Fred Cohen
#4,386
Most Influential Person Now
American computer scientist
Fred Cohen's AcademicInfluence.com Rankings
Fred Cohencomputer-science Degrees
Computer Science
#295
World Rank
#307
Historical Rank
#169
USA Rank
Information Security
#6
World Rank
#6
Historical Rank
#4
USA Rank
Database
#92
World Rank
#95
Historical Rank
#54
USA Rank
Download Badge
Computer Science
Fred Cohen's Degrees
- PhD Computer Science University of Southern California
- Masters Computer Science University of Southern California
- Bachelors Mathematics University of Southern California
Similar Degrees You Can Earn
Why Is Fred Cohen Influential?
(Suggest an Edit or Addition)According to Wikipedia, Frederick B. Cohen is an American computer scientist and best known as the inventor of computer virus defense techniques. He gave the definition of "computer virus". Cohen is best known for his pioneering work on computer viruses, the invention of high integrity operating system mechanisms now in widespread use, and automation of protection management functions.
Fred Cohen's Published Works
Published Works
- Computer viruses: Theory and experiments (1987) (899)
- Simulating cyber attacks, defences, and consequences (1999) (155)
- Computational aspects of computer viruses (1989) (117)
- Information system attacks: A preliminary classification scheme (1997) (89)
- Digital Forensic Evidence Examination (2009) (80)
- The Use of Deception Techniques : Honeypots and Decoys (2004) (79)
- A note on the role of deception in information protection (1998) (72)
- A cryptographic checksum for integrity protection (1987) (67)
- A Framework for Deception (2001) (55)
- Models of practical defenses against computer viruses (1989) (47)
- The Smarter Grid (2010) (44)
- Leading attackers through attack graphs with deceptions (2003) (37)
- Toward a Science of Digital Forensic Evidence Examination (2010) (33)
- A Mathematical Structure of Simple Defensive Network Deception (2000) (32)
- On the implications of computer viruses and methods of defense (1988) (30)
- Information system defences: A preliminary classification scheme (1997) (30)
- Challenges to Digital Forensic Evidence (2008) (27)
- Two Models of Digital Forensic Examination (2009) (24)
- What makes critical infrastructures Critical? (2010) (23)
- The Mentally Disordered Inmate And The Law (1998) (19)
- Column: Putting the Science in Digital Forensics (2011) (19)
- Misleading attackers with deception (2004) (18)
- Some weak points of one fast cryptographic checksum algorithm and its improvement (1988) (16)
- Isolation in Penal Settings: The Isolation-Restraint Paradigm (2006) (13)
- Penal Isolation (2008) (13)
- Intrusion detection and response (1997) (13)
- Feature: Managing network security: Attack and defence strategies (1999) (12)
- Managing network security - Part 14: 50 Ways to defeat your intrusion detection system (1997) (12)
- Managing Network Security: Terrorism and Cyberspace (2002) (12)
- A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID (1998) (11)
- The Virtualization Solution (2010) (11)
- Special feature: A cause and effect model of attacks on information systems (1998) (10)
- Challenges to Digital Forensic Evidence in the Cloud (2013) (9)
- Bulk Email Forensics (2009) (9)
- Managing network security - Part 5: Risk management or risk analysis (1997) (9)
- Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen (2001) (7)
- A secure computer network design (1985) (7)
- Implications of computer viruses and current methods of defense (1991) (7)
- Design and administration of distributed and hierarchical information networks under partial orderings (1987) (7)
- Designing provably correct information networks with digital diodes (1988) (6)
- Algorithmic authentication of identification (1985) (6)
- Managing Network Security: The End Of The Internet As We Know It (2002) (6)
- IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Cisco Toolkit) (2006) (6)
- Managing network security - Part 9: Penetration testing? (1997) (5)
- Computer Fraud Scenarios (2002) (5)
- Design and protection of an information network under a partial ordering: A case study (1987) (5)
- How Do We Measure Security (2011) (5)
- Internet Fraud: Mythical Online Scams (2003) (5)
- Automated Control System Security (2010) (5)
- Feature: Managing network security: The millisecond fantasy (1999) (5)
- Feature: Managing network security: Simulating network security (1999) (5)
- Feature: Managing network security: The limits of awareness (1999) (4)
- Managing Network Security: Bootable CDs (2001) (4)
- Managing Network Security: The New Cyber Gang - A Real Threat Profile (2001) (4)
- Forensic Methods for Detecting Insider Turning Behaviors (2012) (4)
- Moving target defenses with and without cover deception (2011) (4)
