Search

Your search keyword '"Spafford, Eugene H."' showing total 343 results

Search Constraints

Start Over You searched for: Author "Spafford, Eugene H." Remove constraint Author: "Spafford, Eugene H."
343 results on '"Spafford, Eugene H."'

Search Results

2. A Hypergame Analysis for ErsatzPasswords

3. Ghost Patches: Fake Patches for Fake Vulnerabilities

5. Cyber Security Deception

6. Enhancing Passwords Security Using Deceptive Covert Communication

11. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication

13. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense

14. Risks and Uncertainties in Virtual Worlds: An Educators' Perspective

17. Virtual Playgrounds for Worm Behavior Investigation

24. Tracing worm break-in and contaminations via process coloring: a provenance-preserving approach

26. CuPIDS: An exploration of highly focused, co-processor-based information system protection

27. Automated adaptive intrusion containment in systems of interacting services

32. Intrusion Response Systems: A Survey

36. Run-time label propagation for forensic audit data

37. PFIRES: a policy framework for information security: creating and maintaining effective security strategy and policy for software applications

39. Are computer hacker break-ins ethical?

40. An execution-backtracking approach to debugging

44. The Case for Disappearing Cyber Security.

50. The internet worm incident

Catalog

Books, media, physical & digital resources