Fred Cohen

According to our database1, Fred Cohen authored at least 43 papers between 1985 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
A Tale of Two Traces - Diplomatics and Forensics.
Proceedings of the Advances in Digital Forensics XI, 2015

2014
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations.
Comput. Secur., 2014

2013
Science Column: Reconstruction: The Experimental Side of Digital Forensics.
J. Digit. Forensics Secur. Law, 2013

Science Column: Measuring Inconsistency Methods for Evidentiary Value.
J. Digit. Forensics Secur. Law, 2013

2012
Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media.
J. Digit. Forensics Secur. Law, 2012

Column: The Science of Digital Forensics: Analysis of Digital Traces.
J. Digit. Forensics Secur. Law, 2012

Identifying and Attributing Similar Traces with Greatest Common Factor Analysis.
J. Digit. Forensics Secur. Law, 2012

Column: The Physics of Digital Information-Part 2.
J. Digit. Forensics Secur. Law, 2012

Forensic Methods for Detecting Insider Turning Behaviors.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

2011
Column: The Physics of Digital Information.
J. Digit. Forensics Secur. Law, 2011

A Case Study in Forensic Analysis of Control.
J. Digit. Forensics Secur. Law, 2011

Column: Putting the Science in Digital Forensics.
J. Digit. Forensics Secur. Law, 2011

2010
What makes critical infrastructures Critical?
Int. J. Crit. Infrastructure Prot., 2010

Automated Control System Security.
IEEE Secur. Priv., 2010

The Virtualization Solution.
IEEE Secur. Priv., 2010

The Smarter Grid.
IEEE Secur. Priv., 2010

A method for forensic analysis of control.
Comput. Secur., 2010

Fonts for Forensics.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Toward a Science of Digital Forensic Evidence Examination.
Proceedings of the Advances in Digital Forensics VI, 2010

2009
Two Models of Digital Forensic Examination.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

Bulk Email Forensics.
Proceedings of the Advances in Digital Forensics V, 2009

Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2003
Leading attackers through attack graphs with deceptions.
Comput. Secur., 2003

2001
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen.
Comput. J., 2001

2000
A Mathematical Structure of Simple Defensive Network Deception.
Comput. Secur., 2000

1999
Simulating cyber attacks, defences, and consequences.
Comput. Secur., 1999

1998
A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID.
Comput. Secur., 1998

A note on the role of deception in information protection.
Comput. Secur., 1998

1997
Information system defences: A preliminary classification scheme.
Comput. Secur., 1997

Information system attacks: A preliminary classification scheme.
Comput. Secur., 1997

1989
Computational aspects of computer viruses.
Comput. Secur., 1989

Models of practical defenses against computer viruses.
Comput. Secur., 1989

1988
Some weak points of one fast cryptographic checksum algorithm and its improvement.
Comput. Secur., 1988

Two secure file servers.
Comput. Secur., 1988

Maintaining a poor person's information integrity.
Comput. Secur., 1988

Designing provably correct information networks with digital diodes.
Comput. Secur., 1988

On the implications of computer viruses and methods of defense.
Comput. Secur., 1988

1987
A cryptographic checksum for integrity protection.
Comput. Secur., 1987

Design and protection of an information network under a partial ordering: A case study.
Comput. Secur., 1987

Design and administration of distributed and hierarchical information networks under partial orderings.
Comput. Secur., 1987

Computer viruses: Theory and experiments.
Comput. Secur., 1987

Protection and administration of information networks with partial orderings.
Comput. Secur., 1987

1985
A secure computer network design.
Comput. Secur., 1985


  Loading...