Fred Cohen
According to our database1,
Fred Cohen
authored at least 43 papers
between 1985 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Proceedings of the Advances in Digital Forensics XI, 2015
2014
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations.
Comput. Secur., 2014
2013
J. Digit. Forensics Secur. Law, 2013
J. Digit. Forensics Secur. Law, 2013
2012
Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media.
J. Digit. Forensics Secur. Law, 2012
J. Digit. Forensics Secur. Law, 2012
J. Digit. Forensics Secur. Law, 2012
J. Digit. Forensics Secur. Law, 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
2011
J. Digit. Forensics Secur. Law, 2011
2010
Int. J. Crit. Infrastructure Prot., 2010
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
2009
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009
Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2003
2001
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen.
Comput. J., 2001
2000
1999
1998
A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID.
Comput. Secur., 1998
1997
Comput. Secur., 1997
Comput. Secur., 1997
1989
1988
Comput. Secur., 1988
Comput. Secur., 1988
1987
Design and protection of an information network under a partial ordering: A case study.
Comput. Secur., 1987
Design and administration of distributed and hierarchical information networks under partial orderings.
Comput. Secur., 1987
Comput. Secur., 1987
1985