Follow
Eugene H. Spafford
Eugene H. Spafford
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Practical Unix and Internet Security
S Garfxnkel, G Spafford
O'Reilly and Associates, 2003
1044*2003
An architecture for intrusion detection using autonomous agents
JS Balasubramaniyan, JO Garcia-Fernandez, D Isacoff, E Spafford, ...
Proceedings 14th annual computer security applications conference (Cat. No …, 1998
9221998
The design and implementation of tripwire: A file system integrity checker
GH Kim, EH Spafford
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
8951994
Analysis of a denial of service attack on TCP
CL Schuba, IV Krsul, MG Kuhn, EH Spafford, A Sundaram, D Zamboni
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
8281997
The Internet worm program: An analysis
EH Spafford
ACM SIGCOMM Computer Communication Review 19 (1), 17-57, 1989
7871989
A pattern-matching model for instrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference (NCSC’94), 11-21, 0
739
A pattern matching model for misuse intrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference, 1995
7361995
Getting physical with the digital investigation process
B Carrier, EH Spafford
International Journal of Digital Evidence 2 (2), 1-20, 2003
7292003
Intrusion detection using autonomous agents
EH Spafford, D Zamboni
Computer Networks 34 (4), 547-570, 2000
6432000
Computing curricula 1991: report of the ACM/IEEE-CS Joint curriculum task force
AB Tucker, RM Aiken, K Barker, KB Bruce, JT Cain, SE Conry, GL Engel, ...
ACM, 1991
530*1991
Web Security & Commerce
S Garfinkel, G Spafford
O'Reilly & Associates, 1997
510*1997
Active defense of a computer system using autonomous agents
M Crosbie, G Spafford
476*1995
Debugging with dynamic slicing and backtracking
H Agrawal, RA Demillo, EH Spafford
Software: Practice and Experience 23 (6), 589-616, 1993
4631993
Security models for web-based applications
JBD Joshi, WG Aref, A Ghafoor, EH Spafford
Communications of the ACM 44 (2), 38-44, 2001
4592001
Design of mutant operators for the C programming language
H Agrawal, R Demillo, R Hathaway, W Hsu, W Hsu, E Krauser, RJ Martin, ...
Technical Report SERC-TR-41-P, Software Engineering Research Center, Purdue …, 1989
4431989
Crisis and aftermath
EH Spafford
Computers under attack: Intruders, worms, and viruses, 223-243, 1990
3971990
Crisis and aftermath
EH Spafford
Communications of the ACM 32 (6), 678-687, 1989
3971989
An event-based digital forensic investigation framework
B Carrier, EH Spafford
Digital forensic research workshop, 11-13, 2004
3872004
Secure outsourcing of scientific computations
MJ Atallah, KN Pantazopoulos, JR Rice, EH Spafford
Advances in Computers, ed. by Marshall C. Yovits, Academic Press 54, 2001
3832001
Web security, privacy and commerce, 2nd Edition
S Garfinkel, G Spafford
O'Reilly Media, 2002
3602002
The system can't perform the operation now. Try again later.
Articles 1–20