F. Cohen, "Challenges to Digital Forensic Evidence", (one chapter in "Digital Forensics", Thomas A. Johnson, Ed. 2006
F. Cohen, ``30 Lies About Secure Electronic Commerce: The Truth Exposed'', Institute for International Research Electronic Commerce Conference, Feb. 1999.
F. Cohen, `` Simulating Cyber Attacks, Defenses, and Consequences'', Computers and Security, 1999.
F. Cohen, Cynthia Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler, and Eli Dart ``A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on That Model'', Encyclopedia of Computer Science, 1999.
F. Cohen, "National Info-Sec Technical Baseline - Intrusion Detection and Response" National InfoSec Research Council, December, 1996., also appearing in Computers and Security, 1997.
F. Cohen, ``A Note on Distributed Coordinated Attacks'', IFIP-TC11, `Computers and Security', Feb. 1996, also appearing as an invited paper in 4th Computer Misuse and Anomaly Detection Workshop, Monterey, 1996.
F. Cohen, ``The Internet, ..., and Information Security'', Computer Society of South Africa, 7th Annual Conference, August, 1995, South Africa.
F. Cohen, ``The Internet, Corporate Networks, and Firewalls'', Computer Society of South Africa, 7th Annual Conference, August, 1995, South Africa.
F. Cohen, ``Information Assurance'', IFIP TC-11 World Congress, May, 1995, Cape Town, South Africa.
F. Cohen, ```Information Warfare Considerations'', Norwegian Academy of Sciences, September, 1993.
F. Cohen, "Computer Viruses", (one chapter in "The Computer Security Reference Book", Butterworth/Heinemann, Oxford, England, 2004.
F. Cohen, ``Fault Tolerant Software for Computer Virus Defense'', November, 1991.
F. Cohen, ``Some Applications of Benevolent Viruses in Networked Computing Environments'', `DPMA, IEEE, ACM Computer Virus and Security Conference', March 1993
F. Cohen and S. Mishra, ``Some Initial Results From the QUT Virus Research Network'', `The Virus Bulletin Conference', Edinburgh, Scotland, July, 1992 (keynote).
F. Cohen, ``Computer Viruses'', (one chapter in ``The Computer Security Reference Book'' Butterworth/Heinemann (1992), Oxford, England
F. Cohen, ``Current Trends in Computer Viruses'', Invited Paper, International Symposium on Information Security, Oct. 17-18, 1991, Tokyo, Japan
F. Cohen, ``Current Best Practice Against Computer Viruses'', Invited Paper, 1991, 25th IEEE International Carnahan Conference on Security Technology, Oct. 1-3, 1991, Taiwan ROC.
F. Cohen, ``Exploiting Defense-In-Depth Against Computer Viruses'', Invited Paper, The Oxbridge Sessions, Sept. 3-5, 1991, The Netherlands.
F. Cohen, ``Computers Under Attack'' (one paper), ACM/Addison Wesley (1990)
F. Cohen, ``A Summary of Results on Computer Viruses and Defenses'', Invited Paper, 1990 NIST/DOD Conference on Computer Security.
F. Cohen, ``Integrity Maintenance in Untrusted Computing Environments'', Invited Paper, IBC Computer Virus Conference, London, 1990.
F. Cohen, ``Information Systems as a Competitive Weapon'', Keynote Address, Utah State School of Business, Annual Computer Conference, March 1-2, 1990.
F. Cohen, ``Recent Advances in Integrity Maintenance in Untrusted Systems'', Invited Paper, The Netherlands Computer Security Seminar, April 10-12, 1990.
F. Cohen, ``A Note on the use of Pattern Matching in Computer Virus Detection'', Invited Paper, Computer Security Conference, London, England, Oct 11-13, 1989, also appearing in DPMA, IEEE, ACM Computer Virus Clinic, 1990.
F. Cohen, ``Computer Viruses - Attacks and Defensive Measures'', London Corporate Computer Security Conference - Keynote Address, London, England, Feb. 14, 1989.
F. Cohen, ``Current Trends in Computer Virus Research'', 2nd Annual Invited Symposium on Computer Viruses - Keynote Address, Oct. 10, 1988. New York, NY
F. Cohen, ``Recovery Techniques in Computer Virus Attack'', Invited Paper, Invitational Conference on Computer Viruses, 1988.
