The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Deborah A. Frincke: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong Yu, Deborah A. Frincke
    Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:142-147 [Conf]
  2. Norman Pendegraft, Mark Rounds, Deborah A. Frincke
    A simulation model of IS security. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference (2), 2005, pp:172-177 [Conf]
  3. Dong Yu, Deborah A. Frincke
    A Novel Framework for Alert Correlation and Understanding. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:452-466 [Conf]
  4. Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee
    Analysis of an Algorithm for Distributed Recognition and Accountability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:154-164 [Conf]
  5. Barbara Endicott-Popovsky, Deborah A. Frincke
    A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum. [Citation Graph (0, 0)][DBLP]
    CSEE&T, 2004, pp:118-123 [Conf]
  6. Brad Harvey, James A. Foster, Deborah A. Frincke
    Towards Byte Code Genetic Programming. [Citation Graph (0, 0)][DBLP]
    GECCO, 1999, pp:1234- [Conf]
  7. Brent Auernheimer, Deborah A. Frincke
    Techniques for Secure System Development - Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  8. Deborah A. Frincke, Brent Auernheimer
    Techniques for Secure System Development. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:304-306 [Conf]
  9. Dong Yu, Deborah A. Frincke
    Towards Survivable Intrusion Detection System . [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  10. Vincent C. Hu, Deborah A. Frincke, David F. Ferraiolo
    The Policy Machine for Security Policy Management. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2001, pp:494-506 [Conf]
  11. Eivind Naess, Deborah A. Frincke, A. David McKinnon, David E. Bakken
    Configurable Middleware-Level Intrusion Detection for Embedded Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:144-151 [Conf]
  12. Huaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich
    A layered decision model for cost-effective network defense. [Citation Graph (0, 0)][DBLP]
    IRI, 2005, pp:506-511 [Conf]
  13. Ovidiu Valentin Drugan, Ioanna Dionysiou, David E. Bakken, Thomas Plagemann, Carl H. Hauser, Deborah A. Frincke
    On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management. [Citation Graph (0, 0)][DBLP]
    ISAS, 2005, pp:149-163 [Conf]
  14. Robert F. Erbacher, Deborah A. Frincke
    Visualization in Detection of Intrusions and Misuse in Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    IV, 2000, pp:294-0 [Conf]
  15. Jim Alves-Foss, Deborah A. Frincke
    Formal Grammar for Java. [Citation Graph (0, 0)][DBLP]
    Formal Syntax and Semantics of Java, 1999, pp:1-40 [Conf]
  16. Deborah A. Frincke, Myla Archer, Karl N. Levitt
    CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. [Citation Graph (0, 0)][DBLP]
    KBSE, 1991, pp:151-160 [Conf]
  17. Robert F. Erbacher, Kenneth L. Walker, Deborah A. Frincke
    Intrusion and Misuse Detection in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2002, v:22, n:1, pp:38-48 [Journal]
  18. Deborah A. Frincke, Ming-Yuh Huang
    Recent advances in intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:541-545 [Journal]
  19. Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke
    Integrating Security into the Curriculum. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:12, pp:25-30 [Journal]
  20. Matt Bishop, Deborah A. Frincke
    Teaching Robust Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:54-57 [Journal]
  21. Matt Bishop, Deborah A. Frincke
    A Human Endeavor: Lessons from Shakespeare and Beyond. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:49-51 [Journal]
  22. Matt Bishop, Deborah A. Frincke
    Teaching Secure Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:5, pp:54-56 [Journal]
  23. Matt Bishop, Deborah A. Frincke
    Who Owns Your Computer? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:61-63 [Journal]
  24. Deborah A. Frincke
    Who Watches the Security Educators? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:56-58 [Journal]
  25. Deborah A. Frincke, Matt Bishop
    Guarding the Castle Keep: Teaching with the Fortress Metaphor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:69-72 [Journal]
  26. Deborah A. Frincke, Matt Bishop
    Back to School. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:54-56 [Journal]
  27. Deborah A. Frincke, Matt Bishop
    Joining the Security Education Community. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:61-63 [Journal]
  28. Deborah A. Frincke, Matt Bishop
    Academic Degrees and Professional Certification. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:6, pp:56-58 [Journal]
  29. Pak Chung Wong, Stuart J. Rose, George Chin Jr., Deborah A. Frincke, Richard May, Christian Posse, Antonio Sanfilippo, Jim Thomas
    Walking the path: a new journey to explore and discover through visual analytics. [Citation Graph (0, 0)][DBLP]
    Information Visualization, 2006, v:5, n:4, pp:237-249 [Journal]
  30. Deborah A. Frincke
    Balancing cooperation and risk in intrusion detection. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:1, pp:1-29 [Journal]
  31. Barbara Endicott-Popovsky, Deborah A. Frincke
    Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations. [Citation Graph (0, 0)][DBLP]
    HCI (16), 2007, pp:364-372 [Conf]
  32. Huaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke
    Rationality Validation of a Layered Decision Model for Network Defense. [Citation Graph (0, 0)][DBLP]
    IRI, 2007, pp:85-90 [Conf]
  33. Deborah A. Frincke, Andreas Wespi, Diego Zamboni
    From intrusion detection to self-protection. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:5, pp:1233-1238 [Journal]
  34. Dong Yu, Deborah A. Frincke
    Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:632-654 [Journal]
  35. Deborah A. Frincke, S. Oudekirk, B. Popovsky
    Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Educational Resources in Computing, 2006, v:6, n:3, pp:- [Journal]
  36. Deborah A. Frincke, S. Oudekirk, B. Popovsky
    Editorial: Resources for the computer security and information assurance curriculum. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Educational Resources in Computing, 2006, v:6, n:4, pp:- [Journal]

  37. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. [Citation Graph (, )][DBLP]


  38. Drive-by-Downloads. [Citation Graph (, )][DBLP]


  39. Calibration Testing Of Network Tap Devices. [Citation Graph (, )][DBLP]


  40. Identifying and Analyzing Web Server Attacks. [Citation Graph (, )][DBLP]


  41. Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution. [Citation Graph (, )][DBLP]


  42. Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs. [Citation Graph (, )][DBLP]


  43. Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. [Citation Graph (, )][DBLP]


  44. An Approach to Trust Management Challenges for Critical Infrastructures. [Citation Graph (, )][DBLP]


  45. Cognitive task analysis of network analysts and managers for network situational awareness. [Citation Graph (, )][DBLP]


Search in 0.012secs, Finished in 0.013secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002