dblp.uni-trier.dewww.uni-trier.de

Fred Cohen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2003
10EEFred Cohen, Deanna Koike: Leading attackers through attack graphs with deceptions. Computers & Security 22(5): 402-411 (2003)
2001
9EEFred Cohen: Reply to `Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen. Comput. J. 44(4): 326-327 (2001)
2000
8 Fred Cohen: A Mathematical Structure of Simple Defensive Network Deception. Computers & Security 19(6): 520-528 (2000)
1999
7EEFred Cohen: Simulating cyber attacks, defences, and consequences. Computers & Security 18(6): 479-518 (1999)
1998
6EEFred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler: A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. Computers & Security 17(3): 211-221 (1998)
5EEFred Cohen: A note on the role of deception in information protection. Computers & Security 17(6): 483-506 (1998)
1997
4EEFred Cohen: Information system attacks: A preliminary classification scheme. Computers & Security 16(1): 29-46 (1997)
3EEFred Cohen: Information system defences: A preliminary classification scheme. Computers & Security 16(2): 94-114 (1997)
1989
2EEFred Cohen: Models of practical defenses against computer viruses. Computers & Security 8(2): 149-160 (1989)
1EEFred Cohen: Computational aspects of computer viruses. Computers & Security 8(4): 297-298 (1989)

Coauthor Index

1Timothy Gaylor [6]
2Richard Isler [6]
3Deanna Koike [10]
4Patricia Leary [6]
5Cynthia A. Phillips [6]
6Fran Rupley [6]
7Laura Painton Swiler [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)