Eugene H. Spafford

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

61EEEugene H. Spafford: USACM's policy role. Commun. ACM 52(2): 5 (2009)
60EEEugene H. Spafford: Inspiration and trust. Commun. ACM 51(1): 61-62 (2008)
59EEXuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford: Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distrib. Syst. 19(7): 890-902 (2008)
58EEPaul D. Williams, Eugene H. Spafford: CuPIDS: An exploration of highly focused, co-processor-based information system protection. Computer Networks 51(5): 1284-1298 (2007)
57EEYu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford: Automated adaptive intrusion containment in systems of interacting services. Computer Networks 51(5): 1334-1360 (2007)
56EEFlorian P. Buchholz, Eugene H. Spafford: Run-time label propagation for forensic audit data. Computers & Security 26(7-8): 496-513 (2007)
55EEXuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang: Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38
54 Eugene H. Spafford: Some Challenges in Digital Forensics. IFIP Int. Conf. Digital Forensics 2006: 1-9
53EEBrian D. Carrier, Eugene H. Spafford: Categories of digital investigation analysis techniques based on the computer history model. Digital Investigation 3(Supplement-1): 121-130 (2006)
52EEBrian D. Carrier, Eugene H. Spafford: Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. DFRWS 2005
51EEBingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford: ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. DSN 2005: 508-517
50EERajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek: Efficient Intrusion Detection using Automaton Inlining. IEEE Symposium on Security and Privacy 2005: 18-31
49EEXuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford: Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21
48EEEugene H. Spafford: What starisstar information security? SIGCSE 2004: 342
47EEFlorian P. Buchholz, Eugene H. Spafford: On the role of file system metadata in digital forensics. Digital Investigation 1(4): 298-309 (2004)
46EESean W. Smith, Eugene H. Spafford: Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy 2(1): 69-71 (2004)
45EEEugene H. Spafford: A Failure to Learn from the Past. ACSAC 2003: 217-233
44EEEric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost: Poly2 Paradigm: A Secure Network Service Architecture. ACSAC 2003: 342-351
43EEBarbara Simons, Eugene H. Spafford: Risks of total surveillance. Commun. ACM 46(3): 120 (2003)
42EEJackie Rees, Subhajyoti Bandyopadhyay, Eugene H. Spafford: PFIRES: a policy framework for information security. Commun. ACM 46(7): 101-106 (2003)
41EEBrian D. Carrier, Eugene H. Spafford: Getting Physical with the Digital Investigation Process. IJDE 2(2): (2003)
40 Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni: Using Internal Sensors and Embedded Detectors for Intrusion Detection. Journal of Computer Security 10(1/2): 23-70 (2002)
39EEEugene H. Spafford: The Hidden Meta-Requirements of Security and Privacy. RE 2001: 10
38 Mikhail J. Atallah, K. N. Pantazopoulos, John R. Rice, Eugene H. Spafford: Secure outsourcing of scientific computations. Advances in Computers 54: 216-272 (2001)
37EEJames Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford: Security models for web-based applications. Commun. ACM 44(2): 38-44 (2001)
36EEJames Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford: Digital Government Security Infrastructure Design Challenges. IEEE Computer 34(2): 66-72 (2001)
35 Mahesh V. Tripunitara, Eugene H. Spafford: Connectivity provisioning with security attributes. Software Focus 2(3): 112-116 (2001)
34EEThomas E. Daniels, Eugene H. Spafford: A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. ACSAC 2000: 178-187
33EEEugene H. Spafford, Diego Zamboni: Intrusion detection using autonomous agents. Computer Networks 34(4): 547-570 (2000)
32EEEugene H. Spafford: IC Online: Infosecurity Summit at the White House. IEEE Internet Computing 4(2): 108 (2000)
31EEEugene H. Spafford, Diego Zamboni: New directions for the AAFID architecture. Recent Advances in Intrusion Detection 1999
30 Thomas E. Daniels, Eugene H. Spafford: Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. Journal of Computer Security 7(1): 3-35 (1999)
29EEJ. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni: An Architecture for Intrusion Detection Using Autonomous Agents. ACSAC 1998: 13-24
28EESteve J. Chapin, Eugene H. Spafford: Dissemination of state information in distributed autonomous systems. Computer Communications 21(11): 969-979 (1998)
27EEChristoph L. Schuba, Eugene H. Spafford, Berry Kercheval: Prototyping experiences with classical IP and ARP over signaled ATM connections. Journal of Systems and Software 44(1): 31-43 (1998)
26EEChristoph L. Schuba, Eugene H. Spafford: A Reference Model for Firewall Technology. ACSAC 1997: 133-
25EERichard A. DeMillo, Hsin Pan, Eugene H. Spafford: Failure and Fault Analysis for Software Debugging. COMPSAC 1997: 515-521
24EEMohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr.: Low-threat security patches and tools. ICSM 1997: 306-313
23EEChristoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni: Analysis of a Denial of Service Attack on TCP. IEEE Symposium on Security and Privacy 1997: 208-223
22EEBryn Dole, Steven W. Lodin, Eugene H. Spafford: Misplaced Trust: Kerberos 4 Session Keys. NDSS 1997
21EEIvan Krsul, Eugene H. Spafford: Authorship analysis: identifying the author of a program. Computers & Security 16(3): 233-257 (1997)
20 James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford: Firewalls: An Expert Roundtable. IEEE Software 14(5): 60-66 (1997)
19EERichard A. DeMillo, Hsin Pan, Eugene H. Spafford: Critical Slicing for Software Fault Localization. ISSTA 1996: 121-134
18EEBecky Bace, Gary Christoph, Tsutomu Shimomura, Eugene H. Spafford: Information Superhighway or Road to Ruin? SC 1995
17EEGene H. Kim, Eugene H. Spafford: The Design and Implementation of Tripwire: A File System Integrity Checker. ACM Conference on Computer and Communications Security 1994: 18-29
16 Steve J. Chapin, Eugene H. Spafford: Constructing Distributed Schedulers Using the MESSIAHS Interface Language. HICSS (2) 1994: 425-434
15 Eugene H. Spafford: Computer Viruses as Artificial Life. Artificial Life 1(3): 249-265 (1994)
14EESteve J. Chapin, Eugene H. Spafford: Support for Implementing Scheduling Algorithms Using MESSIAHS. Scientific Programming 3(4): 325-340 (1994)
13EEEugene H. Spafford, Stephen A. Weeber: Software forensics: Can we track code to its authors? Computers & Security 12(6): 585-595 (1993)
12 Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford: Debugging with Dynamic Slicing and Backtracking. Softw., Pract. Exper. 23(6): 589-616 (1993)
11EEEugene H. Spafford: OPUS: Preventing weak password choices. Computers & Security 11(3): 273-278 (1992)
10EEEugene H. Spafford: Are computer hacker break-ins ethical? Journal of Systems and Software 17(1): 41-47 (1992)
9EEHiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford: Dynamic Slicing in the Presence of Unconstrained Pointers. Symposium on Testing, Analysis, and Verification 1991: 60-73
8 Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford: An Execution-Backtracking Approach to Debugging. IEEE Software 8(3): 21-26 (1991)
7EEBrent Auernheimer, Vinton G. Cerf, Susan Estrada, Russ Hobby, Craig Partridge, Eugene H. Spafford, Steven S. Wolff: Networking in the nineties (panel session). SIGCSE 1990: 252
6EEDonald Gotterbarn, Deborah G. Johnson, Keith W. Miller, Eugene H. Spafford: Methods of integrating the study of ethics into the computer science curriculum (panel session). SIGCSE 1990: 268
5 Daniel Farmer, Eugene H. Spafford: The COPS Security Checker System. USENIX Summer 1990: 165-170
4 Charles Koelbel, Eugene H. Spafford, George Leach: Workshop on Experiences with Building Distributed and Multiprocessor Systems. Operating Systems Review 24(2): 2-6 (1990)
3 Eugene H. Spafford: Extending Mutation Testing to Find Environmental Bugs. Softw., Pract. Exper. 20(2): 181-189 (1990)
2 Eugene H. Spafford: The Internet Worm Incident. ESEC 1989: 446-468
1 Eugene H. Spafford: Crisis and Aftermath. Commun. ACM 32(6): 678-687 (1989)