- Analysis of Redundant Traces for Consistency: With Examples from Electronic Messaging and Graphical Images (2009) (4)
- A method for forensic analysis of control (2010) (4)
- Managing Network Security: What Does it do Behind Your Back? (2000) (3)
- Managing network security: Why everything keeps failing (2000) (3)
- Managing network security - Part 11: To outsource or not to outsource, that is the question! (1997) (3)
- Managing Network Security: Is Open Source More or Less Secure? (2002) (3)
- Managing Network Security: Countering DCAs (2000) (2)
- Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media (2012) (2)
- Managing network security - Part 6: Computer games and network security management (1997) (2)
- Two secure file servers (1988) (2)
- The Legal Challenge to Corrections: Implications for Manpower and Training. (1969) (2)
- E-commerce Security Implementations— Think Before You Act (2002) (2)
- Managing Network Security: Understanding Viruses Bio-logically (2000) (2)
- Why 32-bit desktops need virus protection (1995) (2)
- A reference architecture approach to ICS security (2011) (2)
- ICAEW information technology prize for 1989 goes to anti-viral product (1989) (2)
- Managing Network Security: Eliminating IP Address Forgery - Five Years Old and Going Strong (2000) (2)
- Maintaining a poor person's information integrity (1988) (2)
- The Law of Deprivation of Liberty: A Study in Social Control (1980) (2)
- The Chief Information Security Officer's Toolkit: Governance Guidebook (2005) (2)
- Feature: Managing network security: Returning fire (1999) (2)
- Managing network security - The unpredictability of defence (1998) (2)
- Managing Network Security: The Wireless Revolution (2001) (1)
- Managing Network Security: Should We Use Deception As An InfoSec Defence? (2001) (1)
- Feature: Managing network security: How does a typical IT audit work? (1998) (1)
- Managing Network Security: Chipping (2000) (1)
- Managing network security - Red teaming (1998) (1)
- Managing Network Security: Why Can't We Do DNS Right? (2000) (1)
- Critical Infrastructure Protection: Issues and Answers (2007) (1)
- Internet holes - Part 10: UDP viruses (1996) (1)
- Feature: Managing network security: In your face information warfare (1999) (1)
- Information Security Awareness Basics (2006) (1)
- Feature: Managing network security: Security education in the information age (1999) (1)
- Managing Network Security: Breaking in to Test Security? (2002) (1)
- Feature: Managing Network Security: Balancing risk (1998) (1)
- Security Governance Checklists: Business Operations, Security Governance, Risk Management, And Enterprise Security Architecture (2005) (1)
- A Case Study in Forensic Analysis of Control (2011) (1)
- Feature: Managing network security: The real Y2K issue (1998) (1)
- Internet holes - Part 2: Packet fragmentation attacks (1995) (1)
- Managing Network Security: Academia's Vital Role in Information Protection (2002) (1)
- Managing network security - Part 15: Y2K alternative solutions (1998) (1)
- Feature: Managing network security: Technical protection for the joint venture (1998) (1)
- Internet holes - Part 12a: Internet incident response (1996) (1)
- What’s the Big Deal About Big Data Loss (Actually Theft)? (2017) (1)
- Internet holes - Part 13: The SYN flood (1996) (1)
- A Tale of Two Traces - Diplomatics and Forensics (2015) (1)
- Managing Network Security: Back Up a Minute (2002) (1)
- Managing Network Security: Revisiting Risk (2000) (1)
- Internet holes - Part 8: Spam (1996) (1)
- Managing Network Security: Worker Monitoring (2000) (1)
- Enterprise Information Protection (2008) (1)
- Fonts for Forensics (2010) (1)
- Feature: Managing Network Security: The seedy side of security (1998) (1)
- Identifying and Attributing Similar Traces with Greatest Common Factor Analysis (2012) (1)
- The Bottom Ten List—Information Security Worst Practices (2010) (1)
- Managing network security - Part 7: Prevent, detect and respond (1997) (0)
- Feature: Managing network security: What should I report to whom? (1998) (0)
- Managing Network Security: Collaborative Defence (2000) (0)
- Switching Your Infrastructure (2003) (0)
- Managing network security - Part 1: How good do you have to be? (1996) (0)
- Managing Network Security - Part 3: Network security as a control issue (1997) (0)
- Managing Network Security: Marketing Hyperbole at its Finest (2001) (0)
- As the Consequences Rise, Where is the Risk Management? (2013) (0)
- Managing Network Security: The DMCA: Why It Is Bad For InfoSec Professionals (2001) (0)
- The Millennium Article — Yet Again! (2000) (0)
- Information Protection Sei Curriculum Module Sei-cm-5-1.2 (preliminary) (1987) (0)
- Science Column: Measuring Inconsistency Methods for Evidentiary Value (2013) (0)
- Managing Network Security: To Prosecute or Not to Prosecute? (2001) (0)
