Deborah A. Frincke

Affiliations:
  • National Security Agency, Washington, D.C., USA


According to our database1, Deborah A. Frincke authored at least 70 papers between 1990 and 2021.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2019, "For contributions in education, the practice of research, and the leadership of cybersecurity".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Research Road Map for Building Secure and Resilient Software-Intensive Systems.
IEEE Secur. Priv., 2021

2019
Keynote: Modern Challenges for Cyber Defense.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2015
Editorial.
Comput. Networks, 2015

2013
Leveraging 2<sup>nd</sup> life as a communications media: An effective tool for security awareness training.
Proceedings of the IEEE International Professonal Communication 2013 Conference, 2013

2011
Living with Insecurity.
IEEE Secur. Priv., 2011

National Laboratory panel.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation.
Proceedings of the Insider Threats in Cyber Security, 2010

A Risk Management Approach to the "Insider Threat".
Proceedings of the Insider Threats in Cyber Security, 2010

A multi-phase network situational awareness cognitive task analysis.
Inf. Vis., 2010

Demythifying Cybersecurity.
IEEE Secur. Priv., 2010

Smart-Grid Security Issues.
IEEE Secur. Priv., 2010

Building a Better Boot Camp.
IEEE Secur. Priv., 2010

Cognitive task analysis of network analysts and managers for network situational awareness.
Proceedings of the Visualization and Data Analysis, 2010

Relationships and data sanitization: a study in scarlet.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Drive-by-Downloads.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks.
Proceedings of the Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 2009

DOE grass roots panel.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
A Layered Decision Model for cost-effective system security.
Int. J. Inf. Comput. Secur., 2008

Information Assurance Education: A Work In Progress.
IEEE Secur. Priv., 2008

Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities.
Proceedings of the SECRYPT 2008, 2008

Identifying and Analyzing Web Server Attacks.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
Autonomic Computing: Freedom or Threat?
login Usenix Mag., 2007

A Theoretical Framework for Organizational Network Forensic Readiness.
J. Comput., 2007

Achieving Learning Objectives through E-Voting Case Studies.
IEEE Secur. Priv., 2007

Specifying digital forensics: A forensics policy approach.
Digit. Investig., 2007

Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net.
Comput. Networks, 2007

From intrusion detection to self-protection.
Comput. Networks, 2007

Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Rationality Validation of a Layered Decision Model for Network Defense.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Calibration Testing Of Network Tap Devices.
Proceedings of the Advances in Digital Forensics III, 2007

Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations.
Proceedings of the Foundations of Augmented Cognition, 2007

An Approach to Trust Management Challenges for Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Editorial: Resources for the computer security and information assurance curriculum.
ACM J. Educ. Resour. Comput., 2006

Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1.
ACM J. Educ. Resour. Comput., 2006

Walking the path: a new journey to explore and discover through visual analytics.
Inf. Vis., 2006

Who Owns Your Computer?
IEEE Secur. Priv., 2006

2005
Teaching Secure Programming.
IEEE Secur. Priv., 2005

A Human Endeavor: Lessons from Shakespeare and Beyond.
IEEE Secur. Priv., 2005

On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management.
Proceedings of the Service Availability, 2005

A layered decision model for cost-effective network defense.
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005

Configurable Middleware-Level Intrusion Detection for Embedded Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

A simulation model of IS security.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Academic Degrees and Professional Certification.
IEEE Secur. Priv., 2004

Joining the Security Education Community.
IEEE Secur. Priv., 2004

Back to School.
IEEE Secur. Priv., 2004

Guarding the Castle Keep: Teaching with the Fortress Metaphor.
IEEE Secur. Priv., 2004

Teaching Robust Programming.
IEEE Secur. Priv., 2004

Towards Survivable Intrusion Detection System .
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum.
Proceedings of the 17th Conference on Software Engineering Education and Training (CSEE&T 2004), 2004

A Novel Framework for Alert Correlation and Understanding.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Who Watches the Security Educators?
IEEE Secur. Priv., 2003

2002
Intrusion and Misuse Detection in Large-Scale Systems.
IEEE Computer Graphics and Applications, 2002

2001
The Policy Machine for Security Policy Management.
Proceedings of the Computational Science - ICCS 2001, 2001

2000
Balancing cooperation and risk in intrusion detection.
ACM Trans. Inf. Syst. Secur., 2000

Recent advances in intrusion detection systems.
Comput. Networks, 2000

Visualization in Detection of Intrusions and Misuse in Large Scale Networks.
Proceedings of the International Conference on Information Visualisation, 2000

1999
Formal Grammar for Java.
Proceedings of the Formal Syntax and Semantics of Java, 1999

Techniques for Secure System Development - Introduction.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Towards Byte Code Genetic Programming.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 1999

1998
Integrating Security into the Curriculum.
Computer, 1998

Techniques for Secure System Development.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1996
Trust mechanisms for Hummingbird.
XRDS, 1996

1993
Analysis of an Algorithm for Distributed Recognition and Accountability.
Proceedings of the CCS '93, 1993

1991
An application of template methodology: rapid prototyping of user interface management systems.
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991

Effectiveness of operating system prototyping from a template: application to MINIX.
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991

CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms.
Proceedings of the Proceedings 6th Annual Knowledge-Based Software Engineering Conference, 1991

1990
A template for rapid prototyping of operating systems.
Proceedings of the First International Workshop on Rapid System Prototyping, 1990


  Loading...