2008 | ||
---|---|---|
39 | EE | Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch: Identifying and Analyzing Web Server Attacks. IFIP Int. Conf. Digital Forensics 2008: 151-161 |
2007 | ||
38 | EE | Barbara Endicott-Popovsky, Deborah A. Frincke: Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations. HCI (16) 2007: 364-372 |
37 | EE | Barbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke: Calibration Testing Of Network Tap Devices. IFIP Int. Conf. Digital Forensics 2007: 3-19 |
36 | EE | Huaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke: Rationality Validation of a Layered Decision Model for Network Defense. IRI 2007: 85-90 |
35 | EE | Dong Yu, Deborah A. Frincke: Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. Computer Networks 51(3): 632-654 (2007) |
34 | EE | Deborah A. Frincke, Andreas Wespi, Diego Zamboni: From intrusion detection to self-protection. Computer Networks 51(5): 1233-1238 (2007) |
33 | EE | Barbara Endicott-Popovsky, Deborah A. Frincke, Carol A. Taylor: A Theoretical Framework for Organizational Network Forensic Readiness. JCP 2(3): 1-11 (2007) |
2006 | ||
32 | EE | Deborah A. Frincke, S. Oudekirk, B. Popovsky: Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. ACM Journal of Educational Resources in Computing 6(3): (2006) |
31 | EE | Deborah A. Frincke, S. Oudekirk, B. Popovsky: Editorial: Resources for the computer security and information assurance curriculum. ACM Journal of Educational Resources in Computing 6(4): (2006) |
30 | EE | Matt Bishop, Deborah A. Frincke: Who Owns Your Computer? IEEE Security & Privacy 4(2): 61-63 (2006) |
29 | EE | Pak Chung Wong, Stuart J. Rose, George Chin Jr., Deborah A. Frincke, Richard May, Christian Posse, Antonio Sanfilippo, Jim Thomas: Walking the path: a new journey to explore and discover through visual analytics. Information Visualization 5(4): 237-249 (2006) |
2005 | ||
28 | EE | Dong Yu, Deborah A. Frincke: Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. ACM Southeast Regional Conference (2) 2005: 142-147 |
27 | EE | Norman Pendegraft, Mark Rounds, Deborah A. Frincke: A simulation model of IS security. ACM Southeast Regional Conference (2) 2005: 172-177 |
26 | EE | Eivind Naess, Deborah A. Frincke, A. David McKinnon, David E. Bakken: Configurable Middleware-Level Intrusion Detection for Embedded Systems. ICDCS Workshops 2005: 144-151 |
25 | EE | Huaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich: A layered decision model for cost-effective network defense. IRI 2005: 506-511 |
24 | EE | Ovidiu Valentin Drugan, Ioanna Dionysiou, David E. Bakken, Thomas Plagemann, Carl H. Hauser, Deborah A. Frincke: On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management. ISAS 2005: 149-163 |
23 | EE | Matt Bishop, Deborah A. Frincke: A Human Endeavor: Lessons from Shakespeare and Beyond. IEEE Security & Privacy 3(4): 49-51 (2005) |
22 | EE | Matt Bishop, Deborah A. Frincke: Teaching Secure Programming. IEEE Security & Privacy 3(5): 54-56 (2005) |
2004 | ||
21 | EE | Dong Yu, Deborah A. Frincke: A Novel Framework for Alert Correlation and Understanding. ACNS 2004: 452-466 |
20 | EE | Barbara Endicott-Popovsky, Deborah A. Frincke: A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum. CSEE&T 2004: 118-123 |
19 | EE | Dong Yu, Deborah A. Frincke: Towards Survivable Intrusion Detection System . HICSS 2004 |
18 | EE | Matt Bishop, Deborah A. Frincke: Teaching Robust Programming. IEEE Security & Privacy 2(2): 54-57 (2004) |
17 | EE | Deborah A. Frincke, Matt Bishop: Guarding the Castle Keep: Teaching with the Fortress Metaphor. IEEE Security & Privacy 2(3): 69-72 (2004) |
16 | EE | Deborah A. Frincke, Matt Bishop: Back to School. IEEE Security & Privacy 2(4): 54-56 (2004) |
15 | EE | Deborah A. Frincke, Matt Bishop: Joining the Security Education Community. IEEE Security & Privacy 2(5): 61-63 (2004) |
14 | EE | Deborah A. Frincke, Matt Bishop: Academic Degrees and Professional Certification. IEEE Security & Privacy 2(6): 56-58 (2004) |
2003 | ||
13 | EE | Deborah A. Frincke: Who Watches the Security Educators? IEEE Security & Privacy 1(3): 56-58 (2003) |
2002 | ||
12 | EE | Robert F. Erbacher, Kenneth L. Walker, Deborah A. Frincke: Intrusion and Misuse Detection in Large-Scale Systems. IEEE Computer Graphics and Applications 22(1): 38-48 (2002) |
2001 | ||
11 | EE | Vincent C. Hu, Deborah A. Frincke, David F. Ferraiolo: The Policy Machine for Security Policy Management. International Conference on Computational Science (2) 2001: 494-506 |
2000 | ||
10 | EE | Robert F. Erbacher, Deborah A. Frincke: Visualization in Detection of Intrusions and Misuse in Large Scale Networks. IV 2000: 294- |
9 | EE | Deborah A. Frincke: Balancing cooperation and risk in intrusion detection. ACM Trans. Inf. Syst. Secur. 3(1): 1-29 (2000) |
8 | EE | Deborah A. Frincke, Ming-Yuh Huang: Recent advances in intrusion detection systems. Computer Networks 34(4): 541-545 (2000) |
1999 | ||
7 | EE | Jim Alves-Foss, Deborah A. Frincke: Formal Grammar for Java. Formal Syntax and Semantics of Java 1999: 1-40 |
6 | Brad Harvey, James A. Foster, Deborah A. Frincke: Towards Byte Code Genetic Programming. GECCO 1999: 1234 | |
5 | EE | Brent Auernheimer, Deborah A. Frincke: Techniques for Secure System Development - Introduction. HICSS 1999 |
1998 | ||
4 | EE | Deborah A. Frincke, Brent Auernheimer: Techniques for Secure System Development. HICSS (3) 1998: 304-306 |
3 | Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke: Integrating Security into the Curriculum. IEEE Computer 31(12): 25-30 (1998) | |
1993 | ||
2 | EE | Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee: Analysis of an Algorithm for Distributed Recognition and Accountability. ACM Conference on Computer and Communications Security 1993: 154-164 |
1991 | ||
1 | Deborah A. Frincke, Myla Archer, Karl N. Levitt: CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. KBSE 1991: 151-160 |