Search the dblp DataBase
Deborah A. Frincke :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dong Yu , Deborah A. Frincke Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference (2), 2005, pp:142-147 [Conf ] Norman Pendegraft , Mark Rounds , Deborah A. Frincke A simulation model of IS security. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference (2), 2005, pp:172-177 [Conf ] Dong Yu , Deborah A. Frincke A Novel Framework for Alert Correlation and Understanding. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:452-466 [Conf ] Calvin Ko , Deborah A. Frincke , Terrance Goan , Todd Heberlein , Karl N. Levitt , Biswanath Mukherjee , Christopher Wee Analysis of an Algorithm for Distributed Recognition and Accountability. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:154-164 [Conf ] Barbara Endicott-Popovsky , Deborah A. Frincke A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum. [Citation Graph (0, 0)][DBLP ] CSEE&T, 2004, pp:118-123 [Conf ] Brad Harvey , James A. Foster , Deborah A. Frincke Towards Byte Code Genetic Programming. [Citation Graph (0, 0)][DBLP ] GECCO, 1999, pp:1234- [Conf ] Brent Auernheimer , Deborah A. Frincke Techniques for Secure System Development - Introduction. [Citation Graph (0, 0)][DBLP ] HICSS, 1999, pp:- [Conf ] Deborah A. Frincke , Brent Auernheimer Techniques for Secure System Development. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:304-306 [Conf ] Dong Yu , Deborah A. Frincke Towards Survivable Intrusion Detection System . [Citation Graph (0, 0)][DBLP ] HICSS, 2004, pp:- [Conf ] Vincent C. Hu , Deborah A. Frincke , David F. Ferraiolo The Policy Machine for Security Policy Management. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2001, pp:494-506 [Conf ] Eivind Naess , Deborah A. Frincke , A. David McKinnon , David E. Bakken Configurable Middleware-Level Intrusion Detection for Embedded Systems. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:144-151 [Conf ] Huaqiang Wei , Deborah A. Frincke , Jim Alves-Foss , Terence Soule , Hugh Pforsich A layered decision model for cost-effective network defense. [Citation Graph (0, 0)][DBLP ] IRI, 2005, pp:506-511 [Conf ] Ovidiu Valentin Drugan , Ioanna Dionysiou , David E. Bakken , Thomas Plagemann , Carl H. Hauser , Deborah A. Frincke On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management. [Citation Graph (0, 0)][DBLP ] ISAS, 2005, pp:149-163 [Conf ] Robert F. Erbacher , Deborah A. Frincke Visualization in Detection of Intrusions and Misuse in Large Scale Networks. [Citation Graph (0, 0)][DBLP ] IV, 2000, pp:294-0 [Conf ] Jim Alves-Foss , Deborah A. Frincke Formal Grammar for Java. [Citation Graph (0, 0)][DBLP ] Formal Syntax and Semantics of Java, 1999, pp:1-40 [Conf ] Deborah A. Frincke , Myla Archer , Karl N. Levitt CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. [Citation Graph (0, 0)][DBLP ] KBSE, 1991, pp:151-160 [Conf ] Robert F. Erbacher , Kenneth L. Walker , Deborah A. Frincke Intrusion and Misuse Detection in Large-Scale Systems. [Citation Graph (0, 0)][DBLP ] IEEE Computer Graphics and Applications, 2002, v:22, n:1, pp:38-48 [Journal ] Deborah A. Frincke , Ming-Yuh Huang Recent advances in intrusion detection systems. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:34, n:4, pp:541-545 [Journal ] Cynthia E. Irvine , Shiu-Kai Chin , Deborah A. Frincke Integrating Security into the Curriculum. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1998, v:31, n:12, pp:25-30 [Journal ] Matt Bishop , Deborah A. Frincke Teaching Robust Programming. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:2, pp:54-57 [Journal ] Matt Bishop , Deborah A. Frincke A Human Endeavor: Lessons from Shakespeare and Beyond. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:49-51 [Journal ] Matt Bishop , Deborah A. Frincke Teaching Secure Programming. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:5, pp:54-56 [Journal ] Matt Bishop , Deborah A. Frincke Who Owns Your Computer? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:2, pp:61-63 [Journal ] Deborah A. Frincke Who Watches the Security Educators? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:3, pp:56-58 [Journal ] Deborah A. Frincke , Matt Bishop Guarding the Castle Keep: Teaching with the Fortress Metaphor. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:3, pp:69-72 [Journal ] Deborah A. Frincke , Matt Bishop Back to School. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:4, pp:54-56 [Journal ] Deborah A. Frincke , Matt Bishop Joining the Security Education Community. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:5, pp:61-63 [Journal ] Deborah A. Frincke , Matt Bishop Academic Degrees and Professional Certification. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:6, pp:56-58 [Journal ] Pak Chung Wong , Stuart J. Rose , George Chin Jr. , Deborah A. Frincke , Richard May , Christian Posse , Antonio Sanfilippo , Jim Thomas Walking the path: a new journey to explore and discover through visual analytics. [Citation Graph (0, 0)][DBLP ] Information Visualization, 2006, v:5, n:4, pp:237-249 [Journal ] Deborah A. Frincke Balancing cooperation and risk in intrusion detection. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:1, pp:1-29 [Journal ] Barbara Endicott-Popovsky , Deborah A. Frincke Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations. [Citation Graph (0, 0)][DBLP ] HCI (16), 2007, pp:364-372 [Conf ] Huaqiang Wei , Jim Alves-Foss , Du Zhang , Deborah A. Frincke Rationality Validation of a Layered Decision Model for Network Defense. [Citation Graph (0, 0)][DBLP ] IRI, 2007, pp:85-90 [Conf ] Deborah A. Frincke , Andreas Wespi , Diego Zamboni From intrusion detection to self-protection. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:5, pp:1233-1238 [Journal ] Dong Yu , Deborah A. Frincke Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:632-654 [Journal ] Deborah A. Frincke , S. Oudekirk , B. Popovsky Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. [Citation Graph (0, 0)][DBLP ] ACM Journal of Educational Resources in Computing, 2006, v:6, n:3, pp:- [Journal ] Deborah A. Frincke , S. Oudekirk , B. Popovsky Editorial: Resources for the computer security and information assurance curriculum. [Citation Graph (0, 0)][DBLP ] ACM Journal of Educational Resources in Computing, 2006, v:6, n:4, pp:- [Journal ] Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. [Citation Graph (, )][DBLP ] Drive-by-Downloads. [Citation Graph (, )][DBLP ] Calibration Testing Of Network Tap Devices. [Citation Graph (, )][DBLP ] Identifying and Analyzing Web Server Attacks. [Citation Graph (, )][DBLP ] Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution. [Citation Graph (, )][DBLP ] Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs. [Citation Graph (, )][DBLP ] Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. [Citation Graph (, )][DBLP ] An Approach to Trust Management Challenges for Critical Infrastructures. [Citation Graph (, )][DBLP ] Cognitive task analysis of network analysts and managers for network situational awareness. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.305secs