Fred Cohen
  According to our database1,
  Fred Cohen
  authored at least 43 papers
  between 1985 and 2015.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2015
    Proceedings of the Advances in Digital Forensics XI, 2015
    
  
  2014
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations.
    
  
    Comput. Secur., 2014
    
  
  2013
    J. Digit. Forensics Secur. Law, 2013
    
  
    J. Digit. Forensics Secur. Law, 2013
    
  
  2012
Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media.
    
  
    J. Digit. Forensics Secur. Law, 2012
    
  
    J. Digit. Forensics Secur. Law, 2012
    
  
    J. Digit. Forensics Secur. Law, 2012
    
  
    J. Digit. Forensics Secur. Law, 2012
    
  
    Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
    
  
  2011
    J. Digit. Forensics Secur. Law, 2011
    
  
  2010
    Int. J. Crit. Infrastructure Prot., 2010
    
  
    Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
    
  
    Proceedings of the Advances in Digital Forensics VI, 2010
    
  
  2009
    Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009
    
  
Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images.
    
  
    Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
    
  
  2003
  2001
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen.
    
  
    Comput. J., 2001
    
  
  2000
  1999
  1998
A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID.
    
  
    Comput. Secur., 1998
    
  
  1997
    Comput. Secur., 1997
    
  
    Comput. Secur., 1997
    
  
  1989
  1988
    Comput. Secur., 1988
    
  
    Comput. Secur., 1988
    
  
  1987
Design and protection of an information network under a partial ordering: A case study.
    
  
    Comput. Secur., 1987
    
  
Design and administration of distributed and hierarchical information networks under partial orderings.
    
  
    Comput. Secur., 1987
    
  
    Comput. Secur., 1987
    
  
  1985