Deborah A. Frincke

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

39EEChristian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch: Identifying and Analyzing Web Server Attacks. IFIP Int. Conf. Digital Forensics 2008: 151-161
38EEBarbara Endicott-Popovsky, Deborah A. Frincke: Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations. HCI (16) 2007: 364-372
37EEBarbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke: Calibration Testing Of Network Tap Devices. IFIP Int. Conf. Digital Forensics 2007: 3-19
36EEHuaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke: Rationality Validation of a Layered Decision Model for Network Defense. IRI 2007: 85-90
35EEDong Yu, Deborah A. Frincke: Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. Computer Networks 51(3): 632-654 (2007)
34EEDeborah A. Frincke, Andreas Wespi, Diego Zamboni: From intrusion detection to self-protection. Computer Networks 51(5): 1233-1238 (2007)
33EEBarbara Endicott-Popovsky, Deborah A. Frincke, Carol A. Taylor: A Theoretical Framework for Organizational Network Forensic Readiness. JCP 2(3): 1-11 (2007)
32EEDeborah A. Frincke, S. Oudekirk, B. Popovsky: Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. ACM Journal of Educational Resources in Computing 6(3): (2006)
31EEDeborah A. Frincke, S. Oudekirk, B. Popovsky: Editorial: Resources for the computer security and information assurance curriculum. ACM Journal of Educational Resources in Computing 6(4): (2006)
30EEMatt Bishop, Deborah A. Frincke: Who Owns Your Computer? IEEE Security & Privacy 4(2): 61-63 (2006)
29EEPak Chung Wong, Stuart J. Rose, George Chin Jr., Deborah A. Frincke, Richard May, Christian Posse, Antonio Sanfilippo, Jim Thomas: Walking the path: a new journey to explore and discover through visual analytics. Information Visualization 5(4): 237-249 (2006)
28EEDong Yu, Deborah A. Frincke: Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. ACM Southeast Regional Conference (2) 2005: 142-147
27EENorman Pendegraft, Mark Rounds, Deborah A. Frincke: A simulation model of IS security. ACM Southeast Regional Conference (2) 2005: 172-177
26EEEivind Naess, Deborah A. Frincke, A. David McKinnon, David E. Bakken: Configurable Middleware-Level Intrusion Detection for Embedded Systems. ICDCS Workshops 2005: 144-151
25EEHuaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich: A layered decision model for cost-effective network defense. IRI 2005: 506-511
24EEOvidiu Valentin Drugan, Ioanna Dionysiou, David E. Bakken, Thomas Plagemann, Carl H. Hauser, Deborah A. Frincke: On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management. ISAS 2005: 149-163
23EEMatt Bishop, Deborah A. Frincke: A Human Endeavor: Lessons from Shakespeare and Beyond. IEEE Security & Privacy 3(4): 49-51 (2005)
22EEMatt Bishop, Deborah A. Frincke: Teaching Secure Programming. IEEE Security & Privacy 3(5): 54-56 (2005)
21EEDong Yu, Deborah A. Frincke: A Novel Framework for Alert Correlation and Understanding. ACNS 2004: 452-466
20EEBarbara Endicott-Popovsky, Deborah A. Frincke: A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum. CSEE&T 2004: 118-123
19EEDong Yu, Deborah A. Frincke: Towards Survivable Intrusion Detection System . HICSS 2004
18EEMatt Bishop, Deborah A. Frincke: Teaching Robust Programming. IEEE Security & Privacy 2(2): 54-57 (2004)
17EEDeborah A. Frincke, Matt Bishop: Guarding the Castle Keep: Teaching with the Fortress Metaphor. IEEE Security & Privacy 2(3): 69-72 (2004)
16EEDeborah A. Frincke, Matt Bishop: Back to School. IEEE Security & Privacy 2(4): 54-56 (2004)
15EEDeborah A. Frincke, Matt Bishop: Joining the Security Education Community. IEEE Security & Privacy 2(5): 61-63 (2004)
14EEDeborah A. Frincke, Matt Bishop: Academic Degrees and Professional Certification. IEEE Security & Privacy 2(6): 56-58 (2004)
13EEDeborah A. Frincke: Who Watches the Security Educators? IEEE Security & Privacy 1(3): 56-58 (2003)
12EERobert F. Erbacher, Kenneth L. Walker, Deborah A. Frincke: Intrusion and Misuse Detection in Large-Scale Systems. IEEE Computer Graphics and Applications 22(1): 38-48 (2002)
11EEVincent C. Hu, Deborah A. Frincke, David F. Ferraiolo: The Policy Machine for Security Policy Management. International Conference on Computational Science (2) 2001: 494-506
10EERobert F. Erbacher, Deborah A. Frincke: Visualization in Detection of Intrusions and Misuse in Large Scale Networks. IV 2000: 294-
9EEDeborah A. Frincke: Balancing cooperation and risk in intrusion detection. ACM Trans. Inf. Syst. Secur. 3(1): 1-29 (2000)
8EEDeborah A. Frincke, Ming-Yuh Huang: Recent advances in intrusion detection systems. Computer Networks 34(4): 541-545 (2000)
7EEJim Alves-Foss, Deborah A. Frincke: Formal Grammar for Java. Formal Syntax and Semantics of Java 1999: 1-40
6 Brad Harvey, James A. Foster, Deborah A. Frincke: Towards Byte Code Genetic Programming. GECCO 1999: 1234
5EEBrent Auernheimer, Deborah A. Frincke: Techniques for Secure System Development - Introduction. HICSS 1999
4EEDeborah A. Frincke, Brent Auernheimer: Techniques for Secure System Development. HICSS (3) 1998: 304-306
3 Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke: Integrating Security into the Curriculum. IEEE Computer 31(12): 25-30 (1998)
2EECalvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee: Analysis of an Algorithm for Distributed Recognition and Accountability. ACM Conference on Computer and Communications Security 1993: 154-164
1 Deborah A. Frincke, Myla Archer, Karl N. Levitt: CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. KBSE 1991: 151-160

