default search action
Richard Ford
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Vassil S. Dimitrov, Richard Ford, Laurent Imbert, Arjuna Madanayake, Nilan Udayanga, Will Wray:
Multiple-base Logarithmic Quantization and Application in Reduced Precision AI Computations. ARITH 2024: 48-51
2010 – 2019
- 2016
- [c20]Mark E. Fioravanti II, Matt Bishop, Richard Ford:
I'm not sure if we're okay: uncertainty for attackers and defenders. NSPW 2016: 1-10 - 2015
- [j29]Richard Ford, Kerry Rice:
Value-Added Results for Public Virtual Schools in California. J. Educ. Technol. Soc. 18(4): 412-423 (2015) - 2014
- [j28]Richard Ford, Marco M. Carvalho:
Protecting Me. IEEE Secur. Priv. 12(1): 80-82 (2014) - [j27]Marco M. Carvalho, Richard Ford:
Moving-Target Defenses for Computer Networks. IEEE Secur. Priv. 12(2): 73-76 (2014) - [j26]Marco M. Carvalho, Jared DeMott, Richard Ford, David A. Wheeler:
Heartbleed 101. IEEE Secur. Priv. 12(4): 63-67 (2014) - [c19]Mark E. Fioravanti II, Richard Ford:
Bacterial quorum sensing for coordination of targeted malware. MALWARE 2014: 101-108 - 2013
- [j25]Ian Koss, Richard Ford:
Authorship Is Continuous: Managing Code Plagiarism. IEEE Secur. Priv. 11(2): 72-74 (2013) - 2012
- [j24]Tauhida Parveen, Scott R. Tilley, William H. Allen, Gerald A. Marin, Richard Ford:
Detecting Emulated Environments. Int. J. Softw. Eng. Knowl. Eng. 22(7): 927-944 (2012) - [c18]Marco M. Carvalho, Richard Ford:
NextVC2 - A next generation virtual world command and control. MILCOM 2012: 1-6 - [c17]Richard Ford, Liam M. Mayron:
All your base are belong to US. NSPW 2012: 105-114 - [e4]Richard Ford, Mary Ellen Zurko, Cormac Herley, Tara Whalen:
The New Security Paradigms Workshop, NSPW '12, Bertinoro, Italy - September 18 - 21, 2012. ACM 2012, ISBN 978-1-4503-1794-8 [contents] - 2011
- [c16]Matt Bishop, Richard Ford, Marco Ramilli:
Results-oriented security. MALWARE 2011: 42-49 - [c15]Matt Bishop, Marco M. Carvalho, Richard Ford, Liam M. Mayron:
Resilience is more than availability. NSPW 2011: 95-104 - [e3]Sean Peisert, Richard Ford, Carrie Gates, Cormac Herley:
2011 New Security Paradigms Workshop, NSPW '11, Marin County, CA, USA, September 12-15, 2011. ACM 2011, ISBN 978-1-4503-1078-9 [contents] - 2010
- [j23]Richard Ford, Deborah A. Frincke:
Building a Better Boot Camp. IEEE Secur. Priv. 8(1): 68-71 (2010) - [c14]Eyosias Yoseph Imana, Fredric M. Ham, William H. Allen, Richard Ford:
Proactive reputation-based defense for MANETs using radial basis function neural networks. IJCNN 2010: 1-6 - [e2]Angelos D. Keromytis, Sean Peisert, Richard Ford, Carrie Gates:
Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA, USA, September 21-23, 2010. ACM 2010, ISBN 978-1-4503-0415-3 [contents]
2000 – 2009
- 2009
- [j22]Richard Ford, William H. Allen:
Malware Shall Greatly Increase .... IEEE Secur. Priv. 7(6): 69-71 (2009) - [j21]Katherine Hoffman, Attila Ondi, Richard Ford, Marco M. Carvalho, Derek Brown, William H. Allen, Gerald A. Marin:
Danger theory and collaborative filtering in MANETs. J. Comput. Virol. 5(4): 345-355 (2009) - [c13]Attila Ondi, Katherine Hoffman, Carlos Perez, Richard Ford, Marco M. Carvalho, William H. Allen:
Security in MANETs using reputation-adjusted routing. Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009: 734406 - [c12]Fredric M. Ham, Eyosias Yoseph Imana, Attila Ondi, Richard Ford, William H. Allen, Matthew Reedy:
Reputation Prediction in Mobile Ad Hoc Networks Using RBF Neural Networks. EANN 2009: 485-494 - [c11]Richard Ford, William H. Allen, Katherine Hoffman, Attila Ondi, Marco M. Carvalho:
Generic Danger Detection for Mission Continuity. NCA 2009: 102-107 - [c10]Anil Somayaji, Yiru Li, Hajime Inoue, José M. Fernandez, Richard Ford:
Evaluating Security Products with Clinical Trials. CSET 2009 - [e1]Anil Somayaji, Richard Ford:
Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009. ACM 2009, ISBN 978-1-60558-845-2 [contents] - 2008
- [j20]Michael Workman, Richard Ford, William H. Allen:
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks. Inf. Secur. J. A Glob. Perspect. 17(5&6): 267-277 (2008) - [j19]Geoffrey Mazeroff, Jens Gregor, Michael G. Thomason, Richard Ford:
Probabilistic suffix models for API sequence analysis of Windows XP applications. Pattern Recognit. 41(1): 90-101 (2008) - [c9]Marco Carvalho, Richard Ford, William H. Allen, Gerald A. Marin:
Securing MANETs with BITSI: danger theory and mission continuity. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 69730D - [c8]Steven J. Greenwald, Brian D. Snow, Richard Ford, Richard Thieme:
Towards an ethical code for information security? NSPW 2008: 75-87 - [c7]Tauhida Parveen, William H. Allen, Scott R. Tilley, Gerald A. Marin, Richard Ford:
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls. SEKE 2008: 802-807 - 2007
- [j18]Richard Ford, William H. Allen:
How Not to Be Seen. IEEE Secur. Priv. 5(1): 67-69 (2007) - [j17]William H. Allen, Richard Ford:
How Not to Be Seen II: The Defenders Fight Back. IEEE Secur. Priv. 5(6): 65-68 (2007) - [j16]Richard Ford:
Open vs. closed: which source is more secure? ACM Queue 5(1): 32-38 (2007) - [j15]Attila Ondi, Richard Ford:
How good is good enough? Metrics for worm/anti-worm evaluation. J. Comput. Virol. 3(2): 93-101 (2007) - [c6]Attila Ondi, Richard Ford:
Modeling malcode with Hephaestus: beyond simple spread. ACM Southeast Regional Conference 2007: 379-384 - [c5]Attila Ondi, Ronaldo Menezes, Richard Ford:
Network Distribution of Security Policies via Ant-like Foraging Behavior. ICIW 2007: 64 - 2006
- [j14]Richard Ford, Mark Bush, Alexander Bulatov:
Predation and the cost of replication: New approaches to malware prevention? Comput. Secur. 25(4): 257-264 (2006) - [j13]James A. Whittaker, Richard Ford:
How to Think about Security. IEEE Secur. Priv. 4(2): 68-71 (2006) - [j12]Sarah Gordon, Richard Ford:
On the definition and classification of cybercrime. J. Comput. Virol. 2(1): 13-20 (2006) - [c4]Richard Ford, Sarah Gordon:
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. NSPW 2006: 3-10 - 2005
- [j11]Richard Ford:
Malcode Mysteries Revealed. IEEE Secur. Priv. 3(3): 72-75 (2005) - [j10]Ibrahim K. El-Far, Richard Ford, Attila Ondi, Manan Pancholi:
Suppressing the Spread of Email Malcode using Short-term Message Recall. J. Comput. Virol. 1(1-2): 4-12 (2005) - [c3]Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 - [c2]Richard Ford, Mark Bush, Alex Boulatov:
Internet instability and disturbance: goal or menace? NSPW 2005: 3-8 - [c1]Ronaldo Menezes, Richard Ford, Attila Ondi:
Swarming computer security: an experiment in policy distribution. SIS 2005: 436-439 - 2004
- [j9]Richard Ford:
The Wrong Stuff? IEEE Secur. Priv. 2(3): 86-89 (2004) - [j8]Richard Ford:
The future of virus detection. Inf. Secur. Tech. Rep. 9(2): 19-26 (2004) - [j7]Herbert H. Thompson, Richard Ford:
Perfect Storm: The Insider, Naivety, and Hostility. ACM Queue 2(4): 58-65 (2004) - 2002
- [j6]Sarah Gordon, Richard Ford:
Cyberterrorism? Comput. Secur. 21(7): 636-647 (2002)
1990 – 1999
- 1999
- [j5]Richard Ford:
Malware: Troy revisited. Comput. Secur. 18(2): 105-108 (1999) - [j4]Richard Ford:
No suprises in Melissa Land. Comput. Secur. 18(4): 300-302 (1999) - 1998
- [j3]Richard Ford:
What a littledefinution can do. Comput. Secur. 17(2): 110-114 (1998) - [j2]Richard Ford:
May you live in interesting times. Comput. Secur. 17(7): 575-578 (1998)
1970 – 1979
- 1978
- [j1]Richard Ford:
Evolution of a teleprocessing network. Comput. Commun. 1(3): 145-148 (1978)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint