default search action
Fred Cohen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c7]Fred Cohen:
A Tale of Two Traces - Diplomatics and Forensics. IFIP Int. Conf. Digital Forensics 2015: 3-27 - 2014
- [j36]Fred Cohen, Don Cohen:
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations. Comput. Secur. 45: 293-304 (2014) - 2013
- [j35]Fred Cohen:
Science Column: Measuring Inconsistency Methods for Evidentiary Value. J. Digit. Forensics Secur. Law 8(1): 7-16 (2013) - [j34]Fred Cohen:
Science Column: Reconstruction: The Experimental Side of Digital Forensics. J. Digit. Forensics Secur. Law 8(4): 49-56 (2013) - 2012
- [j33]Fred Cohen:
Column: The Physics of Digital Information-Part 2. J. Digit. Forensics Secur. Law 7(1): 7-14 (2012) - [j32]Fred Cohen:
Identifying and Attributing Similar Traces with Greatest Common Factor Analysis. J. Digit. Forensics Secur. Law 7(2): 89-112 (2012) - [j31]Fred Cohen:
Column: The Science of Digital Forensics: Analysis of Digital Traces. J. Digit. Forensics Secur. Law 7(3): 5-12 (2012) - [j30]Fred Cohen:
Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media. J. Digit. Forensics Secur. Law 7(4): 7-20 (2012) - [c6]Fred Cohen:
Forensic Methods for Detecting Insider Turning Behaviors. IEEE Symposium on Security and Privacy Workshops 2012: 150-158 - 2011
- [j29]Fred Cohen:
Column: Putting the Science in Digital Forensics. J. Digit. Forensics Secur. Law 6(1): 7-14 (2011) - [j28]Fred Cohen:
A Case Study in Forensic Analysis of Control. J. Digit. Forensics Secur. Law 6(1): 37-54 (2011) - [j27]Fred Cohen:
Column: The Physics of Digital Information. J. Digit. Forensics Secur. Law 6(3): 11-16 (2011) - 2010
- [j26]Fred Cohen:
A method for forensic analysis of control. Comput. Secur. 29(8): 891-902 (2010) - [j25]Fred Cohen:
The Smarter Grid. IEEE Secur. Priv. 8(1): 60-63 (2010) - [j24]Fred Cohen:
The Virtualization Solution. IEEE Secur. Priv. 8(3): 60-63 (2010) - [j23]Fred Cohen:
Automated Control System Security. IEEE Secur. Priv. 8(5): 62-63 (2010) - [j22]Fred Cohen:
What makes critical infrastructures Critical? Int. J. Crit. Infrastructure Prot. 3(2): 53-54 (2010) - [c5]Fred Cohen:
Toward a Science of Digital Forensic Evidence Examination. IFIP Int. Conf. Digital Forensics 2010: 17-35 - [c4]Fred Cohen:
Fonts for Forensics. SADFE 2010: 3-12
2000 – 2009
- 2009
- [c3]Fred Cohen:
Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images. COMPSAC (2) 2009: 386-391 - [c2]Fred Cohen:
Bulk Email Forensics. IFIP Int. Conf. Digital Forensics 2009: 51-67 - [c1]Fred Cohen:
Two Models of Digital Forensic Examination. SADFE 2009: 42-53 - 2003
- [j21]Fred Cohen, Deanna Koike:
Leading attackers through attack graphs with deceptions. Comput. Secur. 22(5): 402-411 (2003) - 2001
- [j20]Fred Cohen:
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen. Comput. J. 44(4): 326-327 (2001) - 2000
- [j19]Fred Cohen:
A Mathematical Structure of Simple Defensive Network Deception. Comput. Secur. 19(6): 520-528 (2000)
1990 – 1999
- 1999
- [j18]Fred Cohen:
Simulating cyber attacks, defences, and consequences. Comput. Secur. 18(6): 479-518 (1999) - 1998
- [j17]Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler:
A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. Comput. Secur. 17(3): 211-221 (1998) - [j16]Fred Cohen:
A note on the role of deception in information protection. Comput. Secur. 17(6): 483-506 (1998) - 1997
- [j15]Fred Cohen:
Information system attacks: A preliminary classification scheme. Comput. Secur. 16(1): 29-46 (1997) - [j14]Fred Cohen:
Information system defences: A preliminary classification scheme. Comput. Secur. 16(2): 94-114 (1997)
1980 – 1989
- 1989
- [j13]Fred Cohen:
Models of practical defenses against computer viruses. Comput. Secur. 8(2): 149-160 (1989) - [j12]Fred Cohen:
Computational aspects of computer viruses. Comput. Secur. 8(4): 297-298 (1989) - 1988
- [j11]Fred Cohen:
On the implications of computer viruses and methods of defense. Comput. Secur. 7(2): 167-184 (1988) - [j10]Fred Cohen:
Designing provably correct information networks with digital diodes. Comput. Secur. 7(3): 279-286 (1988) - [j9]Fred Cohen, Stephen Bruhns:
Two secure file servers. Comput. Secur. 7(4): 409-414 (1988) - [j8]Fred Cohen:
Maintaining a poor person's information integrity. Comput. Secur. 7(5): 489-494 (1988) - [j7]Yue Jiang Huang, Fred Cohen:
Some weak points of one fast cryptographic checksum algorithm and its improvement. Comput. Secur. 7(5): 503-505 (1988) - 1987
- [j6]Fred Cohen:
Computer viruses: Theory and experiments. Comput. Secur. 6(1): 22-35 (1987) - [j5]Fred Cohen:
Protection and administration of information networks with partial orderings. Comput. Secur. 6(2): 118-128 (1987) - [j4]Fred Cohen:
Design and administration of distributed and hierarchical information networks under partial orderings. Comput. Secur. 6(3): 219-228 (1987) - [j3]Fred Cohen:
Design and protection of an information network under a partial ordering: A case study. Comput. Secur. 6(4): 332-338 (1987) - [j2]Fred Cohen:
A cryptographic checksum for integrity protection. Comput. Secur. 6(6): 505-510 (1987) - 1985
- [j1]Fred Cohen:
A secure computer network design. Comput. Secur. 4(3): 189-205 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-04 03:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint