Improving security using deception

Mohammed H Almeshekah , Eugene H Spafford , Mikhail J Atallah
Center for Education and Research Information Assurance and Security, Purdue University, Tech. Rep. CERIAS Tech Report 13 2013 -2013

44
2013
Incentive alignment and risk perception: an information security application

Fariborz Farahmand , Mikhail J Atallah , Eugene H Spafford
IEEE Transactions on Engineering Management 60 ( 2) 238 -246

21
2012
Secure computational outsourcing techniques

Mikhail J Atallah , John R Rice , Eugene H Spafford , Kostas N Pantazopoulos

8
2005
Enhancing passwords security using deceptive covert communication

Mohammed H Almeshekah , Mikhail J Atallah , Eugene H Spafford
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings 30 159 -173

7
2015
Defending against Password Exposure using Deceptive Covert Communication

Mohammed H Almeshekah , Mikhail J Atallah , Eugene H Spafford
International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) 1 -7

1
2015
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage

H Mohammed , Christopher N Gutierrez , Mikhail J Atallah , Eugene H Spafford

International Workshop on Web Intelligence for Information Security (WIIS 2011)

Julia M Taylor , Victor Raskin , Eugene H Spafford , Mikhail J Atallah

A pattern-matching model for instrusion detection

Sandeep Kumar , Eugene H Spafford
Proceedings of the 17th National Computer Security Conference (NCSC’94) 11 -21

743
Intrusion detection using autonomous agents

Eugene H Spafford , Diego Zamboni
Computer Networks 34 ( 4) 547 -570

648
2000
Crisis and aftermath

Eugene H Spafford
Computers under attack: Intruders, worms, and viruses 223 -243

413
1990
An event-based digital forensic investigation framework

Brian Carrier , Eugene H Spafford
Digital forensic research workshop 11 -13

388
2004
Defending a computer system using autonomous agents

Mark Crosbie , Eugene H Spafford

319
1995
Opus: Preventing weak password choices

Eugene H Spafford
Computers & Security 11 ( 3) 273 -278

289
1992
Preventing weak password choices

Eugene H Spafford
Proceedings of the 14th National Computer Security Conference 446 -455

289
1991
Authorship analysis: Identifying the author of a program

Ivan Krsul , Eugene H Spafford
Computers & Security 16 ( 3) 233 -257

213
1997
Network protection for denial of service attacks

Christoph L Schuba , Ivan V Krsul , Diego Zamboni , Eugene H Spafford

151
2004
The Internet worm incident

Eugene H Spafford
Proc. ESEC 89

144
1991
Are Computer Hacker Break-ins Ethical?

Eugene H Spafford
Routledge 293 -299

114
2017
Heuristics for automatic localization of software faults

Hsin Pan , Eugene H Spafford
World Wide Web

88
1992