Deborah A. Frincke
Affiliations:- National Security Agency, Washington, D.C., USA
According to our database1,
Deborah A. Frincke
authored at least 70 papers
between 1990 and 2021.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2019, "For contributions in education, the practice of research, and the leadership of cybersecurity".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2021
IEEE Secur. Priv., 2021
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2015
2013
Leveraging 2<sup>nd</sup> life as a communications media: An effective tool for security awareness training.
Proceedings of the IEEE International Professonal Communication 2013 Conference, 2013
2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation.
Proceedings of the Insider Threats in Cyber Security, 2010
Proceedings of the Insider Threats in Cyber Security, 2010
Cognitive task analysis of network analysts and managers for network situational awareness.
Proceedings of the Visualization and Data Analysis, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
2009
Proceedings of the Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
2008
Int. J. Inf. Comput. Secur., 2008
Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
2007
J. Comput., 2007
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net.
Comput. Networks, 2007
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007
Proceedings of the Advances in Digital Forensics III, 2007
Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations.
Proceedings of the Foundations of Augmented Cognition, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
2006
ACM J. Educ. Resour. Comput., 2006
Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1.
ACM J. Educ. Resour. Comput., 2006
Inf. Vis., 2006
2005
Proceedings of the Service Availability, 2005
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
2004
IEEE Secur. Priv., 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
A Case Study in Rapid Introduction of an Information Assurance Track into a Software Engineering Curriculum.
Proceedings of the 17th Conference on Software Engineering Education and Training (CSEE&T 2004), 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
2002
IEEE Computer Graphics and Applications, 2002
2001
Proceedings of the Computational Science - ICCS 2001, 2001
2000
ACM Trans. Inf. Syst. Secur., 2000
Proceedings of the International Conference on Information Visualisation, 2000
1999
Proceedings of the Formal Syntax and Semantics of Java, 1999
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999
Towards Byte Code Genetic Programming.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 1999
1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
1996
1993
Proceedings of the CCS '93, 1993
1991
An application of template methodology: rapid prototyping of user interface management systems.
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991
CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms.
Proceedings of the Proceedings 6th Annual Knowledge-Based Software Engineering Conference, 1991
1990
Proceedings of the First International Workshop on Rapid System Prototyping, 1990