dblp.uni-trier.dewww.uni-trier.de

Deborah A. Frincke Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
43EEBarbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval: Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. HCI (16) 2009: 138-147
2008
42EEChristian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch: Identifying and Analyzing Web Server Attacks. IFIP Int. Conf. Digital Forensics 2008: 151-161
41 Ioanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke: Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. SECRYPT 2008: 546-553
40EEMatt Bishop, Deborah A. Frincke: Information Assurance Education: A Work In Progress. IEEE Security & Privacy 6(5): 54-57 (2008)
2007
39EEBarbara Endicott-Popovsky, Deborah A. Frincke: Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations. HCI (16) 2007: 364-372
38EEBarbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke: Calibration Testing Of Network Tap Devices. IFIP Int. Conf. Digital Forensics 2007: 3-19
37EEHuaqiang Wei, Jim Alves-Foss, Du Zhang, Deborah A. Frincke: Rationality Validation of a Layered Decision Model for Network Defense. IRI 2007: 85-90
36EEDong Yu, Deborah A. Frincke: Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. Computer Networks 51(3): 632-654 (2007)
35EEDeborah A. Frincke, Andreas Wespi, Diego Zamboni: From intrusion detection to self-protection. Computer Networks 51(5): 1233-1238 (2007)
34EEMatt Bishop, Deborah A. Frincke: Achieving Learning Objectives through E-Voting Case Studies. IEEE Security & Privacy 5(1): 53-56 (2007)
33EEBarbara Endicott-Popovsky, Deborah A. Frincke, Carol A. Taylor: A Theoretical Framework for Organizational Network Forensic Readiness. JCP 2(3): 1-11 (2007)
2006
32EEDeborah A. Frincke, S. Oudekirk, B. Popovsky: Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. ACM Journal of Educational Resources in Computing 6(3): (2006)
31EEDeborah A. Frincke, S. Oudekirk, B. Popovsky: Editorial: Resources for the computer security and information assurance curriculum. ACM Journal of Educational Resources in Computing 6(4): (2006)
30EEMatt Bishop, Deborah A. Frincke: Who Owns Your Computer? IEEE Security & Privacy 4(2): 61-63 (2006)
29EEPak Chung Wong, Stuart J. Rose, George Chin Jr., Deborah A. Frincke, Richard May, Christian Posse, Antonio Sanfilippo, Jim Thomas: Walking the path: a new journey to explore and discover through visual analytics. Information Visualization 5(4): 237-249 (2006)
2005
28EEDong Yu, Deborah A. Frincke: Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. ACM Southeast Regional Conference (2) 2005: 142-147
27EENorman Pendegraft, Mark Rounds, Deborah A. Frincke: A simulation model of IS security. ACM Southeast Regional Conference (2) 2005: 172-177
26EEEivind Naess, Deborah A. Frincke, A. David McKinnon, David E. Bakken: Configurable Middleware-Level Intrusion Detection for Embedded Systems. ICDCS Workshops 2005: 144-151
25EEHuaqiang Wei, Deborah A. Frincke, Jim Alves-Foss, Terence Soule, Hugh Pforsich: A layered decision model for cost-effective network defense. IRI 2005: 506-511
24EEOvidiu Valentin Drugan, Ioanna Dionysiou, David E. Bakken, Thomas Plagemann, Carl H. Hauser, Deborah A. Frincke: On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management. ISAS 2005: 149-163
23EEMatt Bishop, Deborah A. Frincke: A Human Endeavor: Lessons from Shakespeare and Beyond. IEEE Security & Privacy 3(4): 49-51 (2005)
22EEMatt Bishop, Deborah A. Frincke: Teaching Secure Programming. IEEE Security & Privacy 3(5): 54-56 (2005)
2004
21EEDong Yu, Deborah A. Frincke: A Novel Framework for Alert Correlation and Understanding. ACNS 2004: 452-466
20EEBarbara Endicott-Popovsky, Deborah A. Frincke: A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum. CSEE&T 2004: 118-123
19EEDong Yu, Deborah A. Frincke: Towards Survivable Intrusion Detection System . HICSS 2004
18EEMatt Bishop, Deborah A. Frincke: Teaching Robust Programming. IEEE Security & Privacy 2(2): 54-57 (2004)
17EEDeborah A. Frincke, Matt Bishop: Guarding the Castle Keep: Teaching with the Fortress Metaphor. IEEE Security & Privacy 2(3): 69-72 (2004)
16EEDeborah A. Frincke, Matt Bishop: Back to School. IEEE Security & Privacy 2(4): 54-56 (2004)
15EEDeborah A. Frincke, Matt Bishop: Joining the Security Education Community. IEEE Security & Privacy 2(5): 61-63 (2004)
14EEDeborah A. Frincke, Matt Bishop: Academic Degrees and Professional Certification. IEEE Security & Privacy 2(6): 56-58 (2004)
2003
13EEDeborah A. Frincke: Who Watches the Security Educators? IEEE Security & Privacy 1(3): 56-58 (2003)
2002
12EERobert F. Erbacher, Kenneth L. Walker, Deborah A. Frincke: Intrusion and Misuse Detection in Large-Scale Systems. IEEE Computer Graphics and Applications 22(1): 38-48 (2002)
2001
11EEVincent C. Hu, Deborah A. Frincke, David F. Ferraiolo: The Policy Machine for Security Policy Management. International Conference on Computational Science (2) 2001: 494-506
2000
10EERobert F. Erbacher, Deborah A. Frincke: Visualization in Detection of Intrusions and Misuse in Large Scale Networks. IV 2000: 294-
9EEDeborah A. Frincke: Balancing cooperation and risk in intrusion detection. ACM Trans. Inf. Syst. Secur. 3(1): 1-29 (2000)
8EEDeborah A. Frincke, Ming-Yuh Huang: Recent advances in intrusion detection systems. Computer Networks 34(4): 541-545 (2000)
1999
7EEJim Alves-Foss, Deborah A. Frincke: Formal Grammar for Java. Formal Syntax and Semantics of Java 1999: 1-40
6 Brad Harvey, James A. Foster, Deborah A. Frincke: Towards Byte Code Genetic Programming. GECCO 1999: 1234
5EEBrent Auernheimer, Deborah A. Frincke: Techniques for Secure System Development - Introduction. HICSS 1999
1998
4EEDeborah A. Frincke, Brent Auernheimer: Techniques for Secure System Development. HICSS (3) 1998: 304-306
3 Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke: Integrating Security into the Curriculum. IEEE Computer 31(12): 25-30 (1998)
1993
2EECalvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee: Analysis of an Algorithm for Distributed Recognition and Accountability. ACM Conference on Computer and Communications Security 1993: 154-164
1991
1 Deborah A. Frincke, Myla Archer, Karl N. Levitt: CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. KBSE 1991: 151-160

