Richard Ford

According to our database1, Richard Ford authored at least 50 papers between 1978 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multiple-base Logarithmic Quantization and Application in Reduced Precision AI Computations.
Proceedings of the 31st IEEE Symposium on Computer Arithmetic, 2024

2016
I'm not sure if we're okay: uncertainty for attackers and defenders.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

2015
Value-Added Results for Public Virtual Schools in California.
J. Educ. Technol. Soc., 2015

2014
Protecting Me.
IEEE Secur. Priv., 2014

Moving-Target Defenses for Computer Networks.
IEEE Secur. Priv., 2014

Heartbleed 101.
IEEE Secur. Priv., 2014

Bacterial quorum sensing for coordination of targeted malware.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

2013
Authorship Is Continuous: Managing Code Plagiarism.
IEEE Secur. Priv., 2013

2012
Detecting Emulated Environments.
Int. J. Softw. Eng. Knowl. Eng., 2012

All your base are belong to US.
Proceedings of the New Security Paradigms Workshop, 2012

NextVC2 - A next generation virtual world command and control.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
Resilience is more than availability.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Results-oriented security.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

2010
Building a Better Boot Camp.
IEEE Secur. Priv., 2010

Proactive reputation-based defense for MANETs using radial basis function neural networks.
Proceedings of the International Joint Conference on Neural Networks, 2010

2009
Danger theory and collaborative filtering in MANETs.
J. Comput. Virol., 2009

Malware Shall Greatly Increase ....
IEEE Secur. Priv., 2009

Evaluating Security Products with Clinical Trials.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

Generic Danger Detection for Mission Continuity.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Reputation Prediction in Mobile Ad Hoc Networks Using RBF Neural Networks.
Proceedings of the Engineering Applications of Neural Networks, 2009

Security in MANETs using reputation-adjusted routing.
Proceedings of the Data Mining, 2009

2008
Probabilistic suffix models for API sequence analysis of Windows XP applications.
Pattern Recognit., 2008

A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Inf. Secur. J. A Glob. Perspect., 2008

Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

Towards an ethical code for information security?
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

Securing MANETs with BITSI: danger theory and mission continuity.
Proceedings of the Data Mining, 2008

2007
How good is good enough? Metrics for worm/anti-worm evaluation.
J. Comput. Virol., 2007

Open vs. closed: which source is more secure?
ACM Queue, 2007

How Not to Be Seen.
IEEE Secur. Priv., 2007

How Not to Be Seen II: The Defenders Fight Back.
IEEE Secur. Priv., 2007

Network Distribution of Security Policies via Ant-like Foraging Behavior.
Proceedings of the International Conference on Internet and Web Applications and Services (ICIW 2007), 2007

Modeling malcode with Hephaestus: beyond simple spread.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
On the definition and classification of cybercrime.
J. Comput. Virol., 2006

How to Think about Security.
IEEE Secur. Priv., 2006

Predation and the cost of replication: New approaches to malware prevention?
Comput. Secur., 2006

Cent, five cent, ten cent, dollar: hitting botnets where it <i>really</i> hurts.
Proceedings of the New Security Paradigms Workshop 2006, 2006

2005
Suppressing the Spread of Email Malcode using Short-term Message Recall.
J. Comput. Virol., 2005

Malcode Mysteries Revealed.
IEEE Secur. Priv., 2005

Swarming computer security: an experiment in policy distribution.
Proceedings of the 2005 IEEE Swarm Intelligence Symposium, 2005

Internet instability and disturbance: goal or menace?
Proceedings of the New Security Paradigms Workshop 2005, 2005

Highlights from the 2005 New Security Paradigms Workshop.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Perfect Storm: The Insider, Naivety, and Hostility.
ACM Queue, 2004

The future of virus detection.
Inf. Secur. Tech. Rep., 2004

The Wrong Stuff?
IEEE Secur. Priv., 2004

2002
Cyberterrorism?
Comput. Secur., 2002

1999
No suprises in Melissa Land.
Comput. Secur., 1999

Malware: Troy revisited.
Comput. Secur., 1999

1998
May you live in interesting times.
Comput. Secur., 1998

What a littledefinution can do.
Comput. Secur., 1998

1978
Evolution of a teleprocessing network.
Comput. Commun., 1978


  Loading...