Author: Deborah A. Frincke
Publications
Co-authors
Productive Colleagues
Publications
Frincke, Deborah A., Oudekirk, S., Popovsky, B. (2006): Editorial: Special issue on resources for the computer security and information assurance . In ACM Journal of Educational Resources in Computing, 6 (3) pp. . https://dl.acm.org/doi/10.1145/1243481.1243482
Frincke, Deborah A., Oudekirk, S., Popovsky, B. (2006): Editorial: Resources for the computer security and information assurance curriculum. In ACM Journal of Educational Resources in Computing, 6 (4) pp. . https://dl.acm.org/doi/10.1145/1248453.1248454
Erbacher, Robert F., Walker, Kenneth L., Frincke, Deborah A. (2002): Intrusion and Misuse Detection in Large-Scale Systems. In IEEE Computer Graphics and Applications, 22 (1) pp. 38-48. https://csdl.computer.org/comp/mags/cg/2002/01/g1038abs.htm
Irvine, Cynthia E., Chin, Shiu-Kai, Frincke, Deborah A. (1998): Integrating Security into the Curriculum. In IEEE Computer, 31 (12) pp. 25-30.
Endicott-Popovsky, Barbara, Frincke, Deborah A. (2007): Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Invest. In: Schmorrow, Dylan, Reeves, Leah (eds.) FAC 2007 - Foundations of Augmented Cognition - Third International Conference July 22-27, 2007, Beijing, China. pp. 364-372. https://dx.doi.org/10.1007/978-3-540-73216-7_41
Auernheimer, Brent, Frincke, Deborah A. (1999): Techniques for Secure System Development - Introduction. In: HICSS 1999 , 1999, . https://csdl.computer.org/comp/proceedings/hicss/1999/0001/03/00013061abs.htm
Frincke, Deborah A., Auernheimer, Brent (1998): Techniques for Secure System Development. In: HICSS 1998 , 1998, . pp. 304-306. https://csdl.computer.org/comp/proceedings/hicss/1998/8239/03/82390304abs.htm
Yu, Dong, Frincke, Deborah A. (2004): Towards Survivable Intrusion Detection System. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/09/205690299aabs.htm
Erbacher, Robert F., Frincke, Deborah A. (2000): Visualization in Detection of Intrusions and Misuse in Large Scale Networks. In: IV 2000 , 2000, . pp. 294-. https://csdl.computer.org/comp/proceedings/iv/2000/0743/00/07430294abs.htm