343 results on '"Spafford, Eugene H."'
Search Results
2. A Hypergame Analysis for ErsatzPasswords
3. Ghost Patches: Fake Patches for Fake Vulnerabilities
4. Reactive redundancy for data destruction protection (R2D2)
5. Cyber Security Deception
6. Enhancing Passwords Security Using Deceptive Covert Communication
7. In Memoriam: William A. Wulf
8. In Memoriam: Gordon Bell.
9. A Hypergame Analysis for ErsatzPasswords
10. In Memoriam
11. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
12. In memoriam: Juris Hartmanis 1928--2022
13. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
14. Risks and Uncertainties in Virtual Worlds: An Educators' Perspective
15. Are Computer Hacker Break-ins Ethical?*
16. Ghost Patches: Fake Patches for Fake Vulnerabilities
17. Virtual Playgrounds for Worm Behavior Investigation
18. Security and Privacy Challenges of a Digital Government
19. Happy Birthday, Dear Viruses
20. Enhancing Passwords Security Using Deceptive Covert Communication
21. Understanding insiders: An analysis of risk-taking behavior
22. In Memoriam: Charles M. Geschke (1939--2021)
23. In Memoriam: Jack Minker (1927---2021)
24. Tracing worm break-in and contaminations via process coloring: a provenance-preserving approach
25. In Memoriam: Frederick P. Brooks, Jr. 1931-2022.
26. CuPIDS: An exploration of highly focused, co-processor-based information system protection
27. Automated adaptive intrusion containment in systems of interacting services
28. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
29. In Memoriam: Edmund M. Clarke (1945–2020)
30. Categories of digital investigation analysis techniques based on the computer history model
31. Juris Hartmanis 1928-2022.
32. Intrusion Response Systems: A Survey
33. Digital government security infrastructure design challenges
34. In Memoriam: Fran Allen (1932--2020)
35. Security and Privacy Challenges of a Digital Government
36. Run-time label propagation for forensic audit data
37. PFIRES: a policy framework for information security: creating and maintaining effective security strategy and policy for software applications
38. An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks
39. Are computer hacker break-ins ethical?
40. An execution-backtracking approach to debugging
41. Editorial
42. The Morris Worm at 30
43. Authorship analysis: identifying the author of a program
44. The Case for Disappearing Cyber Security.
45. Software forensics: can we track code to its authors?
46. Process Coloring: An Information Flow-Preserving Approach to Malware Investigation
47. Privacy and security: answering the wrong questions is no answer
48. Intrusion detection using autonomous agents
49. CuPIDS: An Exploration of Highly Focused, Co-Processor-Based Information System Protection
50. The internet worm incident
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.