F. Cohen, et. al. ``Leading Attackers Through Attack Graphs with Deceptions'', IFIP-TC11, `Computers and Security', submitted 2002
F. Cohen, et. al. ``Red Teaming Experiments with Deception Technologies'', IFIP-TC11, `Computers and Security', submitted 2001
F. Cohen, et. al. ``A Framework for Deception'', IFIP-TC11, `Computers and Security', submitted 2001
F. Cohen, et. al. ``A Mathematical Structure of Simple Defensive Network Deceptions'', IFIP-TC11, `Computers and Security', submitted 1999
F. Cohen, ``Simulating Cyber Attacks, Defenses, and Consequences'', IFIP-TC11, `Computers and Security', 2000
F. Cohen, et. al. ``Intrusion Detection and Response'', IFIP-TC11, `Computers and Security', 1998
F. Cohen, ``Protecting Need-to-know in Distributed Computing Environments'', IFIP-TC11, `Computers and Security', 1997
F. Cohen, ``Providing for Responsibility in a Global Information Infrastructure'', IFIP-TC11, `Computers and Security', 1997
F. Cohen, ``A Note on Detecting Tampering with Audit Trails'', IFIP-TC11, `Computers and Security', 1996
F. Cohen, ``Process Audit for Near-Real-Time Intrusion Detection'', IFIP-TC11, `Computers and Security', 1996
F. Cohen, ``A Secure World-Wide-Web Server'', IFIP-TC11, `Computers and Security', 1995
F. Cohen and S. Mishra, ``Experiments on the Impact of Computer Viruses on Modern Computer Networks'', IFIP-TC11 `Computers and Security' (1994)
F. Cohen, ``Operating Systems Protection Through Program Evolution'', IFIP-TC11 `Computers and Security' (1994)
J. Voas, J. Payne, F. Cohen ``A Model for Detecting the Existence of Software Corruption in Real-Time'', IFIP-TC11 ``Computers and Security'', V12#3 May, 1993 pp275-283.
F. Cohen, ``A Formal Definition of Computer Worms and Some Related Results'', IFIP-TC11 ``Computers and Security'' V11#7, November, 1992, pp641-652.
F. Cohen, ``Defense-In-Depth Against Computer Viruses'', IFIP-TC11 ``Computers and Security'', V11#2?, 1992.
F. Cohen, ``A DOS Based POset Implementation'', IFIP-TC11 ``Computers and Security'', V10#6, October 1991.
F. Cohen, ``A Note On High Integrity PC Bootstrapping'', IFIP-TC11 ``Computers and Security'', V10#6, October 1991.
F. Cohen, ``A Cost Analysis of Typical Computer Viruses and Defenses'', IFIP-TC11 ``Computers and Security'', V10#3, May, 1991 (also appearing in 4th DPMA, IEEE, ACM Computer Virus and Security Conference, 1991)
F. Cohen, ``Automated Integrity Maintenance for Viral Defense'', IFIP-TC11 ``Computers and Security'', 1990
F. Cohen, ``Computational Aspects of Computer Viruses'', IFIP-TC11, ``Computers and Security'', V8 pp325-344, 1989.
Y. J. Huang and F. Cohen, ``Some Weak Points of One Fast Cryptographic Checksum Algorithm and its Improvement'', IFIP-TC11 ``Computers and Security'', V8#1, February, 1989
B. Cohen and F. Cohen, ``Error Prevention at a Radon Measurement Service Laboratory'', Radiation Protection Management, V6#1, pp43-47, Jan. 1989
F. Cohen, ``Models of Practical Defenses Against Computer Viruses'', IFIP-TC11, ``Computers and Security'', V7#6, December, 1988.
F. Cohen, ``Two Secure Network File Servers'', IFIP-TC11, ``Computers and Security'', V7#4, August, 1988.
F. Cohen, ``Designing Provably Correct Information Networks with Digital Diodes'', IFIP-TC11, ``Computers and Security'', V7#3, June, 1988.
F. Cohen, ``On the Implications of Computer Viruses and Methods of Defense'', Invited Paper, IFIP-TC11, ``Computers and Security'', V7#2, April, 1988,
F. Cohen, ``Maintaining a Poor Person's Information Integrity'', IFIP-TC11, ``Computers and Security'', V7#1, Feb 1988.
F. Cohen, ``A Cryptographic Checksum for Integrity Protection'', IFIP-TC11 ``Computers and Security'', V6#6 (Dec. 1987), pp 505-810.