- Feature: Managing Network Security: Watching the World (1999) (0)
- Internet holes - Part 6: Automated attack and defence (1996) (0)
- Internet holes - Part 4: Network news transfer protocol (1995) (0)
- Column: The Physics of Digital Information-Part 2 (2012) (0)
- The Chief Information Security Officer's Toolkit: Security Program Metrics (2005) (0)
- Managing network security - The management of fear (1998) (0)
- The Discovery of Prison Reform (2020) (0)
- Managing network security - Part 8: Relativistic risk assessment (1997) (0)
- The law of deprivation of liberty : cases and materials (1991) (0)
- Managing network security - Part 10: Change your password (1997) (0)
- In defense of the defendant (2019) (0)
- Inmate's right to refuse dialysis affirmed: (556002012-003) (2011) (0)
- Science Column: Reconstruction: The Experimental Side of Digital Forensics (2013) (0)
- MANAGING NETWORK SECURITY: Security Programmers - not all the same (2003) (0)
- Column: Analysis of Digital Traces (2012) (0)
- Comments on the Scrupled-Juror Problem. (1971) (0)
- Managing Network Security: Corporate Security Intelligence: An Oxymoron? (2001) (0)
- Managing network security - Part 4: Integrity first, usually (1997) (0)
- Limited consensus around ARM information protection practices (2016) (0)
- In Search of a Model Act for Prisoners’ Rights (1973) (0)
- Control Requirements for Control Systems: Matching Surety To Risk (2008) (0)
- The "When All Else Fails" syndrome. (2002) (0)
- Standards relating to dispositional procedures (1977) (0)
- Informed consent for the neurosurgeon. (2003) (0)
- Information Warfare, Netwar, and Cyber Intelligence (2007) (0)
- Digital forensics (2000) (0)
- Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations (2014) (0)
- Internet holes — Part 1: Internet Control Message Protocol (1995) (0)
- Semiconductor device having an elevated widerstandsfaehigkeit against sekundaerdurchbruch and process for the manufacture of such a semiconductor device (1968) (0)
- Internet holes — Part 5b: 50 ways to attack your Web systems (1996) (0)
- Death row solitary confinement and constitutional considerations. (2018) (0)
- Change Your Passwords How Often? (2011) (0)
- Making Compliance Simple—Not (2008) (0)
- Internet holes — Part 11: Internet lightning rods (1996) (0)
- Why We Need Better Reporters to Solve Our Security Problems (2017) (0)
- Internet holes - Part 7: The human side (1996) (0)
- Managing network security - Part 2: Where should we concentrate protection? (1997) (0)
- Progress and Evolution of Critical Infrastructure Protection over the Last 10 Years? (2012) (0)
- Feature: Managing Network Security: Anatomy of a successful sophisticated attack (1999) (0)
- Feature: Managing network security: What's happening out there (1999) (0)
- Feature: Managing network security: Why it was done that way (1999) (0)
- Standards relating to corrections administration (1980) (0)
- Feature: Managing Network Security: The limits of cryptography (1999) (0)
- Feature: Managing network security: Time-based security (1998) (0)
- Insanity: From Abstract Debate to Operational Reality. (1968) (0)
- Female inmates in Wisconsin advance discrimination claims: (556072012-006) (2010) (0)
- Managing Network Security: Strategic Security Intelligence - Embedded Security (2002) (0)
- Internet holes - Part 3: The sendmail maelstrom (1995) (0)
- Column: The Physics of Digital Information (2011) (0)
- Managing Network Security: The Best Security Book Ever Written (2001) (0)
- A Method for Recovering Data From Failing Floppy Disks with a Practical Example (2007) (0)
- Managing network security - Part 13: The network security game (1997) (0)
- Testing Your Security Defence by Breaking In (2001) (0)
- Internet holes - Part 9: IP address forgery and how to eliminate it (1996) (0)
- A Tale of Two Traces – Archives , Diplomatics , and Digital Forensics (2013) (0)
- Practical Guide to Correctional Mental Health and the Law (2011) (0)
- Column: The Science of Digital Forensics: Analysis of Digital Traces (2012) (0)
- Computer viruses (1992) (0)
- Managing Network Security: A Matter of Power (2001) (0)
- Managing Network Security: The World Doesn't Want to be Fixed (2001) (0)
- Feature: Managing network security: Risk staging (1998) (0)
- Managing network security: Background Checks (2003) (0)
- A Framework for Deception Technical Baseline Report A Framework for Deception (2003) (0)
- Internet holes - Part 12(b): Internet incident response (1996) (0)
- Social Tension and Separation of Duties (2008) (0)
- Feature: Misimpressions We Need to Extinguish (2002) (0)
- A Framework for Deception A Framework for Deception (2007) (0)
This paper list is powered by the following services:
Other Resources About Fred Cohen
What Schools Are Affiliated With Fred Cohen?
Fred Cohen is affiliated with the following schools: