Eugene Schultz
#53,982
Most Influential Person Now
Computer security expert
Eugene Schultz's AcademicInfluence.com Rankings
Eugene Schultzcriminal-justice Degrees
Criminal Justice
#262
World Rank
#291
Historical Rank
Cyber Security
#33
World Rank
#35
Historical Rank
Eugene Schultzcomputer-science Degrees
Computer Science
#2165
World Rank
#2251
Historical Rank
Cybersecurity
#19
World Rank
#21
Historical Rank
Database
#8412
World Rank
#8802
Historical Rank
Download Badge
Criminal Justice Computer Science
Eugene Schultz's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Eugene Schultz Influential?
(Suggest an Edit or Addition)According to Wikipedia, Eugene Schultz was an American computer security researcher and expert on cybersecurity. Life Schultz was born on September 10, 1946, in Chicago to E. Eugene Sr. and Elizabeth Schultz. He was married to Cathy Brown for 36 years. The couple had three daughters.
Eugene Schultz's Published Works
Published Works
- A framework for understanding and predicting insider attacks (2002) (350)
- Improving password security and memorability to protect personal and organizational information (2007) (209)
- Analysis of vulnerabilities in Internet firewalls (2003) (127)
- Usability and Security An Appraisal of Usability Issues in Information Security Methods (2001) (125)
- The human factor in security (2005) (116)
- Improving computer security for authentication of users: Influence of proactive password restrictions (2002) (114)
- Security Information and Event Management (SIEM) (2011) (100)
- Intrusion Detection & Prevention (2003) (84)
- Virtualization security (2009) (69)
- Security training and awareness - fitting a square peg in a round hole (2004) (59)
- Internet Security for Business (1996) (55)
- Incident Response: A Strategic Guide to Handling System and Network Security Breaches (2001) (52)
- A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals (2001) (47)
- Refereed papers: A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals1 1This work was supported by sponsers of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. (2001) (34)
- Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code (1993) (31)
- Responding to computer security incidents: Guidelines for incident handling (1990) (27)
- Where have the worms and viruses gone?—new trends in malware (2006) (25)
- Security Views (2002) (25)
- Sarbanes-Oxley - a huge boon to information security in the US (2004) (20)
- Feature: A systematic methodology for firewall penetration testing (1996) (18)
- Intrusion prevention (2004) (15)
- A Task Analysis of Usability in Third-Party Authentication (2000) (15)
- Pandora's Box: spyware, adware, autoexecution, and NGSCB (2003) (13)
- Book review: Internet security: Risk analysis, strategies, and firewalls (1997) (13)
- The future of intrusion prevention (2007) (12)
- Computer forensics challenges in responding to incidents in real-life settings (2007) (10)
- Promoting Memorability and Security of Passwords Through Sentence Generation (2004) (10)
- Research on usability in information security (2007) (9)
- Feature: When firewalls fail: Lessons learned from firewall testing (1997) (9)
- Risks due to convergence of physical security systems and information technology environments (2007) (9)
- Blaster Analysis: The MSBlaster worm: going from bad to worse (2003) (8)
- An early look at Windows Vista security (2007) (8)
- Human Factors in Information Security and Privacy (2012) (8)
- Taking a stand on hackers (2002) (7)
- Book Review: Intrusion Detection (2000) (6)
- Internet sniffer attacks (1997) (6)
- Incident response teams need to change (2004) (6)
- Feature: A new perspective on firewalls (1995) (6)
- Worms and viruses: are we losing control? (2004) (5)
- Mobile computing: The next Pandora's Box (2007) (5)
- Windows 2000 Security (2004) (5)
- Infosec certification: Which way do we turn from here? (2005) (5)
- Book Review: The myth of Homeland security (2003) (5)
- Denial of Service Attacks (2004) (5)
- Web Security, Privacy and Usability (2011) (5)
- Rootkits: The Ultimate Malware Threat (2008) (4)
- Internet security: what's in the future? (2003) (4)
- Dilemmas and boundaries of digital rights management (2006) (4)