F. Cohen, ``Design and Protection of an Information Network Under a Partial Ordering: A Case Study'', IFIP-TC11, ``Computers and Security'', V6#4 (Aug. 1987) pp 332-338.
F. Cohen, ``Design and Administration of Distributed and Hierarchical Information Networks Under Partial Orderings'', IFIP-TC11, ``Computers and Security'', V6#3 (June 1987), pp 219-228.
F. Cohen, ``Protection and Administration of Information Networks with Partial Orderings'', IFIP-TC11, ``Computers and Security'', V6#2 (April 1987) pp 118-128.
F. Cohen, ``Computer Viruses - Theory and Experiments'', DOD/NBS 7th Conference on Computer Security, originally appearing in IFIP-sec 84, also appearing as invited paper in IFIP-TC11, ``Computers and Security'', V6#1 (Jan. 1987), pp 22-35 and other publications in several languages.
F. Cohen, ``A Secure Computer Network Design'', IFIP-TC11, ``Computers and Security'', V4#3, (Sept. 1985), pp 189-205, also appearing in AFCEA Symp. and Expo. on Physical and Electronic Security, Aug. 1985.
F. Cohen, ``Algorithmic Authentication of Identification'', Information Age, V7#1 (Jan. 1985), pp 35-41.
Deception Wall (patent pending)
Invisible Router (2 patents pending)
Execution Wrappers (2 patents pending)
Operating System Deceptions (2 patents pending)
The Provisional Irish Republican Army - 2000
The Animal Liberation Front (ALF) - 2000
Revolutionary Armed Forces of Colombia (FARC) - 2000
National Liberation Army (ELN)--Colombia - 2000
Issues in Cyber-Terrorism - 2000
F. Cohen, ''Managing Network Security Nov., 2002 - Breaking In... to test security?
F. Cohen, ''Managing Network Security Oct., 2002 - Reworking Your Firewalls
F. Cohen, ''Managing Network Security Sept, 2002 - Deception Rising
F. Cohen, ''Managing Network Security Aug, 2002 - You're in a Bind!
F. Cohen, ''Managing Network Security July, 2002 - Smashed Again by Stupid Security (appears in Computer Fraus and Security Bulletin)
F. Cohen, ''Managing Network Security July, 2002 - Is Open Source More or Less Secure?
F. Cohen, ''Managing Network Security June, 2002 - Academia's Vital Role in Information Protection
F. Cohen, ''Managing Network Security May, 2002 - Terrorism and Cyberspace
F. Cohen, ''Managing Network Security April, 2002 - Misimpressions We Need to Extinguish
F. Cohen, ''Managing Network Security March, 2002 - Embedded Security
F. Cohen, ''Managing Network Security February, 2002 - How to Get Around Your ISP
F. Cohen, ''Managing Network Security January, 2002 - The End of the Internet as we Know it
F. Cohen, '' 2001: Red Teaming Experiments with Deception Technologies''
F. Cohen, '' 2001: A Framework for Deception''
F. Cohen, ''Managing Network Security - The World Doesn't Want to be Fixed'', Network Security, Dec., 2001.
F. Cohen, ''Managing Network Security - The Deception Defense'', Network Security, Nov., 2001.
F. Cohen, ''Managing Network Security - The DMCA '', Network Security, Oct., 2001.
F. Cohen, ''Managing Network Security - The Best Security Book Ever Written '', Network Security, Sep., 2001.
F. Cohen, ''Managing Network Security - Special Issue - The Balancing Act '', Network Security, Sep., 2001.
F. Cohen, ''Managing Network Security - Bootable CDs'', Network Security, Aug., 2001.
F. Cohen, ''Managing Network Security - A Matter of Power'', Network Security, Jul., 2001.
F. Cohen, ''Managing Network Security - The Wireless Revolution'', Network Security, Jun., 2001.
F. Cohen, ''Managing Network Security - The New Cyber Gang - A Real Threat Profile '', Network Security, May., 2001.
F. Cohen, ''Managing Network Security - To Prosecute or Not to Prosecute'', Network Security, Apr., 2001.
F. Cohen, ''Managing Network Security - Corporate Security Intelligence'', Network Security, Mar., 2001.
F. Cohen, ''Managing Network Security - Testing Your Security by Breaking In - NOT '', Network Security, Feb., 2001.
F. Cohen, ''Managing Network Security - Marketing Hyperbole at its Finest'', Network Security, Jan., 2001.
F. Cohen, '' The Structure of Intrusion and Intrusion Detection , Computers and Security, submitted May, 2000.
F. Cohen, '' A Mathematical Structure of Simple Defensive Network Deceptions, Computers and Security, submitted May, 2000.
