Computer viruses: theory and experiments F Cohen Computers & security 6 (1), 22-35, 1987 | 1747 | 1987 |
Operating system protection through program evolution. FB Cohen Comput. Secur. 12 (6), 565-584, 1993 | 459 | 1993 |
A short course on computer viruses FB Cohen, DF Cohen John Wiley & Sons, Inc., 1994 | 349 | 1994 |
Simulating cyber attacks, defences, and consequences F Cohen Computers & Security 18 (6), 479-518, 1999 | 296 | 1999 |
Computational aspects of computer viruses F Cohen Computers & Security 8 (4), 297-298, 1989 | 201 | 1989 |
Protection and security on the information superhighway FB Cohen, FB Cohen Wiley, 1995 | 187 | 1995 |
Digital Forensic Evidence Examination F Cohen Fred Cohen & Associates, 2009 | 155 | 2009 |
Information system attacks: A preliminary classification scheme F Cohen Computers & Security 16 (1), 29-46, 1997 | 143 | 1997 |
A cryptographic checksum for integrity protection F Cohen Computers & Security 6 (6), 505-510, 1987 | 130 | 1987 |
A note on the role of deception in information protection F Cohen Computers & Security 17 (6), 483-506, 1998 | 119 | 1998 |
The Use of Deception Techniques: Honeypots and Decoys F Cohen Handbook of Information Security V 3, p646, 2006 | 110 | 2006 |
Method and apparatus providing deception and/or altered execution of logic in an information system F Cohen, DT Rogers, V Neagoe US Patent 7296274B2, 2007 | 96 | 2007 |
Measuring security S Stolfo, SM Bellovin, D Evans IEEE Security & Privacy 9 (3), 60-65, 2011 | 95 | 2011 |
A Framework for Deception F Cohen National Security Issues in Science, Law, and Technology, 123, 2001 | 90 | 2001 |
Method and apparatus providing deception and/or altered operation in an information system operating system F Cohen, DT Rogers, V Neagoe US Patent 7,437,766, 2008 | 85 | 2008 |
The deception toolkit F Cohen Risks Digest 19, 1998 | 78 | 1998 |
Models of practical defenses against computer viruses F Cohen Computers & Security 8 (2), 149-160, 1989 | 78 | 1989 |
Method and apparatus for configurable communication network defenses F Cohen, AG Carathimas, ED Thomas US Patent App. 10/438,285, 2003 | 76 | 2003 |
Method and apparatus for network deception/emulation F Cohen US Patent 7,107,347, 2006 | 73 | 2006 |
On the implications of computer viruses and methods of defense F Cohen Computers & Security 7 (2), 167-184, 1988 | 64 | 1988 |