Ikuti
Dorothy Denning
Dorothy Denning
Professor of Defense Analysis, Naval Postgraduate School
Email yang diverifikasi di nps.edu - Beranda
Judul
Dikutip oleh
Dikutip oleh
Tahun
An intrusion-detection model
DE Denning
IEEE Transactions on software engineering, 222-232, 1987
63591987
Cryptography and data security
DE Denning
35441982
A lattice model of secure information flow
DE Denning
Communications of the ACM 19 (5), 236-243, 1976
29711976
Certification of programs for secure information flow
DE Denning, PJ Denning
Communications of the ACM 20 (7), 504-513, 1977
15721977
Timestamps in key distribution protocols
DE Denning, GM Sacco
Communications of the ACM 24 (8), 533-536, 1981
13091981
Information warfare and security
DER Denning
Addison-Wesley, 1999
12151999
Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy
DE Denning
Networks and netwars: The future of terror, crime, and militancy 239, 288, 2001
9202001
Method and apparatus for authenticating the location of remote users of networked computing systems
PF MacDoran, MB Mathews, FA Ziel, KL Gold, SM Anderson, MA Coffey, ...
US Patent 5,757,916, 1998
5291998
The SeaView security model
TF Lunt, DE Denning, RR Schell, M Heckman, WR Shockley
IEEE Transactions on software engineering 16 (6), 593-607, 1990
4841990
Cyberterrorism: The logic bomb versus the truck bomb
DE Denning
Cyberspace Crime, 217-225, 2017
431*2017
Location-based authentication: Grounding cyberspace for better security
DE Denning, PF MacDoran
Computer Fraud & Security 1996 (2), 12-16, 1996
3691996
Requirements and model for IDES-a real-time intrusion-detection expert system
D Denning, PG Neumann
SRI International, 1985
3531985
The tracker: A threat to statistical database security
DE Denning, PJ Denning
ACM Transactions on Database Systems (TODS) 4 (1), 76-96, 1979
3371979
Data security
DE Denning, PJ Denning
ACM computing surveys (CSUR) 11 (3), 227-249, 1979
3361979
System and method for delivering encrypted information in a communication network using location identity and key tables
DE Denning, BJ Glick, RS Karpf, ME Seiler
US Patent 7,143,289, 2006
3102006
Secure statistical databases with random sample queries
DE Denning
ACM Transactions on Database Systems (TODS) 5 (3), 291-315, 1980
3061980
A taxonomy for key escrow encryption systems
DE Denning, DK Branstad
Communications of the ACM 39 (3), 34-40, 1996
3021996
A multilevel relational data model
DE Denning, TF Lunt
1987 IEEE Symposium on Security and Privacy, 220-220, 1987
2631987
Honeyfiles: deceptive files for intrusion detection
J Yuill, M Zappe, D Denning, F Feer
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
2332004
Views for multilevel database security
DE Denning, SG Akl, M Heckman, TF Lunt, M Morgenstern, PG Neumann, ...
IEEE Transactions on Software Engineering, 129-140, 1987
2311987
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20