• Publications
  • Influence
Computer viruses: Theory and experiments
  • F. Cohen
  • Computer Science
  • Comput. Secur.
  • 1 February 1987
TLDR
This paper introduces ''computer viruses'' and examines their potential for causing widespread damage to computer systems. Expand
  • 815
  • 40
  • PDF
The homology of Cn+1-Spaces, n≥0
  • 191
  • 25
Digital Forensic Evidence Examination
This book is about the examination of digital forensic evidence in legal settings. When a legal action involving the formalisms of a court system are involved, and that action involves evidenceExpand
  • 69
  • 13
Information system attacks: A preliminary classification scheme
  • F. Cohen
  • Computer Science
  • Comput. Secur.
  • 1997
TLDR
It is hoped that this list will be a starting point and not an ending point. Expand
  • 82
  • 7
Computational aspects of computer viruses
  • F. Cohen
  • Computer Science
  • Comput. Secur.
  • 1 June 1989
TLDR
This paper formally defines a class of sets of transitive integrity-corrupting mechanisms called ''viral sets'' and explores some of their computational properties. Expand
  • 116
  • 6
  • PDF
A note on the role of deception in information protection
  • F. Cohen
  • Computer Science
  • Comput. Secur.
  • 1998
  • 65
  • 6
Two Models of Digital Forensic Examination
  • F. Cohen
  • Engineering, Computer Science
  • Fourth International IEEE Workshop on Systematic…
  • 21 May 2009
TLDR
This paper examines an existing cost model of digital forensic examination and describes a new model of examination. Expand
  • 26
  • 4
Challenges to Digital Forensic Evidence
  • 27
  • 4
Configuration-like spaces and the Borsuk-Ulam theorem
Some extensions of the classical Borsuk-Ulam Theorem are proved by computing a bound on the homology of certain spaces similar to configuration spaces. The Bourgin-Yang Theorem and a generalizationExpand
  • 16
  • 4
Simulating cyber attacks, defences, and consequences
  • F. Cohen
  • Computer Science
  • Comput. Secur.
  • 1999
TLDR
This paper is about simulations of attacks, defences, and consequences in complex cyber systems such as computer networks; and more specifically about one attempt to create simulations capable of providing meaninfil results in this field. Expand
  • 131
  • 3