- Security dilemmas with Microsoft's Internet Explorer (2005) (3)
- The case for one-time credentials (2004) (3)
- Firewalls: Internet Security (2010) (3)
- The changing winds of information security (2006) (3)
- Book review: Intranet firewalls (1997) (3)
- Types of Firewalls (2001) (3)
- Feature: Securing third-party connections (1998) (3)
- Personal information compromises: It is time for the U.S. Government to wake up (2005) (3)
- The gap between cryptography and information security (2002) (3)
- Calculating Total Cost of Ownership on Intrusion Prevention Technology (2015) (2)
- Report: Hackers and penetration testing (1997) (2)
- Special systems: Overlooked sources of security risk? (2006) (2)
- Book: Fighting computer crime (1999) (2)
- Feature: Demystifying Intrusion Detection: Sorting through the Confusion, Hyperbole and Misconceptions1 (2002) (2)
- Representing information security fairly and accurately (2006) (1)
- Assessing and Combating the Sniffer Threats (2001) (1)
- The Sorry State of Law Enforcement (2002) (1)
- Windows NT security: Kudos, concerns, and prescriptions (1999) (1)
- Search engines: a growing contributor to security risk (2005) (1)
- What infosec changes are likely to result from the recent US election? (2007) (1)
- Managing Advanced Persistent Threats (2012) (1)
- Human Factors in Information Security Methods (2000) (1)
- Feature: Planning for Windows NT 5.0 security (1998) (1)
- Building the right firewall (1996) (1)
- Why the bad guys are winning (1995) (1)
- Attackers hit Web hosting servers (2003) (1)
- A framework for password selection. [Password recommendations] (1988) (1)
- RPC in Windows: RPC in Windows systems: what you don't know could hurt you (2004) (1)
- Security Information and Event Management (SIEM) Technology (2009) (1)
- Security Patch Management: The Process (2006) (1)
- Human Factors and Information Security (2006) (0)
- Lycos crosses the line (2005) (0)
- 83-1041 Types of Firewalls E (1998) (0)
- A new perspective on firewall security (1995) (0)
- The US Government bigger and better information security? (2002) (0)
- Is the U.S. government really getting serious about information security? (2004) (0)
- Struggles in the academic side of infosec (2007) (0)
- Information security and the media (2003) (0)
- Intrusion Detection: How to Utilize a Still Immature Technology (2000) (0)
- Managing Bluetooth Security (2012) (0)
- Feature: Intrusion Detection Revisited (2000) (0)
- From the Editor: From the editor-in-chief (2001) (0)
- Eugene Schultz - Security views: Security views (2003) (0)
- The Sobig Worm: The Sobig Worm Variants (2003) (0)
- I NTRUSION D ETECTION : H OW TO U TILIZE A S TILL I MMATURE T ECHNOLOGY (1999) (0)
- Microsoft is back in the hot seat (2006) (0)
- Why can't Microsoft stay out of the InfoSec headlines? (2003) (0)
- Malicious Code: Rootkits (2011) (0)
- About "Unofficial patches" (2006) (0)
- Non-infosec professionals in infosec? (2005) (0)
- Internet Explorer: Internet Explorer security: is there any hope? (2005) (0)
- Security views: Online piracy battle heats up in US (2003) (0)
- Patching Pandemonium (2003) (0)
- Managing Mobile Device Security (2010) (0)
- The gap between cryptography and information security: has it narrowed? (2004) (0)
- The Sobig Worm Variants: Letter after letter from A-E (2003) (0)
- Intrusion Detection Systems (IDSs): Implementation (2011) (0)
- Predicting the future of InfoSec (2006) (0)
- Feature: Putting the Mime name vulnerability in outlook and messenger in perspective (1998) (0)
- Telecommunications and Network Security (2000) (0)
- Issues concerning the distribution of vulnerability information (2006) (0)
- Aligning disaster recovery and security incident response (2005) (0)
- Compsec '97 paper abstract: Securing Windows NT in today's network environment (1997) (0)
- Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions (2003) (0)
- Firewalls: An Effective Solution for Internet Security (2000) (0)
- Securing third party connections (1997) (0)
- Windows Vista: Microsoft's brave new world (2007) (0)
This paper list is powered by the following services:
Other Resources About Eugene Schultz
What Schools Are Affiliated With Eugene Schultz?
Eugene Schultz is affiliated with the following schools: