Computer viruses: theory and experiments F Cohen Computers & security 6 (1), 22-35, 1987 | 1748 | 1987 |
Operating system protection through program evolution. FB Cohen Comput. Secur. 12 (6), 565-584, 1993 | 458 | 1993 |
A short course on computer viruses FB Cohen, DF Cohen John Wiley & Sons, Inc., 1994 | 350 | 1994 |
Simulating cyber attacks, defences, and consequences F Cohen Computers & Security 18 (6), 479-518, 1999 | 296 | 1999 |
Computational aspects of computer viruses F Cohen Computers & Security 8 (4), 297-298, 1989 | 202 | 1989 |
Protection and security on the information superhighway FB Cohen, FB Cohen Wiley, 1995 | 186 | 1995 |
Digital Forensic Evidence Examination F Cohen Fred Cohen & Associates, 2009 | 154 | 2009 |
Information system attacks: A preliminary classification scheme F Cohen Computers & Security 16 (1), 29-46, 1997 | 141 | 1997 |
A cryptographic checksum for integrity protection F Cohen Computers & Security 6 (6), 505-510, 1987 | 130 | 1987 |
A note on the role of deception in information protection F Cohen Computers & Security 17 (6), 483-506, 1998 | 122 | 1998 |
The Use of Deception Techniques: Honeypots and Decoys F Cohen Handbook of Information Security V 3, p646, 2006 | 110 | 2006 |
Method and apparatus providing deception and/or altered execution of logic in an information system F Cohen, DT Rogers, V Neagoe US Patent 7296274B2, 2007 | 96 | 2007 |
Measuring security S Stolfo, SM Bellovin, D Evans IEEE Security & Privacy 9 (3), 60-65, 2011 | 94 | 2011 |
A Framework for Deception F Cohen National Security Issues in Science, Law, and Technology, 123, 2001 | 88 | 2001 |
Method and apparatus providing deception and/or altered operation in an information system operating system F Cohen, DT Rogers, V Neagoe US Patent 7,437,766, 2008 | 85 | 2008 |
The deception toolkit F Cohen Risks Digest 19, 1998 | 80 | 1998 |
Models of practical defenses against computer viruses F Cohen Computers & Security 8 (2), 149-160, 1989 | 80 | 1989 |
Method and apparatus for configurable communication network defenses F Cohen, AG Carathimas, ED Thomas US Patent App. 10/438,285, 2003 | 77 | 2003 |
Method and apparatus for network deception/emulation F Cohen US Patent 7,107,347, 2006 | 75 | 2006 |
Method and apparatus for network deception/emulation F Cohen US Patent 7,516,227, 2009 | 66 | 2009 |