F. Cohen, ''Managing Network Security - The Millennium Article - Yet Again! - The Bots are Coming!!! The Bots are Coming!!!'', Network Security, Dec., 2000.
F. Cohen, ''Managing Network Security - Why Everything Keeps Failing'', Network Security, Nov., 2000.
F. Cohen, ''Managing Network Security - The Threat'', Network Security, Oct., 2000.
F. Cohen, ''Managing Network Security - Chipping '', Network Security, Sep., 2000.
F. Cohen, ''Managing Network Security - Understanding Viruses Bio-logically'', Network Security, Aug., 2000.
F. Cohen, ''Managing Network Security - What does it do behind your back?'', Network Security, Jul., 2000.
F. Cohen, ''Managing Network Security - Why Can't We Do DNS Right?'', Network Security, June, 2000.
F. Cohen, ''Managing Network Security - Eliminating IP Address Forgery - 5 Years Old and Going Strong '', Network Security, May, 2000.
F. Cohen, ''Managing Network Security - Countering DCAs'', Network Security, Apr., 2000.
F. Cohen, ''Managing Network Security - Collaborative Defense'', Network Security, Mar., 2000.
F. Cohen, ''Managing Network Security - Worker Monitoring '', Network Security, Feb., 2000.
F. Cohen, ''Managing Network Security - Digital Forensics '', Network Security, Jan., 2000.
F. Cohen, ''Managing Network Security - Why it was done that way'', Network Security, Dec., 1999.
F. Cohen, `` So Much Evidence... So Little Time'', Information Security Magazine, November. 1999. Special issue with articles by "The 20 Most Influential Figures in Information Security Today."
F. Cohen, ``50 Ways to Defeat Your PKI and Other Cryptosystems'', The 50 Ways Series at all.net. (/journal/50/index.html)
F. Cohen, ``50 Ways to Defeat Your Firewall'', The 50 Ways Series at all.net. (/journal/50/index.html)
F. Cohen, ''Managing Network Security - The Limits of Cryptography'', Network Security, Nov., 1999.
F. Cohen, ''Managing Network Security - Security Education in the Information Age'', Network Security, Oct., 1999.
F. Cohen, ''Managing Network Security - In Your Face Information Warfare'', Network Security, Sep., 1999.
F. Cohen, ''Managing Network Security - What's Happening Out There'', Network Security, Aug., 1999.
F. Cohen, ''Managing Network Security - Attack and Defense Strategies'', Network Security, July, 1999.
F. Cohen, ''Managing Network Security - The Limits of Awareness'', Network Security, June, 1999.
F. Cohen, ''Managing Network Security - Watching the World '', Network Security, May, 1999.
F. Cohen, ''Managing Network Security - Simulating Network Security '', Network Security, Apr., 1999.
F. Cohen, ''Managing Network Security - The Milisecond Fantasy'', Network Security, Mar., 1999.
F. Cohen, ``At the Intersection of Security, Networking, and Management'', Computers and Security (submitted 1999).
F. Cohen, ``An Automated, Dynamic, Flexible, Distributed, Scalable Network Defense'', Computers and Security (submitted 1999).
F. Cohen, Eli Dart ``DARE: Distributed Analysis and REsponse'', SANS conference, San Diego, 1999.
F. Cohen, ''Managing Network Security - Returning Fire'', Network Security, Feb., 1999.
F. Cohen, ''Managing Network Security - Anatomy of a Successful Sophistocated Attack'', Network Security, Jan., 1999.
F. Cohen, ``A Note on the Role of Deception in Information Protection'', Computers and Security 1998.
F. Cohen, ''Managing Network Security - Balancing Risk'', Network Security, Dec., 1998.
F. Cohen, ''Managing Network Security - The Real Y2K Issue?'', Network Security, Nov., 1998.
F. Cohen, ''Managing Network Security - Time-Based Security?'', Network Security, Oct., 1998.
F. Cohen, ''Managing Network Security - What Should I Report to Whom?'', Network Security, Sep., 1998.
F. Cohen, ''Managing Network Security - Third Anniversary Article - The Seedy Side of Security'', Network Security, Aug., 1998.
