Deborah Frincke
#79,600
Most Influential Person Now
American computer scientist
Deborah Frincke's AcademicInfluence.com Rankings
Deborah Frinckecomputer-science Degrees
Computer Science
#4498
World Rank
#4745
Historical Rank
Network Security
#19
World Rank
#19
Historical Rank
Database
#9320
World Rank
#9810
Historical Rank
Download Badge
Computer Science
Why Is Deborah Frincke Influential?
(Suggest an Edit or Addition)According to Wikipedia, Deborah A. Frincke is an American academic and computer scientist specializing in computer security who is the associate laboratories director of national security programs at Sandia National Laboratories.
Deborah Frincke's Published Works
Published Works
- Smart-grid security issues (2010) (633)
- Intrusion and Misuse Detection in Large-Scale Systems (2002) (150)
- Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation (2010) (104)
- Integrating Security into the Curriculum (1998) (86)
- Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory (2005) (82)
- A Framework for Cooperative Intrusion Detection (1998) (81)
- CONCERNS ABOUT INTRUSIONS INTO REMOTELY ACCESSIBLE SUBSTATION CONTROLLERS AND SCADA SYSTEMS (2000) (72)
- A Theoretical Framework for Organizational Network Forensic Readiness (2007) (70)
- Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net (2007) (57)
- A Multi-Phase Network Situational Awareness Cognitive Task Analysis (2010) (53)
- Balancing cooperation and risk in intrusion detection (2000) (48)
- A Novel Framework for Alert Correlation and Understanding (2004) (48)
- A Risk Management Approach to the "Insider Threat" (2010) (46)
- Social/Ethical Issues in Predictive Insider Threat Monitoring (2011) (45)
- Specifying digital forensics: A forensics policy approach (2007) (43)
- Analysis of an algorithm for distributed recognition and accountability (1993) (39)
- Predictive Modeling for Insider Threat Mitigation (2009) (37)
- Relationships and data sanitization: a study in scarlet (2010) (34)
- Visualization in detection of intrusions and misuse in large scale networks (2000) (33)
- Teaching Secure Programming (2005) (32)
- Embedding Forensic Capabilities into Networks: Addressing Inefficiencies in Digital Forensics Investigations (2006) (27)
- Planning, Petri Nets, and Intrusion Detection (1998) (25)
- The Policy Machine for Security Policy Management (2001) (25)
- Drive-by-Downloads (2010) (24)
- Who Watches the Security Educators? (2003) (24)
- A Visual Mathematical Model for Intrusion Detection (1998) (23)
- Joining the Security Education Community (2004) (20)
- Configurable middleware-level intrusion detection for embedded systems (2005) (20)
- Visual behavior characterization for intrusion and misuse detection (2001) (17)
- Walking the Path: A New Journey to Explore and Discover Through Visual Analytics (2006) (16)
- Cognitive task analysis of network analysts and managers for network situational awareness (2010) (14)
- From intrusion detection to self-protection (2007) (14)
- Guarding the Castle Keep: Teaching with the Fortress Metaphor (2004) (14)
- AZALIA: an A to Z assessment of the likelihood of insider attack (2009) (14)
- DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems (2010) (12)
- An Information Security Education Initiative for Engineering and Computer Science (1997) (12)
- Academic Degrees and Professional Certification (2004) (12)
- Towards Byte Code Genetic Programming (1999) (12)
- A layered decision model for cost-effective network defense (2005) (12)
- Requirements Specification Language (RSL) and supporting tools (1992) (12)
- Who owns your computer? [digital rights management] (2006) (11)
- Demythifying Cybersecurity (2010) (11)
- Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks (2009) (10)
- Achieving Learning Objectives through E-Voting Case Studies (2007) (10)
- Teaching robust programming (2004) (9)
- Adding the Fourth "R": A Systems Approach to Solving the Hacker's Arms Race (2006) (9)
- Towards the fault tolerant software: fuzzy extension of crisp equivalence voters (2001) (9)
- Adding the fourth "R" [CERT's model for computer security strategies] (2004) (8)
- An Approach to Trust Management Challenges for Critical Infrastructures (2007) (8)
- Towards survivable intrusion detection system (2004) (8)
- A Human Endeavor: Lessons from Shakespeare and Beyond (2005) (7)
- Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations (2007) (7)
- ADAM: Active Defense Algorithm and Model (2004) (7)
- Information Assurance Education: A Work In Progress (2008) (7)
- GABSys: using genetic algorithms to breed a combustion engine (1998) (7)