Coauthor Index

1Jim Alves-Foss [7] [25] [36]
2Myla Archer [1]
3Brent Auernheimer [4] [5]
4David E. Bakken [24] [26]
5Matt Bishop [14] [15] [16] [17] [18] [22] [23] [30]
6Brian Chee [37]
7Shiu-Kai Chin [3]
8George Chin Jr. [29]
9Ioanna Dionysiou [24]
10Ovidiu Valentin Drugan [24]
11Barbara Endicott-Popovsky [20] [33] [37] [38] [39]
12Robert F. Erbacher [10] [12]
13David F. Ferraiolo [11]
14James A. Foster [6]
15Terrance Goan [2]
16Brad Harvey [6]
17Carl H. Hauser (Carl Hauser) [24]
18Todd L. Heberlein [2]
19Vincent C. Hu [11]
20Ming-Yuh Huang [8]
21Cynthia E. Irvine [3]
22Calvin Ko [2]
23Peter Komisarczuk [39]
24Karl N. Levitt [1] [2]
25Richard May [29]
26A. David McKinnon [26]
27Biswanath Mukherjee [2]
28Radu Muschevici [39]
29Eivind Naess [26]
30S. Oudekirk [31] [32]
31Norman Pendegraft [27]
32Hugh Pforsich [25]
33Thomas Plagemann [24]
34B. Popovsky [31] [32]
35Christian Posse [29]
36Stuart J. Rose [29]
37Mark Rounds [27]
38Antonio Sanfilippo [29]
39Christian Seifert [39]
40Terence Soule [25]
41Carol A. Taylor [33]
42James J. Thomas (Jim Thomas) [29]
43Kenneth L. Walker [12]
44Christopher Wee [2]
45Huaqiang Wei [25] [36]
46Ian Welch [39]
47Andreas Wespi [34]
48Pak Chung Wong [29]
49Dong Yu [19] [21] [28] [35]
50Diego Zamboni [34]
51Du Zhang [36]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)