262 results on '"Spafford, Eugene H."'
Search Results
2. A Hypergame Analysis for ErsatzPasswords
3. Ghost Patches: Fake Patches for Fake Vulnerabilities
4. In Memoriam: Gordon Bell.
5. Reactive redundancy for data destruction protection (R2D2)
6. In Memoriam: William A. Wulf
7. Cyber Security Deception
8. Enhancing Passwords Security Using Deceptive Covert Communication
9. In Memoriam
10. A Hypergame Analysis for ErsatzPasswords
11. In memoriam: Juris Hartmanis 1928--2022
12. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
13. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
14. Risks and Uncertainties in Virtual Worlds: An Educators' Perspective
15. Are Computer Hacker Break-ins Ethical?*
16. Ghost Patches: Fake Patches for Fake Vulnerabilities
17. Virtual Playgrounds for Worm Behavior Investigation
18. Security and Privacy Challenges of a Digital Government
19. Happy Birthday, Dear Viruses
20. Enhancing Passwords Security Using Deceptive Covert Communication
21. In Memoriam: Charles M. Geschke (1939--2021)
22. In Memoriam: Frederick P. Brooks, Jr. 1931-2022.
23. Risks and uncertainties in virtual worlds: an educators’ perspective
24. Understanding insiders: An analysis of risk-taking behavior
25. In Memoriam: Jack Minker (1927---2021)
26. In Memoriam: Edmund M. Clarke (1945–2020)
27. Tracing worm break-in and contaminations via process coloring: a provenance-preserving approach
28. Juris Hartmanis 1928-2022.
29. CuPIDS: An exploration of highly focused, co-processor-based information system protection
30. Automated adaptive intrusion containment in systems of interacting services
31. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
32. In Memoriam: Fran Allen (1932--2020)
33. Categories of digital investigation analysis techniques based on the computer history model
34. Intrusion Response Systems: A Survey
35. Digital government security infrastructure design challenges
36. Security and Privacy Challenges of a Digital Government
37. Run-time label propagation for forensic audit data
38. PFIRES: a policy framework for information security: creating and maintaining effective security strategy and policy for software applications
39. An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks
40. Are computer hacker break-ins ethical?
41. An execution-backtracking approach to debugging
42. Editorial
43. The Morris Worm at 30
44. Authorship analysis: identifying the author of a program
45. The Case for Disappearing Cyber Security.
46. Software forensics: can we track code to its authors?
47. Process Coloring: An Information Flow-Preserving Approach to Malware Investigation
48. Privacy and security: answering the wrong questions is no answer
49. Intrusion detection using autonomous agents
50. CuPIDS: An Exploration of Highly Focused, Co-Processor-Based Information System Protection
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.