- A simulation model of IS security (2005) (7)
- A template for rapid prototyping of operating systems (1990) (7)
- Byte Code Genetic Programming (1998) (6)
- Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots (2008) (6)
- Tensions in Collaborative Cyber Security and how They Affect Incident Detection and Response (2010) (6)
- Community security awareness training (2005) (6)
- Recent advances in intrusion detection systems (2000) (6)
- Leveraging 2nd life as a communications media: An effective tool for security awareness training (2013) (6)
- The response continuum (2005) (5)
- The New Zealand Hacker Case: A Post Mortem (2005) (5)
- Formal Grammar for Java (1999) (5)
- Developing Secure Objects (1996) (5)
- Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs (2007) (5)
- Calibration Testing Of Network Tap Devices (2007) (4)
- On the Importance of Composability of Ad Hoc Mobile Middleware and Trust Management (2005) (4)
- Structured representation for requirements and specifications (1991) (4)
- Formal specification and verification of graphical user interfaces (1991) (4)
- Autonomic Computing: Freedom or Threat? (2007) (4)
- Hierarchical Linked Views (2007) (3)
- A case study in rapid introduction of an information assurance track into a software engineering curriculum (2004) (3)
- Meeting the Information Assurance Crisis in the U.S. Now (2000) (3)
- Systematic Approaches to Digital Forensic Engineering: Moving from Art to Disciplines (2007) (3)
- Editorial: Resources for the computer security and information assurance curriculum (2006) (2)
- Living with Insecurity (2011) (2)
- The Manuka project (2004) (2)
- Building a Better Boot Camp (2010) (2)
- Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution (2007) (2)
- Effectiveness of operating system prototyping from a template: application to MINIX (1991) (2)
- Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1 (2006) (1)
- Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities (2017) (1)
- The Observability Calibration Test Development Framework (2007) (1)
- Actor-Oriented Trust∗ (2005) (1)
- A Layered Decision Model for cost-effective system security (2008) (1)
- TIM Lecture Series – Three Collaborations Enabling Cybersecurity (2015) (1)
- Message from the Workshop Chairs (2009) (1)
- Assessment Challenges : Validating the Model (2009) (1)
- Transforming CyberSecurity R&D within the Department of Energy: Getting Ahead of The Threat (2008) (1)
- Extreme Scale Computing to Secure the Nation (2009) (1)
- Trust mechanisms for Hummingbird (1996) (1)
- Embedding hercule poirot in networks (2007) (1)
- CTPLAN: A Planning-based Approach To Automatically Detecting Flaws In Concurrent Algorithms (1991) (0)
- Integrating Security into the Curriculum What Is Computer Security? (1998) (0)
- 1 Planning , Petri Nets , and Intrusion Detection (1998) (0)
- Specifying Multi-Level Security for an Embedded Real-Time Control System (2007) (0)
- Editorial (2015) (0)
- Message from the General Chair (2021) (0)
- Techniques for secure system development (1998) (0)
- Perspectives on Securing Cyberspace (2015) (0)
- An application of template methodology: rapid prototyping of user interface management systems (1991) (0)
- Techniques for secure system development (1999) (0)
- Specification and Verification of Secure Concurrent and Distributed Software Systems (1992) (0)
- De-Mythifying Cyber Security. (2010) (0)
- Secure resource management: Specifying and testing secure operating systems (1990) (0)
- Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2007, Seattle, Washington, USA, April 10-12, 2007 (2007) (0)
- National Laboratory panel (2011) (0)
- A Research Road Map for Building Secure and Resilient Software-Intensive Systems (2021) (0)
- Rationality Validation of a Layered Decision Model for Network Defense (2007) (0)
- Keynote: Modern Challenges for Cyber Defense (2019) (0)
- Embedding forensic capabilities into networks (2006) (0)
- A 12-Step Program for Cybersecurity. (2010) (0)
- Identifying and Analyzing Web Server Attacks (2008) (0)
- A methodology for calibrating forensic ready, low layer network devices (2007) (0)
- Back to School (2004) (0)
- DOE grass roots panel (2009) (0)
- Heartbleed 101 (2014) (0)
- Techniques for Secure System Development - Introduction. (1999) (0)
- Formal representation of the requirements for an Advanced Subsonic Civil Transport (ASCT) flight control system (1992) (0)
This paper list is powered by the following services:
Other Resources About Deborah Frincke
What Schools Are Affiliated With Deborah Frincke?
Deborah Frincke is affiliated with the following schools: