Author: Deborah A. Frincke

Publications

Publication period start: 2002
Number of co-authors: 9

Co-authors

Number of publications with favourite co-authors
B. Popovsky
2
Brent Auernheimer
2
Robert F. Erbacher
2

Productive Colleagues

Most productive colleagues in number of publications
Shiu-Kai Chin
4
Robert F. Erbacher
7
Brent Auernheimer
10

Publications

Frincke, Deborah A., Oudekirk, S., Popovsky, B. (2006): Editorial: Special issue on resources for the computer security and information assurance . In ACM Journal of Educational Resources in Computing, 6 (3) pp. . https://dl.acm.org/doi/10.1145/1243481.1243482

Frincke, Deborah A., Oudekirk, S., Popovsky, B. (2006): Editorial: Resources for the computer security and information assurance curriculum. In ACM Journal of Educational Resources in Computing, 6 (4) pp. . https://dl.acm.org/doi/10.1145/1248453.1248454

Erbacher, Robert F., Walker, Kenneth L., Frincke, Deborah A. (2002): Intrusion and Misuse Detection in Large-Scale Systems. In IEEE Computer Graphics and Applications, 22 (1) pp. 38-48. https://csdl.computer.org/comp/mags/cg/2002/01/g1038abs.htm

Irvine, Cynthia E., Chin, Shiu-Kai, Frincke, Deborah A. (1998): Integrating Security into the Curriculum. In IEEE Computer, 31 (12) pp. 25-30.

Endicott-Popovsky, Barbara, Frincke, Deborah A. (2007): Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Invest. In: Schmorrow, Dylan, Reeves, Leah (eds.) FAC 2007 - Foundations of Augmented Cognition - Third International Conference July 22-27, 2007, Beijing, China. pp. 364-372. https://dx.doi.org/10.1007/978-3-540-73216-7_41

Auernheimer, Brent, Frincke, Deborah A. (1999): Techniques for Secure System Development - Introduction. In: HICSS 1999 , 1999, . https://csdl.computer.org/comp/proceedings/hicss/1999/0001/03/00013061abs.htm

Frincke, Deborah A., Auernheimer, Brent (1998): Techniques for Secure System Development. In: HICSS 1998 , 1998, . pp. 304-306. https://csdl.computer.org/comp/proceedings/hicss/1998/8239/03/82390304abs.htm

Yu, Dong, Frincke, Deborah A. (2004): Towards Survivable Intrusion Detection System. In: HICSS 2004 , 2004, . https://csdl.computer.org/comp/proceedings/hicss/2004/2056/09/205690299aabs.htm

Erbacher, Robert F., Frincke, Deborah A. (2000): Visualization in Detection of Intrusions and Misuse in Large Scale Networks. In: IV 2000 , 2000, . pp. 294-. https://csdl.computer.org/comp/proceedings/iv/2000/0743/00/07430294abs.htm

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,342 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,342 designers enjoy our newsletter—sure you don’t want to receive it?