F. Cohen, ''Managing Network Security - How Does a Typical IT Audit Work?'', Network Security, Jul., 1998.
F. Cohen, ''Managing Network Security - Technical Protection for the Joint Venture'', Network Security, Jun., 1998.
F. Cohen, ''Managing Network Security - Risk Staging'', Network Security, May., 1998.
F. Cohen, ''Managing Network Security - The Unpredictability Defense'', Network Security, Apr., 1998.
F. Cohen, ''Managing Network Security - Red Teaming'', Network Security, Mar., 1998.
F. Cohen, ''Managing Network Security - The Management of Fear'', Network Security, Feb., 1998.
F. Cohen, ''Managing Network Security - Y2K - Alternative Solutions'', Network Security, Jan., 1998.
F. Cohen, ``Providing for Responsibility in a Global Information Infrastructure '', IFIP-TC11, `Computers and Security', 1997.
F. Cohen, ``A Classification of Attack Mechanisms'', Computers and Security, 1997.
F. Cohen, ''Managing Network Security - 50 Ways to Defeat Your Intrusion Detection System'', Network Security, Dec., 1997.
F. Cohen, ''Managing Network Security - To Outsource or Not to Outsource - That is the Question.'', Network Security, Nov., 1997.
F. Cohen, ''Managing Network Security - The Network Security Game'', Network Security, Oct., 1997.
F. Cohen, ''Managing Network Security - Change Your Password - Doe See Doe'', Network Security, Sep., 1997.
F. Cohen, ''Managing Network Security - Penetration Testing?'', Network Security, Aug., 1997.
F. Cohen, ''Managing Network Security - Relativistic Risk Analysis'', Network Security, Jun., 1997.
F. Cohen, ''Managing Network Security - Prevent, Detect, and React'', Network Security, May., 1997.
F. Cohen, ''Managing Network Security - Would you like to play a game?'', Network Security, Apr., 1997.
F. Cohen, ``Protection Issues in ASCII Red Based on a Limited Unclassified Briefing'' (C).
F. Cohen, ''Managing Network Security - Risk Management or Risk Analysis?'', Network Security, Mar., 1997.
F. Cohen, ''Managing Network Security - Network Security as a Control Issue?'', Network Security, Feb., 1997.
F. Cohen, ''Managing Network Security - Integrity First - Usually'', Network Security, Jan., 1997.
F. Cohen, S. Cooper, et. al. ``Intrusion Detection and Response'', National InfoSec Technical Baseline, October, 1996. [Also appearing in SecureNet 97, March, 1997 and Computers and Security.]
F. Cohen, ''Managing Network Security - Where Should We Concentrate Protection?'', Network Security, Dec., 1996.
F. Cohen, ''Managing Network Security - How Good Do You Have to Be?'', Network Security, Nov., 1996.
F. Cohen, ''Managing Network Security - Why Bother?'', Network Security, Oct., 1996.
F. Cohen, ``Internet Holes - The SYN Flood'', Network Security, Sep., 1996.
F. Cohen, ``Internet Holes - Internet Incident Response'', Network Security, Aug., 1996.
F. Cohen, ``Internet Holes - Internet Lightning Rods'', Network Security, July, 1996.
F. Cohen, ``Internet Holes - UDP Viruses'', Network Security, June, 1996.
F. Cohen, ``Internet Holes - Eliminating IP Address Forgery'', Network Security, May, 1996.
F. Cohen, ``Internet Holes - Spam'', Network Security,April , 1996.
F. Cohen, ``Internet Holes - The Human Element'', Network Security, March, 1996.
F. Cohen, ``Internet Holes - Automated Attack and Defense'', Network Security, February, 1996.
F. Cohen, ``Internet Holes - 50 Ways to Attack Your World Wide Web Systems'', Network Security, December, 1995 - January, 1996.
F. Cohen, ``Internet Holes - Network News Transfer Protocol '', Network Security, November, 1995.
F. Cohen, ``Internet Holes - Sendmail Attacks'', Network Security, October, 1995.
F. Cohen, ``Internet Holes - Packet Fragmentation Attacks'', Network Security, September, 1995.
F. Cohen, ``Internet Holes - Internet Control Message Protocol'', Network Security, August, 1995.
F. Cohen, ``Airbag Inflator Inspection System'', LumenX Corporation, November, 1994.
F. Cohen, R. Knecht, C. Preston, et. al., ``Planning Considerations for Defensive Information Warfare - Information Assurance'', Contract DCA 100-90-C-0058 T.O. 90-SAIC-019, November, 1993.
