Follow
Eugene H. Spafford
Eugene H. Spafford
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Practical UNIX security
S Garfinkel, G Spafford
O'Reilly and Associates, 1991
1365*1991
Practical UNIX and Internet Security; 2nd Edition
S Garfinkel, G Spafford
" O'Reilly Media, Inc.", 1996
1126*1996
Practical UNIX and Internet Security, 3rd edition
S Garfinkel, G Spafford, A Schwartz
O'Reilly Media, Inc., 2003
11002003
Practical UNIX Security
G Spafford, S Garfinkel
O'Reilly, 1994
1027*1994
An architecture for intrusion detection using autonomous agents
JS Balasubramaniyan, JO Garcia-Fernandez, D Isacoff, E Spafford, ...
Proceedings 14th annual computer security applications conference (Cat. No …, 1998
9261998
The design and implementation of tripwire: A file system integrity checker
GH Kim, EH Spafford
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
8971994
Analysis of a denial of service attack on TCP
CL Schuba, IV Krsul, MG Kuhn, EH Spafford, A Sundaram, D Zamboni
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
8171997
The Internet worm program: An analysis
EH Spafford
ACM SIGCOMM Computer Communication Review 19 (1), 17-57, 1989
7871989
A pattern-matching model for instrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference (NCSC’94), 11-21, 0
738
A pattern matching model for misuse intrusion detection
S Kumar, EH Spafford
Proceedings of the 17th National Computer Security Conference, 1995
7351995
Getting physical with the digital investigation process
B Carrier, EH Spafford
International Journal of Digital Evidence 2 (2), 1-20, 2003
7132003
Intrusion detection using autonomous agents
EH Spafford, D Zamboni
Computer Networks 34 (4), 547-570, 2000
6472000
Computing curricula 1991: report of the ACM/IEEE-CS Joint curriculum task force
AB Tucker, RM Aiken, K Barker, KB Bruce, JT Cain, SE Conry, GL Engel, ...
ACM, 1991
521*1991
Web Security & Commerce
S Garfinkel, G Spafford
O'Reilly & Associates, 1997
509*1997
Active defense of a computer system using autonomous agents
M Crosbie, G Spafford
477*1995
Debugging with dynamic slicing and backtracking
H Agrawal, RA Demillo, EH Spafford
Software: Practice and Experience 23 (6), 589-616, 1993
4591993
Security models for web-based applications
JBD Joshi, WG Aref, A Ghafoor, EH Spafford
Communications of the ACM 44 (2), 38-44, 2001
4572001
Design of mutant operators for the C programming language
H Agrawal, R Demillo, R Hathaway, W Hsu, W Hsu, E Krauser, RJ Martin, ...
Technical Report SERC-TR-41-P, Software Engineering Research Center, Purdue …, 1989
4381989
Crisis and aftermath
EH Spafford
Computers under attack: Intruders, worms, and viruses, 223-243, 1990
4111990
Crisis and aftermath
EH Spafford
Communications of the ACM 32 (6), 678-687, 1989
4111989
The system can't perform the operation now. Try again later.
Articles 1–20