Next: Patents
Up: Selected Publications
Previous: Book contributions
Subsections
Refereed contributions
- Eugene H. Spafford; The Internet Worm: Crisis and Aftermath;
COMMUNICATIONS OF THE
ACM; 32(6), pp. 678-687, Jun 1989.
- Reprinted (and translated
into Japanese) in bit (Tokyo); Kyoritsu
Publishing, Co.; Tokyo, Japan; 21(14), pp. 1830-1842, Dec 1989.
- Reprinted as chapter 12 (pp. 223-243) in COMPUTERS
UNDER ATTACK: INTRUDERS, WORMS AND VIRUSES; Peter J. Denning, editor;
ACM Press, New York,
NY; 1990.
- Reprinted in CRIME, DEVIANCE AND THE COMPUTER
(volume in the International Library of Criminology,
Criminal Justice and Penology); R. Hollinger, editor;
Dartmouth Publishing Company; Hampshire, England; to appear in
1997.
- Eugene H. Spafford; Extending Mutation Testing to Find Environmental Bugs;
SOFTWARE PRACTICE & EXPERIENCE, 20(2), pp. 181-189, Feb 1990.
- Hiralal Agrawal, Richard A. DeMillo and Eugene H. Spafford;
An Execution Backtracking Approach to Program Debugging;
IEEE SOFTWARE, pp. 21-26, May 1991.
- Eugene H. Spafford; Are Computer Break-Ins Ethical?;
JOURNAL OF SYSTEMS AND
SOFTWARE; 17(1), pp. 41-48, Jan 1992.
- Reprinted (pp. 125-134) in COMPUERS, ETHICS, & SOCIAL VALUES;
D. G. Johnson and H. Nissenbaum, editors; Prentice-Hall; 1995.
- Reprinted in THE MORAL FOUNDATIONS OF INTELLECTUAL
PROPERTY; Adam D. Moore, editor; 1997.
- Reprinted in COMPUTERS, ETHICS AND SOCIETY; M. David
Ermann, Mary B. Williams, and Michele S. Shauf, eds.; Oxford
University Press; 1997.
- Reprinted in THE ENCYCLOPEDIA OF APPLIED ETHICS; Ruth
Chadwick, editor; pp. 571-577; Academic Press; 1997.
- Reprinted in INTERNET BESEIGED: COUNTERING CYBERSPACE
SCOFFLAWS; Dorothy and Peter Denning, editors; pp. 73-95; Addison-Wesley, 1997.
- Eugene H. Spafford; OPUS: Preventing Weak Password Choices;
COMPUTERS &
SECURITY; 11(3), pp. 273-278, May 1992.
- Hiralal Agrawal, Richard A. DeMillo and Eugene H. Spafford; Debugging with Dynamic Slicing and
Backtracking; SOFTWARE PRACTICE & EXPERIENCE; 23(6), pp. 589-616, June 1993.
- Eugene H. Spafford and Stephen A. Weeber; Software Forensics: Tracking Code to its
Authors; COMPUTERS &
SECURITY; 12(6), pp. 585-595, Dec. 1993.
- Eugene H. Spafford; Computer Viruses as Artificial Life;
JOURNAL OF ARTIFICIAL
LIFE; 1(3), pp. 249-265, 1994.
- Steve J. Chapin and Eugene H. Spafford; Support for Implementing Scheduling Algorithms Using
MESSIAHS; SCIENTIFIC PROGRAMMING; volume 3, pp. 325-340, 1994.
- Ivan Krsul and Eugene H. Spafford; Authorship Analysis: Identifying the Author
of a Program; COMPUTERS &
SECURITY; 16(3), pp. 248-259, 1997.
- Simson Garfinkel and Eugene H. Spafford; Cryptography and the Web; WORLD WIDE WEB
JOURNAL; 2(3), pp. 113-126, Summer 1997.
- Simson Garfinkel and Eugene H. Spafford; Secure CGI/API Programming; WORLD WIDE
WEB JOURNAL; 2(3), pp. 187-200, Summer 1997.
- Steve J. Chapin and Eugene H. Spafford; Dissemination of State Information in
Distributed, Autonomous Systems; COMPUTER COMMUNICATIONS; 21(11), pp. 969-979, Oct 1998.
- Christoph L. Schuba, Berry Kercheval, and Eugene H. Spafford; Prototyping Experiences with Classical IP
and ARP over Signaled ATM Connections; JOURNAL OF SYSTEMS AND
SOFTWARE;
number 44, pp. 31-43, April 1998 .
- Eugene H. Spafford and Chonchanok Viravan; Empirical Studies of Debugging Assistants;
to appear in SOFTWARE PRACTICE & EXPERIENCE; 2000.
- Thomas E. Daniels and Eugene H. Spafford; Identification of Host Audit Data to
Detect Attacks on Low-level IP Vulnerabilities; JOURNAL OF COMPUTER SECURITY; 7(1), pp. 3-35, 1999.
- M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and Eugene H. Spafford; Secure
Outsourcing of Scientific Computations; to appear in ADVANCES IN
COMPUTERS.
- Eugene H. Spafford; Is a Computer Break-in Ever Ethical?; INFORMATION
TECHNOLOGY QUARTERLY; Harvard
Office
of Information Technology; IX(2), pp. 9-14, summer 1990.
- Eugene H. Spafford; The United States vs. Craig Neidorf: A Debate on Electronic
Publishing, Constitutional Rights, and Hacking (commentary on Dorothy
Denning's statement); COMMUNICATIONS OF THE
ACM;
31(3), pp. 36-38, Mar 1991.
- A. B. Tucker, B. H. Barnes,
Robert M. Aiken, K. Barker, Kim B. Bruce, J. T. Cain, S. E. Conry,
G. L. Engel, R. G. Epstein, D. K. Lidtke, Michael C. Mulder, J. B. Rogers,
Eugene H. Spafford, and A. J. Turner; Computing Curricula 1991; COMMUNICATIONS OF THE
ACM;
34(6), pp. 69-84, Jun 1991.
- A. Gargaro, R. Rada, J. Moore, G. S. Carson, J. De Blasi,
D. Emery, C. Haynes, J. Klensin, I. Montanez, and Eugene H. Spafford;
ACM Technical Standards Committee: A New Advocacy Power; COMPUTER STANDARDS & INTERFACES; 16(1994), pp. 139-142, .
- Eugene H. Spafford; UNIX and Security: The Influences of History;
INFORMATION SYSTEMS SECURITY; Auerbach Publications;
4(3), pp. 52-60, Fall 1995.
- Eugene H. Spafford; Hacker Challenges: Boon or Bane?; IEEE CIPHER; IEEE
TCSEC; electronic issue #12; Feb 1996.
- Eugene H. Spafford; System Intrusions and Law Enforcement; the EDP
AUDIT, CONTROL, AND SECURITY NEWSLETTER; volume XXIV, #2; Aug 1996.
- Eugene H. Spafford; One View of a Critical National Need: Support for Information
Security Education and Research; in BRIEFING BEFORE THE
COMMITTEE ON SCIENCE SUBCOMMITTEE ON TECHNOLOGY, U.S. HOUSE OF
REPRESENTATIVES, ONE HUNDRED FIFTH CONGRESS, FIRST SESSION, NO. 1;
U.S. Government Printing Office; pp. 29-38, 11 Feb 1997.
Next: Patents
Up: Selected Publications
Previous: Book contributions
spaf@cerias.purdue.edu (Gene Spafford)
2000-09-18