2008 |
22 | | Tauhida Parveen,
William Allen,
Scott R. Tilley,
Gerald Marin,
Richard Ford:
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls.
SEKE 2008: 802-807 |
21 | EE | Michael Workman,
Richard Ford,
William Allen:
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Information Security Journal: A Global Perspective 17(5&6): 267-277 (2008) |
20 | EE | Geoffrey Mazeroff,
Jens Gregor,
Michael G. Thomason,
Richard Ford:
Probabilistic suffix models for API sequence analysis of Windows XP applications.
Pattern Recognition 41(1): 90-101 (2008) |
2007 |
19 | EE | Attila Ondi,
Richard Ford:
Modeling malcode with Hephaestus: beyond simple spread.
ACM Southeast Regional Conference 2007: 379-384 |
18 | EE | Attila Ondi,
Ronaldo Menezes,
Richard Ford:
Network Distribution of Security Policies via Ant-like Foraging Behavior.
ICIW 2007: 64 |
17 | EE | Richard Ford:
Open vs. closed: which source is more secure?
ACM Queue 5(1): 32-38 (2007) |
16 | EE | Attila Ondi,
Richard Ford:
How good is good enough? Metrics for worm/anti-worm evaluation.
Journal in Computer Virology 3(2): 93-101 (2007) |
2006 |
15 | EE | Richard Ford,
Sarah Gordon:
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts.
NSPW 2006: 3-10 |
14 | EE | Richard Ford,
Mark Bush,
Alexander Bulatov:
Predation and the cost of replication: New approaches to malware prevention?
Computers & Security 25(4): 257-264 (2006) |
13 | EE | James A. Whittaker,
Richard Ford:
How to Think about Security.
IEEE Security & Privacy 4(2): 68-71 (2006) |
12 | EE | Sarah Gordon,
Richard Ford:
On the definition and classification of cybercrime.
Journal in Computer Virology 2(1): 13-20 (2006) |
2005 |
11 | EE | Simon N. Foley,
Abe Singer,
Michael E. Locasto,
Stelios Sidiroglou,
Angelos D. Keromytis,
John McDermott,
Julie Thorpe,
Paul C. van Oorschot,
Anil Somayaji,
Richard Ford,
Mark Bush,
Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop.
ACSAC 2005: 393-396 |
10 | EE | Richard Ford:
Malcode Mysteries Revealed.
IEEE Security & Privacy 3(3): 72-75 (2005) |
9 | EE | Ibrahim K. El-Far,
Richard Ford,
Attila Ondi,
Manan Pancholi:
Suppressing the Spread of Email Malcode using Short-term Message Recall.
Journal in Computer Virology 1(1-2): 4-12 (2005) |
2004 |
8 | EE | Herbert H. Thompson,
Richard Ford:
Perfect Storm: The Insider, Naivety, and Hostility.
ACM Queue 2(4): 58-65 (2004) |
7 | EE | Richard Ford:
The Wrong Stuff?
IEEE Security & Privacy 2(3): 86-89 (2004) |
2002 |
6 | | Sarah Gordon,
Richard Ford:
Cyberterrorism?
Computers & Security 21(7): 636-647 (2002) |
1999 |
5 | EE | Richard Ford:
Malware: Troy revisited.
Computers & Security 18(2): 105-108 (1999) |
4 | EE | Richard Ford:
No suprises in Melissa Land.
Computers & Security 18(4): 300-302 (1999) |
1998 |
3 | EE | Richard Ford:
What a littledefinution can do.
Computers & Security 17(2): 110-114 (1998) |
2 | EE | Richard Ford:
May you live in interesting times.
Computers & Security 17(7): 575-578 (1998) |
1978 |
1 | EE | Richard Ford:
Evolution of a teleprocessing network.
Computer Communications 1(3): 145-148 (1978) |