עקוב אחר
Deb Frincke
Deb Frincke
Associate Laboratory Director Sandia National Laboratories, head of National Security Programs
כתובת אימייל מאומתת בדומיין sandia.gov
כותרת
צוטט על ידי
צוטט על ידי
שנה
Smart-grid security issues
H Khurana, M Hadley, N Lu, DA Frincke
IEEE Security & Privacy 8 (1), 81-85, 2010
8322010
Intrusion and misuse detection in large-scale systems
RF Erbacher, KL Walker, DA Frincke
IEEE computer graphics and applications 22 (1), 38-47, 2002
2112002
Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation
FL Greitzer, DA Frincke
Insider threats in cyber security, 85-113, 2010
1652010
A framework for cooperative intrusion detection
D Frincke, D Tobin, J McConnell, J Marconi, D Polla
Proc. 21st NIST-NCSC National Information Systems Security Conference, 361-373, 1998
1571998
Integrating security into the curriculum
CE Irvine, SK Chin
Computer 31 (12), 25-30, 1998
1311998
Cost-benefit analysis for network intrusion detection systems
H Wei, D Frinke, O Carter, C Ritter
CSI 28th Annual Computer Security Conference, 29-31, 2001
1212001
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
D Yu, D Frincke
Proceedings of the 43rd annual Southeast regional conference-Volume 2, 142-147, 2005
1132005
Concerns about intrusions into remotely accessible substation controllers and SCADA systems
P Oman, E Schweitzer, D Frincke
Proceedings of the Twenty-Seventh Annual Western Protective Relay Conference 160, 2000
1002000
A Theoretical Framework for Organizational Network Forensic Readiness.
B Endicott-Popovsky, DA Frincke, CA Taylor
J. Comput. 2 (3), 1-11, 2007
912007
Improving the quality of alerts and predicting intruder’s next goal with Hidden Colored Petri-Net
D Yu, D Frincke
Computer Networks 51 (3), 632-654, 2007
852007
A multi-phase network situational awareness cognitive task analysis
RF Erbacher, DA Frincke, PC Wong, S Moody, G Fink
Information Visualization 9 (3), 204-219, 2010
782010
A risk management approach to the “insider threat”
M Bishop, S Engle, DA Frincke, C Gates, FL Greitzer, S Peisert, S Whalen
Insider threats in cyber security, 115-137, 2010
712010
Balancing cooperation and risk in intrusion detection
D Frincke
ACM Transactions on Information and System Security (TISSEC) 3 (1), 1-29, 2000
672000
A novel framework for alert correlation and understanding
D Yu, D Frincke
Applied Cryptography and Network Security: Second International Conference …, 2004
642004
Specifying digital forensics: A forensics policy approach
C Taylor, B Endicott-Popovsky, DA Frincke
Digital investigation 4, 101-104, 2007
542007
Predictive modeling for insider threat mitigation
FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke
Richland, WA: Pacific Northwest National Laboratory, 6-17, 2009
532009
Analysis of an algorithm for distributed recognition and accountability
C Ko, DA Frincke, T Goan Jr, T Heberlein, K Levitt, B Mukherjee, C Wee
Proceedings of the 1st ACM conference on Computer and communications …, 1993
531993
Teaching secure programming
M Bishop, DA Frincke
IEEE security & privacy 3 (5), 54-56, 2005
502005
Social/ethical issues in predictive insider threat monitoring
FL Greitzer, D Frincke, M Zabriskie
Information assurance and security ethics in complex systems …, 2011
492011
Relationships and data sanitization: A study in scarlet
M Bishop, J Cummins, S Peisert, A Singh, B Bhumiratana, D Agarwal, ...
Proceedings of the 2010 New Security Paradigms Workshop, 151-164, 2010
452010
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20