2008 |
39 | EE | Christian Seifert,
Barbara Endicott-Popovsky,
Deborah A. Frincke,
Peter Komisarczuk,
Radu Muschevici,
Ian Welch:
Identifying and Analyzing Web Server Attacks.
IFIP Int. Conf. Digital Forensics 2008: 151-161 |
2007 |
38 | EE | Barbara Endicott-Popovsky,
Deborah A. Frincke:
Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations.
HCI (16) 2007: 364-372 |
37 | EE | Barbara Endicott-Popovsky,
Brian Chee,
Deborah A. Frincke:
Calibration Testing Of Network Tap Devices.
IFIP Int. Conf. Digital Forensics 2007: 3-19 |
36 | EE | Huaqiang Wei,
Jim Alves-Foss,
Du Zhang,
Deborah A. Frincke:
Rationality Validation of a Layered Decision Model for Network Defense.
IRI 2007: 85-90 |
35 | EE | Dong Yu,
Deborah A. Frincke:
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net.
Computer Networks 51(3): 632-654 (2007) |
34 | EE | Deborah A. Frincke,
Andreas Wespi,
Diego Zamboni:
From intrusion detection to self-protection.
Computer Networks 51(5): 1233-1238 (2007) |
33 | EE | Barbara Endicott-Popovsky,
Deborah A. Frincke,
Carol A. Taylor:
A Theoretical Framework for Organizational Network Forensic Readiness.
JCP 2(3): 1-11 (2007) |
2006 |
32 | EE | Deborah A. Frincke,
S. Oudekirk,
B. Popovsky:
Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1.
ACM Journal of Educational Resources in Computing 6(3): (2006) |
31 | EE | Deborah A. Frincke,
S. Oudekirk,
B. Popovsky:
Editorial: Resources for the computer security and information assurance curriculum.
ACM Journal of Educational Resources in Computing 6(4): (2006) |
30 | EE | Matt Bishop,
Deborah A. Frincke:
Who Owns Your Computer?
IEEE Security & Privacy 4(2): 61-63 (2006) |
29 | EE | Pak Chung Wong,
Stuart J. Rose,
George Chin Jr.,
Deborah A. Frincke,
Richard May,
Christian Posse,
Antonio Sanfilippo,
Jim Thomas:
Walking the path: a new journey to explore and discover through visual analytics.
Information Visualization 5(4): 237-249 (2006) |
2005 |
28 | EE | Dong Yu,
Deborah A. Frincke:
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory.
ACM Southeast Regional Conference (2) 2005: 142-147 |
27 | EE | Norman Pendegraft,
Mark Rounds,
Deborah A. Frincke:
A simulation model of IS security.
ACM Southeast Regional Conference (2) 2005: 172-177 |
26 | EE | Eivind Naess,
Deborah A. Frincke,
A. David McKinnon,
David E. Bakken:
Configurable Middleware-Level Intrusion Detection for Embedded Systems.
ICDCS Workshops 2005: 144-151 |
25 | EE | Huaqiang Wei,
Deborah A. Frincke,
Jim Alves-Foss,
Terence Soule,
Hugh Pforsich:
A layered decision model for cost-effective network defense.
IRI 2005: 506-511 |
24 | EE | Ovidiu Valentin Drugan,
Ioanna Dionysiou,
David E. Bakken,
Thomas Plagemann,
Carl H. Hauser,
Deborah A. Frincke:
On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management.
ISAS 2005: 149-163 |
23 | EE | Matt Bishop,
Deborah A. Frincke:
A Human Endeavor: Lessons from Shakespeare and Beyond.
IEEE Security & Privacy 3(4): 49-51 (2005) |
22 | EE | Matt Bishop,
Deborah A. Frincke:
Teaching Secure Programming.
IEEE Security & Privacy 3(5): 54-56 (2005) |
2004 |
21 | EE | Dong Yu,
Deborah A. Frincke:
A Novel Framework for Alert Correlation and Understanding.
ACNS 2004: 452-466 |
20 | EE | Barbara Endicott-Popovsky,
Deborah A. Frincke:
A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum.
CSEE&T 2004: 118-123 |
19 | EE | Dong Yu,
Deborah A. Frincke:
Towards Survivable Intrusion Detection System .
HICSS 2004 |
18 | EE | Matt Bishop,
Deborah A. Frincke:
Teaching Robust Programming.
IEEE Security & Privacy 2(2): 54-57 (2004) |
17 | EE | Deborah A. Frincke,
Matt Bishop:
Guarding the Castle Keep: Teaching with the Fortress Metaphor.
IEEE Security & Privacy 2(3): 69-72 (2004) |
16 | EE | Deborah A. Frincke,
Matt Bishop:
Back to School.
IEEE Security & Privacy 2(4): 54-56 (2004) |
15 | EE | Deborah A. Frincke,
Matt Bishop:
Joining the Security Education Community.
IEEE Security & Privacy 2(5): 61-63 (2004) |
14 | EE | Deborah A. Frincke,
Matt Bishop:
Academic Degrees and Professional Certification.
IEEE Security & Privacy 2(6): 56-58 (2004) |
2003 |
13 | EE | Deborah A. Frincke:
Who Watches the Security Educators?
IEEE Security & Privacy 1(3): 56-58 (2003) |
2002 |
12 | EE | Robert F. Erbacher,
Kenneth L. Walker,
Deborah A. Frincke:
Intrusion and Misuse Detection in Large-Scale Systems.
IEEE Computer Graphics and Applications 22(1): 38-48 (2002) |
2001 |
11 | EE | Vincent C. Hu,
Deborah A. Frincke,
David F. Ferraiolo:
The Policy Machine for Security Policy Management.
International Conference on Computational Science (2) 2001: 494-506 |
2000 |
10 | EE | Robert F. Erbacher,
Deborah A. Frincke:
Visualization in Detection of Intrusions and Misuse in Large Scale Networks.
IV 2000: 294- |
9 | EE | Deborah A. Frincke:
Balancing cooperation and risk in intrusion detection.
ACM Trans. Inf. Syst. Secur. 3(1): 1-29 (2000) |
8 | EE | Deborah A. Frincke,
Ming-Yuh Huang:
Recent advances in intrusion detection systems.
Computer Networks 34(4): 541-545 (2000) |
1999 |
7 | EE | Jim Alves-Foss,
Deborah A. Frincke:
Formal Grammar for Java.
Formal Syntax and Semantics of Java 1999: 1-40 |
6 | | Brad Harvey,
James A. Foster,
Deborah A. Frincke:
Towards Byte Code Genetic Programming.
GECCO 1999: 1234 |
5 | EE | Brent Auernheimer,
Deborah A. Frincke:
Techniques for Secure System Development - Introduction.
HICSS 1999 |
1998 |
4 | EE | Deborah A. Frincke,
Brent Auernheimer:
Techniques for Secure System Development.
HICSS (3) 1998: 304-306 |
3 | | Cynthia E. Irvine,
Shiu-Kai Chin,
Deborah A. Frincke:
Integrating Security into the Curriculum.
IEEE Computer 31(12): 25-30 (1998) |
1993 |
2 | EE | Calvin Ko,
Deborah A. Frincke,
Terrance Goan,
Todd L. Heberlein,
Karl N. Levitt,
Biswanath Mukherjee,
Christopher Wee:
Analysis of an Algorithm for Distributed Recognition and Accountability.
ACM Conference on Computer and Communications Security 1993: 154-164 |
1991 |
1 | | Deborah A. Frincke,
Myla Archer,
Karl N. Levitt:
CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms.
KBSE 1991: 151-160 |