Eugene H. Spafford
Eugene H. Spafford
Verifierad e-postadress på purdue.edu - Startsida
Titel
Citeras av
Citeras av
År
Practical UNIX security
S Garfinkel, G Spafford
O'Reilly and Associates, 1991
1284*1991
Practical UNIX and Internet Security; 2nd Edition
S Garfinkel, G Spafford
" O'Reilly Media, Inc.", 1996
1049*1996
Practical UNIX and Internet Security, 3rd edition
S Garfinkel, G Spafford, A Schwartz
O'Reilly Media, Inc., 2003
10282003
Practical UNIX Security
G Spafford, S Garfinkel
O'Reilly, 1994
968*1994
An architecture for intrusion detection using autonomous agents
JS Balasubramaniyan, JO Garcia-Fernandez, D Isacoff, E Spafford, ...
Proceedings 14th annual computer security applications conference (Cat. No …, 1998
8961998
The design and implementation of tripwire: A file system integrity checker
GH Kim, EH Spafford
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
8611994
Analysis of a denial of service attack on TCP
CL Schuba, IV Krsul, MG Kuhn, EH Spafford, A Sundaram, D Zamboni
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
7541997
The Internet worm program: An analysis
EH Spafford
ACM SIGCOMM Computer Communication Review 19 (1), 17-57, 1989
7241989
A pattern-matching model for instrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference (NCSC’94), 11-21, 0
706
A pattern matching model for misuse intrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference, 1995
7031995
Getting physical with the digital investigation process
B Carrier, EH Spafford
International Journal of Digital Evidence 2 (2), 1-20, 2003
6362003
Intrusion detection using autonomous agents
EH Spafford, D Zamboni
Computer Networks 34 (4), 547-570, 2000
5912000
Web Security & Commerce
S Garfinkel, G Spafford
O'Reilly & Associates, 1997
493*1997
Computing curricula 1991: report of the ACM/IEEE-CS Joint curriculum task force
AB Tucker, RM Aiken, K Barker, KB Bruce, JT Cain, SE Conry, GL Engel, ...
ACM, 1991
483*1991
Security models for web-based applications
JBD Joshi, WG Aref, A Ghafoor, EH Spafford
Communications of the ACM 44 (2), 38-44, 2001
4382001
Debugging with dynamic slicing and backtracking
H Agrawal, RA Demillo, EH Spafford
Software: Practice and Experience 23 (6), 589-616, 1993
4371993
Active defense of a computer system using autonomous agents
M Crosbie, G Spafford
418*1995
Crisis and aftermath
EH Spafford
Communications of the ACM 32 (6), 678-687, 1989
4141989
Crisis and aftermath
EH Spafford
Computers under attack: Intruders, worms, and viruses, 223-243, 1990
4001990
Design of mutant operators for the C programming language
H Agrawal, R Demillo, R Hathaway, W Hsu, W Hsu, E Krauser, RJ Martin, ...
Technical Report SERC-TR-41-P, Software Engineering Research Center, Purdue …, 1989
3841989
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20