The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Donald G. Marks: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani M. Thuraisingham
    Security and Data Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:391-399 [Conf]
  2. William V. Maconachy, Thomas Harper, Donald G. Marks, Terry Mayfield
    Selected Topics in Infrastructure and Information Assurance (Panel). [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:97-113 [Conf]
  3. Donald G. Marks
    Enforcing Integrity While Maintaining Secrecy. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:237-251 [Conf]
  4. Donald G. Marks, Leonard J. Binns, Bhavani M. Thuraisingham
    Hypersemantic Data Modeling for Inference Analysis. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:157-180 [Conf]
  5. Donald G. Marks, Amihai Motro, Sushil Jajodia
    Enhancing the Controlled Disclosure of Sensitive Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:290-303 [Conf]
  6. Amihai Motro, Donald G. Marks, Sushil Jajodia
    Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:431-445 [Conf]
  7. Peter Mell, Donald G. Marks, Mark McLarnon
    A denial-of-service resistant intrusion detection architecture. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:641-658 [Journal]
  8. Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer
    Computer Forensics Education. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:15-23 [Journal]
  9. Donald G. Marks, Peter Mell, Michael Stinson
    Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal]
  10. Donald G. Marks, Peter J. Sell, Bhavani M. Thuraisingham
    MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications. [Citation Graph (0, 0)][DBLP]
    JOOP, 1996, v:9, n:4, pp:22-29 [Journal]
  11. Donald G. Marks
    Inference in MLS Database Systems. [Citation Graph (0, 5)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:46-55 [Journal]

Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002