Follow
Fred Cohen
Fred Cohen
Management Analytics / Angel to Exit
Verified email at all.net - Homepage
Title
Cited by
Cited by
Year
Computer viruses: theory and experiments
F Cohen
Computers & security 6 (1), 22-35, 1987
17471987
Operating system protection through program evolution.
FB Cohen
Comput. Secur. 12 (6), 565-584, 1993
4591993
A short course on computer viruses
FB Cohen, DF Cohen
John Wiley & Sons, Inc., 1994
3491994
Simulating cyber attacks, defences, and consequences
F Cohen
Computers & Security 18 (6), 479-518, 1999
2961999
Computational aspects of computer viruses
F Cohen
Computers & Security 8 (4), 297-298, 1989
2011989
Protection and security on the information superhighway
FB Cohen, FB Cohen
Wiley, 1995
1871995
Digital Forensic Evidence Examination
F Cohen
Fred Cohen & Associates, 2009
1552009
Information system attacks: A preliminary classification scheme
F Cohen
Computers & Security 16 (1), 29-46, 1997
1431997
A cryptographic checksum for integrity protection
F Cohen
Computers & Security 6 (6), 505-510, 1987
1301987
A note on the role of deception in information protection
F Cohen
Computers & Security 17 (6), 483-506, 1998
1191998
The Use of Deception Techniques: Honeypots and Decoys
F Cohen
Handbook of Information Security V 3, p646, 2006
1102006
Method and apparatus providing deception and/or altered execution of logic in an information system
F Cohen, DT Rogers, V Neagoe
US Patent 7296274B2, 2007
962007
Measuring security
S Stolfo, SM Bellovin, D Evans
IEEE Security & Privacy 9 (3), 60-65, 2011
952011
A Framework for Deception
F Cohen
National Security Issues in Science, Law, and Technology, 123, 2001
902001
Method and apparatus providing deception and/or altered operation in an information system operating system
F Cohen, DT Rogers, V Neagoe
US Patent 7,437,766, 2008
852008
The deception toolkit
F Cohen
Risks Digest 19, 1998
781998
Models of practical defenses against computer viruses
F Cohen
Computers & Security 8 (2), 149-160, 1989
781989
Method and apparatus for configurable communication network defenses
F Cohen, AG Carathimas, ED Thomas
US Patent App. 10/438,285, 2003
762003
Method and apparatus for network deception/emulation
F Cohen
US Patent 7,107,347, 2006
732006
On the implications of computer viruses and methods of defense
F Cohen
Computers & Security 7 (2), 167-184, 1988
641988
The system can't perform the operation now. Try again later.
Articles 1–20