Fred Cohen

Affiliations:
  • Management Analytics, Hudson, NY, USA
  • University of New Haven, West Haven, CT, USA
  • California Sciences Institute, Livermore, CA, USA
  • University of Southern California, Los Angeles, CA, USA (PhD 1986)


According to our database1, Fred Cohen authored at least 59 papers between 1985 and 2022.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Can You Trust Zero Trust?
Computer, 2022

2015
A Tale of Two Traces - Diplomatics and Forensics.
Proceedings of the Advances in Digital Forensics XI, 2015

2014
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations.
Comput. Secur., 2014

2013
Science Column: Reconstruction: The Experimental Side of Digital Forensics.
J. Digit. Forensics Secur. Law, 2013

Science Column: Measuring Inconsistency Methods for Evidentiary Value.
J. Digit. Forensics Secur. Law, 2013

2012
Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media.
J. Digit. Forensics Secur. Law, 2012

Column: The Science of Digital Forensics: Analysis of Digital Traces.
J. Digit. Forensics Secur. Law, 2012

Identifying and Attributing Similar Traces with Greatest Common Factor Analysis.
J. Digit. Forensics Secur. Law, 2012

Column: The Physics of Digital Information-Part 2.
J. Digit. Forensics Secur. Law, 2012

Forensic Methods for Detecting Insider Turning Behaviors.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

2011
Column: The Physics of Digital Information.
J. Digit. Forensics Secur. Law, 2011

A Case Study in Forensic Analysis of Control.
J. Digit. Forensics Secur. Law, 2011

Column: Putting the Science in Digital Forensics.
J. Digit. Forensics Secur. Law, 2011

The State of the Science of Digital Evidence Examination.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

2010
Fundamentals of Digital Forensic Evidence.
Proceedings of the Handbook of Information and Communication Security, 2010

What makes critical infrastructures Critical?
Int. J. Crit. Infrastructure Prot., 2010

Automated Control System Security.
IEEE Secur. Priv., 2010

The Virtualization Solution.
IEEE Secur. Priv., 2010

The Smarter Grid.
IEEE Secur. Priv., 2010

A method for forensic analysis of control.
Comput. Secur., 2010

Fonts for Forensics.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Toward a Science of Digital Forensic Evidence Examination.
Proceedings of the Advances in Digital Forensics VI, 2010

Attribution of Messages to Sources in Digital Forensics Cases.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Two Models of Digital Forensic Examination.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

Bulk Email Forensics.
Proceedings of the Advances in Digital Forensics V, 2009

A Ph.D. Curriculum for Digital Forensics.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Recovering Data from Failing Floppy Disks.
Proceedings of the Advances in Digital Forensics IV, 2008

2003
Leading attackers through attack graphs with deceptions.
Comput. Secur., 2003

2001
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen.
Comput. J., 2001

2000
A Mathematical Structure of Simple Defensive Network Deception.
Comput. Secur., 2000

1999
Simulating cyber attacks, defences, and consequences.
Comput. Secur., 1999

1998
A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID.
Comput. Secur., 1998

A note on the role of deception in information protection.
Comput. Secur., 1998

1997
Information system defences: A preliminary classification scheme.
Comput. Secur., 1997

Information system attacks: A preliminary classification scheme.
Comput. Secur., 1997

1996
A secure world-wide-web daemon.
Comput. Secur., 1996

A note on distributed coordinated attacks.
Comput. Secur., 1996

1993
A model for detecting the existence of software corruption in real time.
Comput. Secur., 1993

Operating system protection through program evolution.
Comput. Secur., 1993

1992
A formal definition of computer worms and some related results.
Comput. Secur., 1992

Defense-in-depth against computer viruses.
Comput. Secur., 1992

1991
A DOS-based <i>POset</i> implementation.
Comput. Secur., 1991

A note on high-integrity PC bootstrapping.
Comput. Secur., 1991

A cost analysis of typical computer viruses and defenses.
Comput. Secur., 1991

1989
Computational aspects of computer viruses.
Comput. Secur., 1989

Models of practical defenses against computer viruses.
Comput. Secur., 1989

1988
Some weak points of one fast cryptographic checksum algorithm and its improvement.
Comput. Secur., 1988

Two secure file servers.
Comput. Secur., 1988

Maintaining a poor person's information integrity.
Comput. Secur., 1988

Ethical issues in computer virus distribution.
Comput. Secur., 1988

Designing provably correct information networks with digital diodes.
Comput. Secur., 1988

On the implications of computer viruses and methods of defense.
Comput. Secur., 1988

1987
A cryptographic checksum for integrity protection.
Comput. Secur., 1987

Design and protection of an information network under a partial ordering: A case study.
Comput. Secur., 1987

Design and administration of distributed and hierarchical information networks under partial orderings.
Comput. Secur., 1987

Computer viruses: Theory and experiments.
Comput. Secur., 1987

Protection and administration of information networks with partial orderings.
Comput. Secur., 1987

1985
A secure computer network design.
Comput. Secur., 1985


  Loading...