55 | Eugene H. Spafford: Some Challenges in Digital Forensics. IFIP Int. Conf. Digital Forensics 2006: 1-9 | |
54 | Brian D. Carrier, Eugene H. Spafford: Categories of digital investigation analysis techniques based on the computer history model. Digital Investigation 3(Supplement-1): 121-130 (2006) | |
53 | Eugene H. Spafford: Desert Island Books. IEEE Security & Privacy 4(6): 5 (2006) | |
2005 | ||
52 | Brian D. Carrier, Eugene H. Spafford: Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. DFRWS 2005 | |
51 | Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford: ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. DSN 2005: 508-517 | |
50 | Rajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek: Efficient Intrusion Detection using Automaton Inlining. IEEE Symposium on Security and Privacy 2005: 18-31 | |
49 | Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford: Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21 | |
2004 | ||
48 | Eugene H. Spafford: What starisstar information security? SIGCSE 2004: 342 | |
47 | Florian P. Buchholz, Eugene H. Spafford: On the role of file system metadata in digital forensics. Digital Investigation 1(4): 298-309 (2004) | |
46 | Sean W. Smith, Eugene H. Spafford: Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy 2(1): 69-71 (2004) | |
2003 | ||
45 | Eugene H. Spafford: A Failure to Learn from the Past. ACSAC 2003: 217-233 | |
44 | Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost: Poly2 Paradigm: A Secure Network Service Architecture. ACSAC 2003: 342-351 | |
43 | Barbara Simons, Eugene H. Spafford: Risks of total surveillance. Commun. ACM 46(3): 120 (2003) | |
42 | Jackie Rees, Subhajyoti Bandyopadhyay, Eugene H. Spafford: PFIRES: a policy framework for information security. Commun. ACM 46(7): 101-106 (2003) | |
41 | Brian D. Carrier, Eugene H. Spafford: Getting Physical with the Digital Investigation Process. IJDE 2(2): (2003) | |
2002 | ||
40 | Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni: Using Internal Sensors and Embedded Detectors for Intrusion Detection. Journal of Computer Security 10(1/2): 23-70 (2002) | |
2001 | ||
39 | Eugene H. Spafford: The Hidden Meta-Requirements of Security and Privacy. RE 2001: 10 | |
38 | Mikhail J. Atallah, K. N. Pantazopoulos, John R. Rice, Eugene H. Spafford: Secure outsourcing of scientific computations. Advances in Computers 54: 216-272 (2001) | |
37 | James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford: Security models for web-based applications. Commun. ACM 44(2): 38-44 (2001) | |
36 | James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford: Digital Government Security Infrastructure Design Challenges. IEEE Computer 34(2): 66-72 (2001) | |
35 | Mahesh V. Tripunitara, Eugene H. Spafford: Connectivity provisioning with security attributes. Software Focus 2(3): 112-116 (2001) | |
2000 | ||
34 | Thomas E. Daniels, Eugene H. Spafford: A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. ACSAC 2000: 178-187 | |
33 | Eugene H. Spafford, Diego Zamboni: Intrusion detection using autonomous agents. Computer Networks 34(4): 547-570 (2000) | |
32 | Eugene H. Spafford: IC Online: Infosecurity Summit at the White House. IEEE Internet Computing 4(2): 108 (2000) | |
1999 | ||
31 | Eugene H. Spafford, Diego Zamboni: New directions for the AAFID architecture. Recent Advances in Intrusion Detection 1999 | |
30 | Thomas E. Daniels, Eugene H. Spafford: Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. Journal of Computer Security 7(1): 3-35 (1999) | |
1998 | ||
29 | J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni: An Architecture for Intrusion Detection Using Autonomous Agents. ACSAC 1998: 13-24 | |
28 | Steve J. Chapin, Eugene H. Spafford: Dissemination of state information in distributed autonomous systems. Computer Communications 21(11): 969-979 (1998) | |
