




G. S. Carson, J. DeBlasi, D. Emery, A. Gargaro, J. Klensin, I. Montanez, J. Moore, R. Rada, and E. H. Spafford. ACM Technical Standards Committee: A New Advocacy Power. Computer Standards and Interfaces, 16:139-142, 1994.
S. J. Chapin and E. H. Spafford. Support for Implementing Scheduling Algorithms Using MESSIAHS. Scientific Programming, 3:325-340, 1994.
S. J. Chapin and E. H. Spafford. Support for Security in Distributed Systems Using MESSIAHS. In Proceedings of the National Computer Security Conference, pages 339-447, October 1994.
M. Crosbie and E. H. Spafford. Active Defense of Computer Systems Using Autonomous Agents. In Proceedings of the 18th National Information Security Conference, October 1995.
M. Crosbie and E. H. Spafford. Genetic Programming Applied to Intrusion Detection. In Proceedings of the AAAI Genetic Programming Symposium, Cambridge, MA, November 1995.
D. J. Icove, K. A. Seger, E. H. Spafford, and W. R. VonStorch. Computer Crime: A Crime-Fighters Handbook. O'Reilly & Associates, 1995. Consulting editor.
G. Kim and E. H. Spafford. The Design and Implementation of Tripwire: A File System Integrity Checker. In Proceedings of the Second ACM Conference on Computer and Communications Security, November 1994.
G. Kim and E. H. Spafford. Writing, Supporting, and Evalutaing Tripwire: A Publically Available Security Tool. In Proceedings of the USENIX Unix Applications Development Symposium Usenix, pages 89-107, Toronto, CA, 1994.
I. Krsul and E. H. Spafford. Authorship Analysis: Identifying the Author of a Program. In Proceedings of the 18th National Information Security Conference, October 1995.
S. Kumar and E. H. Spafford. A Pattern-Matching Model for Instrusion Detection. In Proceedings of the National Computer Security Conference, pages 11-21, October 1994.
S. Kumar and E. H. Spafford. A Software Architecture to Support Misuse Intrusion Detection. In Proceedings of the 18th National Information Security Conference, October 1995.
E. H. Spafford. UNIX and Security: The Influences of History. Information Systems Security, 4(3):52-60, 1995.




