Follow
Eugene H. Spafford
Eugene H. Spafford
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Practical Unix and Internet Security
S Garfxnkel, G Spafford
O'Reilly and Associates, 2003
1055*2003
An architecture for intrusion detection using autonomous agents
JS Balasubramaniyan, JO Garcia-Fernandez, D Isacoff, E Spafford, ...
Proceedings 14th annual computer security applications conference (Cat. No …, 1998
9251998
The design and implementation of tripwire: A file system integrity checker
GH Kim, EH Spafford
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
8971994
Analysis of a denial of service attack on TCP
CL Schuba, IV Krsul, MG Kuhn, EH Spafford, A Sundaram, D Zamboni
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
8401997
The Internet worm program: An analysis
EH Spafford
ACM SIGCOMM Computer Communication Review 19 (1), 17-57, 1989
7961989
A pattern-matching model for instrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference (NCSC’94), 11-21, 0
742
Getting physical with the digital investigation process
B Carrier, EH Spafford
International Journal of Digital Evidence 2 (2), 1-20, 2003
7412003
A pattern matching model for misuse intrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference, 1995
7391995
Intrusion detection using autonomous agents
EH Spafford, D Zamboni
Computer Networks 34 (4), 547-570, 2000
6452000
Computing curricula 1991: report of the ACM/IEEE-CS Joint curriculum task force
AB Tucker, RM Aiken, K Barker, KB Bruce, JT Cain, SE Conry, GL Engel, ...
ACM, 1991
534*1991
Web Security & Commerce
S Garfinkel, G Spafford
O'Reilly & Associates, 1997
516*1997
Active defense of a computer system using autonomous agents
M Crosbie, G Spafford
478*1995
Debugging with dynamic slicing and backtracking
H Agrawal, RA Demillo, EH Spafford
Software: Practice and Experience 23 (6), 589-616, 1993
4651993
Security models for web-based applications
JBD Joshi, WG Aref, A Ghafoor, EH Spafford
Communications of the ACM 44 (2), 38-44, 2001
4632001
Design of mutant operators for the C programming language
H Agrawal, R Demillo, R Hathaway, W Hsu, W Hsu, E Krauser, RJ Martin, ...
Technical Report SERC-TR-41-P, Software Engineering Research Center, Purdue …, 1989
4461989
Crisis and aftermath
EH Spafford
Computers under attack: Intruders, worms, and viruses, 223-243, 1990
4001990
Crisis and aftermath
EH Spafford
Communications of the ACM 32 (6), 678-687, 1989
4001989
An event-based digital forensic investigation framework
B Carrier, EH Spafford
Digital forensic research workshop, 11-13, 2004
3982004
Secure outsourcing of scientific computations
MJ Atallah, KN Pantazopoulos, JR Rice, EH Spafford
Advances in Computers, ed. by Marshall C. Yovits, Academic Press 54, 2001
3902001
Web security, privacy and commerce, 2nd Edition
S Garfinkel, G Spafford
O'Reilly Media, 2002
3632002
The system can't perform the operation now. Try again later.
Articles 1–20