27 | Christoph L. Schuba, Eugene H. Spafford, Berry Kercheval: Prototyping experiences with classical IP and ARP over signaled ATM connections. Journal of Systems and Software 44(1): 31-43 (1998) | |
1997 | ||
26 | Christoph L. Schuba, Eugene H. Spafford: A Reference Model for Firewall Technology. ACSAC 1997: 133- | |
25 | Richard A. DeMillo, Hsin Pan, Eugene H. Spafford: Failure and Fault Analysis for Software Debugging. COMPSAC 1997: 515-521 | |
24 | Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr.: Low-threat security patches and tools. ICSM 1997: 306-313 | |
23 | Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni: Analysis of a Denial of Service Attack on TCP. IEEE Symposium on Security and Privacy 1997: 208-223 | |
22 | Bryn Dole, Steven W. Lodin, Eugene H. Spafford: Misplaced Trust: Kerberos 4 Session Keys. NDSS 1997 | |
21 | Ivan Krsul, Eugene H. Spafford: Authorship analysis: identifying the author of a program. Computers & Security 16(3): 233-257 (1997) | |
20 | James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford: Firewalls: An Expert Roundtable. IEEE Software 14(5): 60-66 (1997) | |
1996 | ||
19 | Richard A. DeMillo, Hsin Pan, Eugene H. Spafford: Critical Slicing for Software Fault Localization. ISSTA 1996: 121-134 | |
1995 | ||
18 | Becky Bace, Gary Christoph, Tsutomu Shimomura, Eugene H. Spafford: Information Superhighway or Road to Ruin? SC 1995 | |
1994 | ||
17 | Gene H. Kim, Eugene H. Spafford: The Design and Implementation of Tripwire: A File System Integrity Checker. ACM Conference on Computer and Communications Security 1994: 18-29 | |
16 | Steve J. Chapin, Eugene H. Spafford: Constructing Distributed Schedulers Using the MESSIAHS Interface Language. HICSS (2) 1994: 425-434 | |
15 | Eugene H. Spafford: Computer Viruses as Artificial Life. Artificial Life 1(3): 249-265 (1994) | |
14 | Steve J. Chapin, Eugene H. Spafford: Support for Implementing Scheduling Algorithms Using MESSIAHS. Scientific Programming 3(4): 325-340 (1994) | |
1993 | ||
13 | Eugene H. Spafford, Stephen A. Weeber: Software forensics: Can we track code to its authors? Computers & Security 12(6): 585-595 (1993) | |
12 | Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford: Debugging with Dynamic Slicing and Backtracking. Softw., Pract. Exper. 23(6): 589-616 (1993) | |
1992 | ||
11 | Eugene H. Spafford: OPUS: Preventing weak password choices. Computers & Security 11(3): 273-278 (1992) | |
10 | Eugene H. Spafford: Are computer hacker break-ins ethical? Journal of Systems and Software 17(1): 41-47 (1992) | |
1991 | ||
9 | Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford: Dynamic Slicing in the Presence of Unconstrained Pointers. Symposium on Testing, Analysis, and Verification 1991: 60-73 | |
8 | Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford: An Execution-Backtracking Approach to Debugging. IEEE Software 8(3): 21-26 (1991) | |
1990 | ||
7 | Brent Auernheimer, Vinton G. Cerf, Susan Estrada, Russ Hobby, Craig Partridge, Eugene H. Spafford, Steven S. Wolff: Networking in the nineties (panel session). SIGCSE 1990: 252 | |
6 | Donald Gotterbarn, Deborah G. Johnson, Keith W. Miller, Eugene H. Spafford: Methods of integrating the study of ethics into the computer science curriculum (panel session). SIGCSE 1990: 268 | |
5 | Daniel Farmer, Eugene H. Spafford: The COPS Security Checker System. USENIX Summer 1990: 165-170 | |
4 | Charles Koelbel, Eugene H. Spafford, George Leach: Workshop on Experiences with Building Distributed and Multiprocessor Systems. Operating Systems Review 24(2): 2-6 (1990) | |
3 | Eugene H. Spafford: Extending Mutation Testing to Find Environmental Bugs. Softw., Pract. Exper. 20(2): 181-189 (1990) | |
1989 | ||
2 | Eugene H. Spafford: The Internet Worm Incident. ESEC 1989: 446-468 | |
1 | Eugene H. Spafford: Crisis and Aftermath. Commun. ACM 32(6): 678-687 (1989) |