متابعة
Deb Frincke
Deb Frincke
Associate Laboratory Director Sandia National Laboratories, head of National Security Programs
بريد إلكتروني تم التحقق منه على sandia.gov
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Smart-grid security issues
H Khurana, M Hadley, N Lu, DA Frincke
IEEE Security & Privacy 8 (1), 81-85, 2010
8442010
Intrusion and misuse detection in large-scale systems
RF Erbacher, KL Walker, DA Frincke
IEEE computer graphics and applications 22 (1), 38-47, 2002
2112002
Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation
FL Greitzer, DA Frincke
Insider threats in cyber security, 85-113, 2010
1842010
A framework for cooperative intrusion detection
D Frincke, D Tobin, J McConnell, J Marconi, D Polla
Proc. 21st NIST-NCSC National Information Systems Security Conference, 361-373, 1998
1541998
Integrating security into the curriculum
CE Irvine, SK Chin
Computer 31 (12), 25-30, 1998
1341998
Cost-benefit analysis for network intrusion detection systems
H Wei, D Frinke, O Carter, C Ritter
CSI 28th Annual Computer Security Conference, 29-31, 2001
1222001
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
D Yu, D Frincke
Proceedings of the 43rd annual ACM Southeast Conference-Volume 2, 142-147, 2005
1192005
Concerns about intrusions into remotely accessible substation controllers and SCADA systems
P Oman, E Schweitzer, D Frincke
Proceedings of the Twenty-Seventh Annual Western Protective Relay Conference 160, 2000
982000
A Theoretical Framework for Organizational Network Forensic Readiness.
B Endicott-Popovsky, DA Frincke, CA Taylor
J. Comput. 2 (3), 1-11, 2007
952007
Improving the quality of alerts and predicting intruder’s next goal with Hidden Colored Petri-Net
D Yu, D Frincke
Computer Networks 51 (3), 632-654, 2007
862007
A multi-phase network situational awareness cognitive task analysis
RF Erbacher, DA Frincke, PC Wong, S Moody, G Fink
Information Visualization 9 (3), 204-219, 2010
782010
A risk management approach to the “insider threat”
M Bishop, S Engle, DA Frincke, C Gates, FL Greitzer, S Peisert, S Whalen
Insider threats in cyber security, 115-137, 2010
742010
A novel framework for alert correlation and understanding
D Yu, D Frincke
Applied Cryptography and Network Security: Second International Conference …, 2004
662004
Balancing cooperation and risk in intrusion detection
D Frincke
ACM Transactions on Information and System Security (TISSEC) 3 (1), 1-29, 2000
662000
Specifying digital forensics: A forensics policy approach
C Taylor, B Endicott-Popovsky, DA Frincke
Digital investigation 4, 101-104, 2007
572007
Predictive modelling for insider threat mitigation
FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke
Richland, WA: Pacific Northwest National Laboratory, 6-17, 2009
522009
Teaching secure programming
M Bishop, DA Frincke
IEEE security & privacy 3 (5), 54-56, 2005
522005
Analysis of an algorithm for distributed recognition and accountability
C Ko, DA Frincke, T Goan Jr, T Heberlein, K Levitt, B Mukherjee, C Wee
Proceedings of the 1st ACM conference on Computer and communications …, 1993
521993
Social/ethical issues in predictive insider threat monitoring
FL Greitzer, D Frincke, M Zabriskie
Information assurance and security ethics in complex systems …, 2011
512011
Relationships and data sanitization: A study in scarlet
M Bishop, J Cummins, S Peisert, A Singh, B Bhumiratana, D Agarwal, ...
Proceedings of the 2010 New Security Paradigms Workshop, 151-164, 2010
452010
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20