Practical Unix and Internet Security S Garfxnkel, G Spafford O'Reilly and Associates, 2003 | 1042* | 2003 |
An architecture for intrusion detection using autonomous agents JS Balasubramaniyan, JO Garcia-Fernandez, D Isacoff, E Spafford, ... Proceedings 14th annual computer security applications conference (Cat. No …, 1998 | 922 | 1998 |
The design and implementation of tripwire: A file system integrity checker GH Kim, EH Spafford Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994 | 895 | 1994 |
Analysis of a denial of service attack on TCP CL Schuba, IV Krsul, MG Kuhn, EH Spafford, A Sundaram, D Zamboni Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 828 | 1997 |
The Internet worm program: An analysis EH Spafford ACM SIGCOMM Computer Communication Review 19 (1), 17-57, 1989 | 785 | 1989 |
A pattern-matching model for instrusion detection S Kumar, EH Spafford Proceedings of the 17th National Computer Security Conference (NCSC’94), 11-21, 0 | 739 | |
A pattern matching model for misuse intrusion detection S Kumar, EH Spafford Proceedings of the 17th National Computer Security Conference, 1995 | 736 | 1995 |
Getting physical with the digital investigation process B Carrier, EH Spafford International Journal of Digital Evidence 2 (2), 1-20, 2003 | 729 | 2003 |
Intrusion detection using autonomous agents EH Spafford, D Zamboni Computer Networks 34 (4), 547-570, 2000 | 643 | 2000 |
Computing curricula 1991: report of the ACM/IEEE-CS Joint curriculum task force AB Tucker, RM Aiken, K Barker, KB Bruce, JT Cain, SE Conry, GL Engel, ... ACM, 1991 | 530* | 1991 |
Web Security & Commerce S Garfinkel, G Spafford O'Reilly & Associates, 1997 | 509* | 1997 |
Active defense of a computer system using autonomous agents M Crosbie, G Spafford | 476* | 1995 |
Debugging with dynamic slicing and backtracking H Agrawal, RA Demillo, EH Spafford Software: Practice and Experience 23 (6), 589-616, 1993 | 462 | 1993 |
Security models for web-based applications JBD Joshi, WG Aref, A Ghafoor, EH Spafford Communications of the ACM 44 (2), 38-44, 2001 | 459 | 2001 |
Design of mutant operators for the C programming language H Agrawal, R Demillo, R Hathaway, W Hsu, W Hsu, E Krauser, RJ Martin, ... Technical Report SERC-TR-41-P, Software Engineering Research Center, Purdue …, 1989 | 443 | 1989 |
Crisis and aftermath EH Spafford Computers under attack: Intruders, worms, and viruses, 223-243, 1990 | 397 | 1990 |
Crisis and aftermath EH Spafford Communications of the ACM 32 (6), 678-687, 1989 | 397 | 1989 |
An event-based digital forensic investigation framework B Carrier, EH Spafford Digital forensic research workshop, 11-13, 2004 | 386 | 2004 |
Secure outsourcing of scientific computations MJ Atallah, KN Pantazopoulos, JR Rice, EH Spafford Advances in Computers, ed. by Marshall C. Yovits, Academic Press 54, 2001 | 383 | 2001 |
Web security, privacy and commerce, 2nd Edition S Garfinkel, G Spafford O'Reilly Media, 2002 | 360 | 2002 |