Follow
Eugene H. Spafford
Eugene H. Spafford
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Practical Unix and Internet Security
S Garfxnkel, G Spafford
O'Reilly and Associates, 2003
1056*2003
An architecture for intrusion detection using autonomous agents
JS Balasubramaniyan, JO Garcia-Fernandez, D Isacoff, E Spafford, ...
Proceedings 14th annual computer security applications conference (Cat. No …, 1998
9241998
The design and implementation of tripwire: A file system integrity checker
GH Kim, EH Spafford
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
8971994
Analysis of a denial of service attack on TCP
CL Schuba, IV Krsul, MG Kuhn, EH Spafford, A Sundaram, D Zamboni
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
8461997
The Internet worm program: An analysis
EH Spafford
ACM SIGCOMM Computer Communication Review 19 (1), 17-57, 1989
8001989
A pattern-matching model for instrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference (NCSC’94), 11-21, 0
746
Getting physical with the digital investigation process
B Carrier, EH Spafford
International Journal of Digital Evidence 2 (2), 1-20, 2003
7452003
A pattern matching model for misuse intrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference, 1995
7431995
Intrusion detection using autonomous agents
EH Spafford, D Zamboni
Computer Networks 34 (4), 547-570, 2000
6432000
Computing curricula 1991: report of the ACM/IEEE-CS Joint curriculum task force
AB Tucker, RM Aiken, K Barker, KB Bruce, JT Cain, SE Conry, GL Engel, ...
ACM, 1991
536*1991
Web Security & Commerce
S Garfinkel, G Spafford
O'Reilly & Associates, 1997
514*1997
Active defense of a computer system using autonomous agents
M Crosbie, G Spafford
479*1995
Debugging with dynamic slicing and backtracking
H Agrawal, RA Demillo, EH Spafford
Software: Practice and Experience 23 (6), 589-616, 1993
4661993
Security models for web-based applications
JBD Joshi, WG Aref, A Ghafoor, EH Spafford
Communications of the ACM 44 (2), 38-44, 2001
4652001
Design of mutant operators for the C programming language
H Agrawal, R Demillo, R Hathaway, W Hsu, W Hsu, E Krauser, RJ Martin, ...
Technical Report SERC-TR-41-P, Software Engineering Research Center, Purdue …, 1989
4481989
Crisis and aftermath
EH Spafford
Computers under attack: Intruders, worms, and viruses, 223-243, 1990
4011990
Crisis and aftermath
EH Spafford
Communications of the ACM 32 (6), 678-687, 1989
4011989
An event-based digital forensic investigation framework
B Carrier, EH Spafford
Digital forensic research workshop, 11-13, 2004
4002004
Secure outsourcing of scientific computations
MJ Atallah, KN Pantazopoulos, JR Rice, EH Spafford
Advances in Computers, ed. by Marshall C. Yovits, Academic Press 54, 2001
3902001
Web security, privacy and commerce, 2nd Edition
S Garfinkel, G Spafford
O'Reilly Media, 2002
3672002
The system can't perform the operation now. Try again later.
Articles 1–20