Eugene H. Spafford
Orcid: 0000-0002-5555-8330Affiliations:
- Purdue University, West Lafayette, USA
According to our database1,
Eugene H. Spafford
authored at least 119 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 1998, "For continuing scholarship and community service in promoting computing technology and networks, with particular emphasis on issues of security, ethics, safety, and responsible use.".
IEEE Fellow
IEEE Fellow 2001, "For leadership and contributions in the field of information security.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on acm.org
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2023
2022
2021
Proceedings of the IEEE Frontiers in Education Conference, 2021
2020
2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
2016
ACM Trans. Priv. Secur., 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
An interview with Gene Spafford on balancing breadth and depth in cybersecurity education.
Inroads, 2014
Int. J. Cyber Warf. Terror., 2014
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014
2013
IEEE Trans. Engineering Management, 2013
J. Comput. High. Educ., 2013
Inf. Syst. Frontiers, 2013
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication.
Proceedings of the Security Protocols XXI, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
2012
Secur. Commun. Networks, 2012
2011
Proceedings of the Encyclopedia of Information Assurance, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Softw. Pract. Exp., 2010
2009
A distributed requirements management framework for legal compliance and accountability.
Comput. Secur., 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
2008
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach.
IEEE Trans. Parallel Distributed Syst., 2008
Proceedings of the Protecting Persons While Protecting the People, 2008
2007
Comput. Networks, 2007
CuPIDS: An exploration of highly focused, co-processor-based information system protection.
Comput. Networks, 2007
2006
Categories of digital investigation analysis techniques based on the computer history model.
Digit. Investig., 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005
2004
IEEE Secur. Priv., 2004
Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, 2004
2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
Practical Unix and internet security - securing Solaris, Mac OS X, Linux and FreeBSD: extensivley revised (3. ed.).
O'Reilly, ISBN: 978-0-596-00323-4, 2003
2002
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002
J. Comput. Secur., 2002
2001
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001
2000
Proceedings of the 2000 Workshop on New Security Paradigms, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
J. Comput. Secur., 1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
1998
J. Syst. Softw., 1998
Comput. Commun., 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Secure CGI/API programming.
World Wide Web J., 1997
Cryptography and the Web.
World Wide Web J., 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the Network and Distributed System Security Symposium, 1997
Proceedings of the 1997 International Conference on Software Maintenance (ICSM '97), 1997
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Web security and commerce - risks, technologies, and strategies.
O'Reilly, ISBN: 978-1-56592-269-3, 1997
1996
Proceedings of the 1996 International Symposium on Software Testing and Analysis, 1996
Practical UNIX and internet security (2. ed.).
O'Reilly, ISBN: 978-1-56592-148-1, 1996
1995
Proceedings of the Proceedings Supercomputing '95, San Diego, CA, USA, December 4-8, 1995, 1995
1994
Proceedings of the USENIX Applications Development Symposium Proceedings 1994, 1994
Constructing Distributed Schedulers Using the MESSIAHS Interface Language.
Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), 1994
Proceedings of the CCS '94, 1994
1993
1992
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
1991
Proceedings of the Symposium on Testing, Analysis, and Verification, 1991
1990
ACM SIGSOFT Softw. Eng. Notes, 1990
ACM SIGOPS Oper. Syst. Rev., 1990
Workshop report: workshop on experiences with building distributed and multiprocessor systems.
Comput. Commun. Rev., 1990
The COPS Security Checker System.
Proceedings of the Usenix Summer 1990 Technical Conference, 1990
Methods of integrating the study of ethics into the computer science curriculum (panel session).
Proceedings of the 21st SIGCSE Technical Symposium on Computer Science Education, 1990
Proceedings of the 21st SIGCSE Technical Symposium on Computer Science Education, 1990
1989