Search

Your search keyword '"Spafford, Eugene H."' showing total 262 results

Search Constraints

Start Over You searched for: Author "Spafford, Eugene H." Remove constraint Author: "Spafford, Eugene H."
262 results on '"Spafford, Eugene H."'

Search Results

2. A Hypergame Analysis for ErsatzPasswords

3. Ghost Patches: Fake Patches for Fake Vulnerabilities

7. Cyber Security Deception

8. Enhancing Passwords Security Using Deceptive Covert Communication

12. Back Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication

13. Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense

14. Risks and Uncertainties in Virtual Worlds: An Educators' Perspective

17. Virtual Playgrounds for Worm Behavior Investigation

27. Tracing worm break-in and contaminations via process coloring: a provenance-preserving approach

29. CuPIDS: An exploration of highly focused, co-processor-based information system protection

30. Automated adaptive intrusion containment in systems of interacting services

34. Intrusion Response Systems: A Survey

37. Run-time label propagation for forensic audit data

38. PFIRES: a policy framework for information security: creating and maintaining effective security strategy and policy for software applications

40. Are computer hacker break-ins ethical?

41. An execution-backtracking approach to debugging

45. The Case for Disappearing Cyber Security.

Catalog

Books, media, physical & digital resources