Coauthor Index

1Hiralal Agrawal [8] [9] [12]
2James P. Anderson [20]
3Walid G. Aref [36] [37]
4Mikhail J. Atallah [38]
5Brent Auernheimer [7]
6Becky Bace [18]
7Saurabh Bagchi [51] [57]
8J. S. Balasubramaniyan [29]
9Subhajyoti Bandyopadhyay [42]
10Mohd A. Bashar [24]
11Sheila Brand [20]
12Eric Bryant [44]
13Florian P. Buchholz [47] [55] [56] [59]
14Brian D. Carrier [41] [52] [53]
15Vinton G. Cerf [7]
16Steve J. Chapin [14] [16] [28]
17Gary Christoph [18]
18Thomas E. Daniels [30] [34]
19Richard A. DeMillo [8] [9] [12] [19] [25]
20Bryn Dole [22]
21James P. Early [44]
22Susan Estrada [7]
23Daniel Farmer [5]
24Bingrui Foo [51] [57]
25J. O. Garcia-Fernandez [29]
26Arif Ghafoor [36] [37]
27Li Gong [20]
28Rajeev Gopalakrishna [44] [50]
29Donald Gotterbarn [6]
30Thomas Haigh [20]
31Russ Hobby [7]
32D. Isacoff [29]
33Xuxian Jiang [49] [55] [59]
34Deborah G. Johnson [6]
35James Joshi [36] [37]
36Berry Kercheval [27]
37Florian Kerschbaum [40]
38Gene H. Kim [17]
39Charles Koelbel (Chuck Koelbel) [4]
40Ganesh Krishnan [24]
41Ivan Krsul [21] [23]
42Markus G. Kuhn [23] [24]
43George Leach [4]
44Steven B. Lipner [20]
45Steven W. Lodin [22]
46Teresa F. Lunt [20]
47Yu-Chun Mao [51] [57]
48Keith W. Miller [6]
49Ruth Nelson [20]
50William Neugent [20]
51Hilarie K. Orman [20]
52Hsin Pan [19] [25]
53K. N. Pantazopoulos [38]
54Craig Partridge [7]
55Marcus J. Ranum [20]
56Jackie Rees [42]
57John R. Rice [38]
58Gregory Roth [44]
59Roger R. Schell [20]
60Christoph L. Schuba [23] [26] [27]
61Tsutomu Shimomura [18]
62Barbara B. Simons (Barbara Simons) [43]
63Sean W. Smith [46]
64Aurobindo Sundaram [23]
65Mahesh V. Tripunitara [35]
66Jan Vitek [50]
67Samuel S. Wagstaff Jr. [24]
68Aaron Walters [55] [59]
69Helen J. Wang [49]
70Yi-Min Wang [55] [59]
71Keith Watson [44]
72Stephen A. Weeber [13]
73Paul Williams [44]
74Paul D. Williams [58]
75Steven S. Wolff [7]
76Yu-Sung Wu [51] [57]
77Dongyan Xu [49] [55] [59]
78Scott Yost [44]
79Diego Zamboni [23] [29] [31] [33] [40]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)