Coauthor Index

1Jim Alves-Foss [7] [25] [37]
2Myla Archer [1]
3Brent Auernheimer [4] [5]
4Chiraag Uday Aval [43]
5David E. Bakken [24] [26] [41]
6Matt Bishop [14] [15] [16] [17] [18] [22] [23] [30] [34] [40]
7Brian Chee [38]
8Shiu-Kai Chin [3]
9George Chin Jr. [29]
10Ioanna Dionysiou [24] [41]
11Ovidiu Valentin Drugan [24]
12Barbara Endicott-Popovsky [20] [33] [38] [39] [42] [43]
13Robert F. Erbacher [10] [12]
14David F. Ferraiolo [11]
15James A. Foster [6]
16Terrance Goan [2]
17Brad Harvey [6]
18Carl H. Hauser (Carl Hauser) [24] [41]
19Todd L. Heberlein [2]
20Vincent C. Hu [11]
21Ming-Yuh Huang [8]
22Cynthia E. Irvine [3]
23Calvin Ko [2]
24Peter Komisarczuk [42]
25Karl N. Levitt [1] [2]
26Richard May [29]
27A. David McKinnon [26]
28Biswanath Mukherjee [2]
29Radu Muschevici [42]
30Eivind Naess [26]
31Julia Narvaez [43]
32Lori Ross O'Neil [43]
33S. Oudekirk [31] [32]
34Norman Pendegraft [27]
35Hugh Pforsich [25]
36Thomas Plagemann [24]
37B. Popovsky [31] [32]
38Christian Posse [29]
39Stuart J. Rose [29]
40Mark Rounds [27]
41Antonio Sanfilippo [29]
42Christian Seifert [42] [43]
43Terence Soule [25]
44Carol A. Taylor [33]
45James J. Thomas (Jim Thomas) [29]
46Kenneth L. Walker [12]
47Christopher Wee [2]
48Huaqiang Wei [25] [37]
49Ian Welch (Ian S. Welch) [42]
50Andreas Wespi [35]
51Pak Chung Wong [29]
52Dong Yu [19] [21] [28] [36]
53Diego Zamboni [35]
54Du Zhang [37]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)