2009 | ||
---|---|---|
10 | EE | Frederick B. Cohen, Thomas A. Johnson: A Ph.D. Curriculum for Digital Forensics. HICSS 2009: 1-8 |
1996 | ||
9 | EE | Frederick B. Cohen: A note on distributed coordinated attacks. Computers & Security 15(2): 103-121 (1996) |
8 | EE | Frederick B. Cohen: A secure world-wide-web daemon. Computers & Security 15(8): 707-724 (1996) |
1993 | ||
7 | EE | Jeffrey M. Voas, Jeffery E. Payne, Frederick B. Cohen: A model for detecting the existence of software corruption in real time. Computers & Security 12(3): 275-283 (1993) |
6 | EE | Frederick B. Cohen: Operating system protection through program evolution. Computers & Security 12(6): 565-584 (1993) |
1992 | ||
5 | EE | Frederick B. Cohen: Defense-in-depth against computer viruses. Computers & Security 11(6): 563-579 (1992) |
4 | EE | Frederick B. Cohen: A formal definition of computer worms and some related results. Computers & Security 11(7): 641-652 (1992) |
1991 | ||
3 | EE | Frederick B. Cohen: A cost analysis of typical computer viruses and defenses. Computers & Security 10(3): 239-250 (1991) |
2 | EE | Frederick B. Cohen: A note on high-integrity PC bootstrapping. Computers & Security 10(6): 535-539 (1991) |
1 | EE | Frederick B. Cohen: A DOS-based POset implementation. Computers & Security 10(6): 541-551 (1991) |
1 | Thomas A. Johnson | [10] |
2 | Jeffery E. Payne | [7] |
3 | Jeffrey M. Voas | [7] |