F. Cohen, ``Threats and Defenses for WCCS'', US Air Force, Wing Command and Control System, August, 1993.
F. Cohen, ``Information Warfare Considerations'', National Academy of Sciences - National Research Council, September, 1993.
F. Cohen, ``A Case for Benevolent Viruses'' DPMA, IEEE, ACM Computer Virus and Security Conference, March 1992
F. Cohen, ``Current Best Practice Against Computer Viruses with Examples from the DOS Operating System'', DPMA, IEEE, ACM Computer Virus and Security Conference, March 1992
F. Cohen, ``A Roving Emulator'', Conference on Modeling and Simulation, April, 1987.
F. Cohen, ``Information Protection'', Curriculum Module for the graduate degree in Software Engineering, The Software Engineering Institute, June, 1986, also appearing in ACM SIGSAC in abbreviated form.
F. Cohen, ``A Complexity Based Integrity Maintenance Mechanism'', Conference on Information Sciences and Systems, Princeton University, March 1986.
F. Cohen, ``Recent Results in Computer Viruses'', Conference on Information Sciences and Systems, Johns Hopkins University, March 1985.
F. Cohen, ``The HAD Cryptosystem'', IACR Crypto84 rump session, Aug. 1984.
F. Cohen, ``Computer Security Methods and Systems'', Conference on Information Sciences and Systems, Princeton University, March 1984.
F. Cohen, ``Learning Networks for Database Access'', Yale Conference on Adaptive Systems Theory, New Haven, CT, June, 1983.
M.A. Breuer, F. Cohen, and A.A. Ismaeel, ``Roving Emulation'', Built-In Self-Test Conference, March 1983.
F. Cohen, ``The Delta-Net Model of Computation'', Conference on Information Sciences and Systems, Johns Hopkins University, March 1983.
F. Cohen, ``The U.S.C. Roving Emulator'', U.S.C. DISC Report #82-8, Dept of Electrical Engineering, University Park, LA, Ca. 90089-0781, Dec. 1982.
M.A. Breuer, F. Cohen, A.A. Ismaeel, ``Roving Emulation as Applied to a (255,223) RS-encoder System'', U.S.C. DISC Report #82-6, Dec. 1982.
F. Cohen and Garrett Gee, 2002 - White Glove Bootable Linux CD
F. Cohen, 2002 - Responder - large-scale network deception system
F. Cohen and Garrett Gee, 2002 - White Glove developer platform
F. Cohen, Darrian Hale, et. al., 2002 - Resilience - Resilient network infrastructure
F. Cohen, Anthony Carathemus, et. al. 2001 - Secure DNS Server
F. Cohen, Anthony Carathemus, et. al. 2001 - Partition Dump
F. Cohen, Eric Thomas, and Anthony Carathemus, 2001 - Invisible Router
F. Cohen, 2000 - D-Wall - Large-scale high fidelity deception system
F. Cohen, 1999 - Network Security Simulator
F. Cohen and E. Dart, 1998 - DARE - Distributed Analysis and Defense
F. Cohen, 1998 - Deception Toolkit
F. Cohen, 1998 - The Security Maze
F. Cohen, 1997 - The Cracking Game
F. Cohen, 1997 - Automated Threat, Attack, and Defense Analywsis Tool
F. Cohen, 1996 - CID Database Analysis Tool
F. Cohen, 1995 - Auditor - Internal Audit Tool
F. Cohen, 1995 - Analyzer - Network Audit Tool
F. Cohen, 1995 - Trivial HTTP Daemon - provably secure web server
F. Cohen, 1995 - Secure Goper Server - provably secure gopher server
F. Cohen, 1993 - Calendar Supplement
F. Cohen, 1992 - PayBack Automated Bill Collection Software
F. Cohen, 1989 - Integrity ToolKit - Integrity Shell and Access Control System
F. Cohen, 1988 - Advanced Software Protection Scanner - Virus Scanner
F. Cohen, 1987 - Advanced Software Protection - Crypto-Checksum Integrity Checker
F. Cohen, 1987 - TRP - Small business office software
F. Cohen, 1986 - VCE - Viral Computing Environment
F. Cohen, 1985 - Legal Assistant - Law Office Software