2003 |
10 | EE | Fred Cohen,
Deanna Koike:
Leading attackers through attack graphs with deceptions.
Computers & Security 22(5): 402-411 (2003) |
2001 |
9 | EE | Fred Cohen:
Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen.
Comput. J. 44(4): 326-327 (2001) |
2000 |
8 | | Fred Cohen:
A Mathematical Structure of Simple Defensive Network Deception.
Computers & Security 19(6): 520-528 (2000) |
1999 |
7 | EE | Fred Cohen:
Simulating cyber attacks, defences, and consequences.
Computers & Security 18(6): 479-518 (1999) |
1998 |
6 | EE | Fred Cohen,
Cynthia A. Phillips,
Laura Painton Swiler,
Timothy Gaylor,
Patricia Leary,
Fran Rupley,
Richard Isler:
A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID.
Computers & Security 17(3): 211-221 (1998) |
5 | EE | Fred Cohen:
A note on the role of deception in information protection.
Computers & Security 17(6): 483-506 (1998) |
1997 |
4 | EE | Fred Cohen:
Information system attacks: A preliminary classification scheme.
Computers & Security 16(1): 29-46 (1997) |
3 | EE | Fred Cohen:
Information system defences: A preliminary classification scheme.
Computers & Security 16(2): 94-114 (1997) |
1989 |
2 | EE | Fred Cohen:
Models of practical defenses against computer viruses.
Computers & Security 8(2): 149-160 (1989) |
1 | EE | Fred Cohen:
Computational aspects of computer viruses.
Computers & Security 8(4): 297-298 (1989) |