| 2008 |
| 22 | | Tauhida Parveen,
William Allen,
Scott R. Tilley,
Gerald Marin,
Richard Ford:
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls.
SEKE 2008: 802-807 |
| 21 | EE | Michael Workman,
Richard Ford,
William Allen:
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Information Security Journal: A Global Perspective 17(5&6): 267-277 (2008) |
| 20 | EE | Geoffrey Mazeroff,
Jens Gregor,
Michael G. Thomason,
Richard Ford:
Probabilistic suffix models for API sequence analysis of Windows XP applications.
Pattern Recognition 41(1): 90-101 (2008) |
| 2007 |
| 19 | EE | Attila Ondi,
Richard Ford:
Modeling malcode with Hephaestus: beyond simple spread.
ACM Southeast Regional Conference 2007: 379-384 |
| 18 | EE | Attila Ondi,
Ronaldo Menezes,
Richard Ford:
Network Distribution of Security Policies via Ant-like Foraging Behavior.
ICIW 2007: 64 |
| 17 | EE | Richard Ford:
Open vs. closed: which source is more secure?
ACM Queue 5(1): 32-38 (2007) |
| 16 | EE | Attila Ondi,
Richard Ford:
How good is good enough? Metrics for worm/anti-worm evaluation.
Journal in Computer Virology 3(2): 93-101 (2007) |
| 2006 |
| 15 | EE | Richard Ford,
Sarah Gordon:
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts.
NSPW 2006: 3-10 |
| 14 | EE | Richard Ford,
Mark Bush,
Alexander Bulatov:
Predation and the cost of replication: New approaches to malware prevention?
Computers & Security 25(4): 257-264 (2006) |
| 13 | EE | James A. Whittaker,
Richard Ford:
How to Think about Security.
IEEE Security & Privacy 4(2): 68-71 (2006) |
| 12 | EE | Sarah Gordon,
Richard Ford:
On the definition and classification of cybercrime.
Journal in Computer Virology 2(1): 13-20 (2006) |
| 2005 |
| 11 | EE | Simon N. Foley,
Abe Singer,
Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis,
John McDermott,
Julie Thorpe,
Paul C. van Oorschot,
Anil Somayaji,
Richard Ford,
Mark Bush,
Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop.
ACSAC 2005: 393-396 |
| 10 | EE | Richard Ford:
Malcode Mysteries Revealed.
IEEE Security & Privacy 3(3): 72-75 (2005) |
| 9 | EE | Ibrahim K. El-Far,
Richard Ford,
Attila Ondi,
Manan Pancholi:
Suppressing the Spread of Email Malcode using Short-term Message Recall.
Journal in Computer Virology 1(1-2): 4-12 (2005) |
| 2004 |
| 8 | EE | Herbert H. Thompson,
Richard Ford:
Perfect Storm: The Insider, Naivety, and Hostility.
ACM Queue 2(4): 58-65 (2004) |
| 7 | EE | Richard Ford:
The Wrong Stuff?
IEEE Security & Privacy 2(3): 86-89 (2004) |
| 2002 |
| 6 | | Sarah Gordon,
Richard Ford:
Cyberterrorism?
Computers & Security 21(7): 636-647 (2002) |
| 1999 |
| 5 | EE | Richard Ford:
Malware: Troy revisited.
Computers & Security 18(2): 105-108 (1999) |
| 4 | EE | Richard Ford:
No suprises in Melissa Land.
Computers & Security 18(4): 300-302 (1999) |
| 1998 |
| 3 | EE | Richard Ford:
What a littledefinution can do.
Computers & Security 17(2): 110-114 (1998) |
| 2 | EE | Richard Ford:
May you live in interesting times.
Computers & Security 17(7): 575-578 (1998) |
| 1978 |
| 1 | EE | Richard Ford:
Evolution of a teleprocessing network.
Computer Communications 1(3): 145-148 (1978) |