Eugene H. Spafford
Affiliations: | Electrical and Computer Engineering | Purdue University, West Lafayette, IN, United States |
Area:
Computer Science, Electronics and Electrical EngineeringGoogle:
"Eugene Spafford"Bio:
https://www.proquest.com/openview/abd5caaa2f08928f3122d51705b1a292/1
Parents
Sign in to add mentorMartin Stewart McKendry | grad student | 1986 | Georgia Tech | |
(Kernel Structures for a Distributed Operating System) |
Children
Sign in to add traineeWenliang Du | grad student | 2001 | Purdue |
Diego Zamboni | grad student | 2001 | Purdue |
Thomas E. Daniels | grad student | 2002 | Purdue |
Benjamin A. Kuperman | grad student | 2004 | Purdue |
Florian Buchholz | grad student | 2005 | Purdue |
James P. Early | grad student | 2005 | Purdue |
Serdar Cabuk | grad student | 2006 | Purdue |
Brian D. Carrier | grad student | 2006 | Purdue |
Rajeev Gopalakrishna | grad student | 2006 | Purdue |
Maja Pusara | grad student | 2007 | Purdue |
Dannie M. Stanley | grad student | 2013 | Purdue |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Gutierrez CN, Spafford EH, Bagchi S, et al. (2018) Reactive redundancy for data destruction protection (R2D2) Computers & Security. 74: 184-201 |
Almeshekah MH, Spafford EH. (2014) Using Deceptive Information in Computer Security Defenses International Journal of Cyber Warfare and Terrorism. 4: 63-80 |
Farahmand F, Atallah MMJ, Spafford EH. (2013) Incentive alignment and risk perception: An information security application Ieee Transactions On Engineering Management. 60: 238-246 |
Stanley DM, Xu D, Spafford EH. (2013) Improved kernel security through memory layout randomization 2013 Ieee 32nd International Performance Computing and Communications Conference, Ipccc 2013 |
Lee K, Yim K, Spafford EH. (2012) Reverse-safe authentication protocol for secure USB memories Security and Communication Networks. 5: 834-845 |
Spafford EH. (2010) Privacy and security remembrances of things pest Communications of the Acm. 53: 35-37 |
Kuperman BA, Spafford EH. (2010) Audlib: A configurable, high-fidelity application audit mechanism Software - Practice and Experience. 40: 989-1005 |
Spafford EH. (2009) Privacy and security Answering the wrong questions is no answer Communications of the Acm. 52: 22-24 |
Breaux TD, Antón AI, Spafford EH. (2009) A distributed requirements management framework for legal compliance and accountability Computers and Security. 28: 8-17 |
Spafford EH. (2009) Cyber security: Assessing our vulnerabilities and developing an effective defense Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5661: 20-33 |