An architecture for intrusion detection using autonomous agents

J.S. Balasubramaniyan , J.O. Garcia-Fernandez , D. Isacoff , E. Spafford
annual computer security applications conference 13 -24

508
1998
Misplaced trust: Kerberos 4 session keys

B. Dole , S. Lodin , E. Spafford
network and distributed system security symposium 60 -70

16
1997
ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment

Bingrui Foo , Yu-Sung Wu , Yu-Chun Mao , S. Bagchi
dependable systems and networks 508 -517

209
2005
Web 2.0 – A complex balancing act: The first global study on Web 2.0 usage, risks and best practices

L. G. Kisselburgh , M. Vorvoreanu , E. Spafford
McAfee Corporation

2010
Web 2.0 – A complex balancing act: Usage and risks in Asia

L.G. Kisselburgh , M. Vorvoreanu , E. Spafford , P. Rao
Proceedings of the 2010 Chinese Communication Association Convention and the Fourth Global Communication Forum 72 -75

2010
Constructing distributed schedulers using the MESSIAHS interface language

Chapin , Spafford
hawaii international conference on system sciences 2 425 -434

1994
The clouds project: Design and implementation of a fault-tolerant distributed operating system

P Dasgupta , R LeBlanc , E Spafford
Tech. Rep. GIT-ICS-85/29, Georgia Institute of Technology

18
1985
New directions for the AAPHID architecture

D Zamboni , E Spafford
Recent Advances in Intrusion Detection

17
1999
Vulnerability likelihood: A probabilistic approach to software assurance

Rajeev Gopalakrishna , E Spafford , Jan Vitek
CERIAS, Purdue Univeristy, Tech. Rep 6 2005 -2005

14
2005
Report of the ACM/IEEE CS Joint Curriculum Task Force: Computing Curricula 1991

A Tucker , B Barnes , R Aiken , K Barker
ACM Press and IEEE-CS Press, New York

14
1991
Policy Framework for interpreting risk in eCommerce security

J Rees , S Bandyopadhayay , E Spafford
Communications of the ACM 46 ( 7)

3
2003
Aspects for run-time component integration

JS Balasubramaniyan , JO Garcia-Fernandez , D Isacoff , E Spafford
Proceedings of the 14th Annual Computer Security Applications Conference 13 -24

2
1998
An analysis of some vulnerabilities related to TCP/IP

T Daniels , I Krsul , E Spafford , M Tripunitara
preparation

2
1998
Intrusion detection, tripwire, etc

E Spafford
URL “www. geek girl. com/ids/1995/0314. html

2
Some Musings from the Event Horizon

E Spafford
PROCEEDINGS OF COMPSEC INTERNATIONAL 572 -572

1999
1998
How to Tell if Management is Serious About Information Security

E Spafford
PROCEEDINGS OF COMPSEC INTERNATIONAL 141 -141

1998
ON HIRING HACKERS

E Spafford
Communications of the ACM 33 ( 10) 14 -14

1990