F. Cohen
发表
F. Cohen,
2004
.
Fred Cohen,
F. Cohen,
2001
.
F. Cohen,
2009
.
F. Cohen,
2002
.
Fred Cohen,
F. Cohen,
1991
.
F. Cohen,
Dave Lambert,
Charles Preston,
2007
.
F. Cohen,
Dave Lambert,
Charles Preston,
2003
.
F. Cohen,
1999
.
Fred Cohen,
Cynthia A. Phillips,
Laura Painton Swiler,
1998,
Comput. Secur..
F. Cohen,
1997
.
Fred Cohen,
F. Cohen,
1995
.
Fred Cohen,
F. Cohen,
2006
.
Fred Cohen,
F. Cohen,
2002
.
Fred Cohen,
Cynthia A. Phillips,
Laura Painton Swiler,
1998
.
Fred Cohen,
F. Cohen,
2005
.
Fred Cohen,
F. Cohen,
1998,
Computers & security.
Fred Cohen,
F. Cohen,
2010,
Int. J. Crit. Infrastructure Prot..
Fred Cohen,
F. Cohen,
1995
.
Fred Cohen,
F. Cohen,
2011
.
Fred Cohen,
F. Cohen,
2000
.
Fred Cohen,
F. Cohen,
2013
.
Fred Cohen,
F. Cohen,
2008
.
Fred Cohen,
F. Cohen,
1997
.
Fred Cohen,
F. Cohen,
2010
.
Fred Cohen,
F. Cohen,
1997
.
F. Cohen,
2006
.
Fred Cohen,
F. Cohen,
2012,
J. Digit. Forensics Secur. Law.
Fred Cohen,
F. Cohen,
2010,
IFIP Int. Conf. Digital Forensics.
Fred Cohen,
F. Cohen,
1999
.
Fred Cohen,
F. Cohen,
2009,
2009 33rd Annual IEEE International Computer Software and Applications Conference.
Reply to 'Comment on "A Framework for Modelling Trojans and Computer Virus Infection"' by E. Mäkinen
Fred Cohen,
F. Cohen,
2001,
Comput. J..
Fred Cohen,
F. Cohen,
1990
.
F. Cohen,
1998
.
F. Cohen,
2008
.
Fred Cohen,
F. Cohen,
1997
.
F. Cohen,
2011
.
Fred Cohen,
F. Cohen,
2012,
J. Digit. Forensics Secur. Law.
Fred Cohen,
F. Cohen,
2010,
Comput. Secur..
Fred Cohen,
F. Cohen,
2000
.
Fred Cohen,
F. Cohen,
1997,
Comput. Secur..
Fred Cohen,
F. Cohen,
1997,
Comput. Secur..
Fred Cohen,
F. Cohen,
1989,
Comput. Secur..
Fred Cohen,
Stephen Bruhns,
F. Cohen,
1988,
Comput. Secur..
Fred Cohen,
F. Cohen,
1987,
Comput. Secur..
Fred Cohen,
F. Cohen,
1987,
Comput. Secur..
F. Cohen,
1987,
Comput. Secur..
Fred Cohen,
F. Cohen,
1999,
Comput. Secur..
Fred Cohen,
F. Cohen,
1988,
Comput. Secur..
Fred Cohen,
F. Cohen,
1997
.
Fred Cohen,
Yue Jiang Huang,
F. Cohen,
1988,
Comput. Secur..