Smart-grid security issues H Khurana, M Hadley, N Lu, DA Frincke IEEE Security & Privacy 8 (1), 81-85, 2010 | 831 | 2010 |
Intrusion and misuse detection in large-scale systems RF Erbacher, KL Walker, DA Frincke IEEE computer graphics and applications 22 (1), 38-47, 2002 | 209 | 2002 |
Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation FL Greitzer, DA Frincke Insider threats in cyber security, 85-113, 2010 | 167 | 2010 |
A framework for cooperative intrusion detection D Frincke, D Tobin, J McConnell, J Marconi, D Polla Proc. 21st NIST-NCSC National Information Systems Security Conference, 361-373, 1998 | 155 | 1998 |
Integrating security into the curriculum CE Irvine, SK Chin Computer 31 (12), 25-30, 1998 | 133 | 1998 |
Cost-benefit analysis for network intrusion detection systems H Wei, D Frinke, O Carter, C Ritter CSI 28th Annual Computer Security Conference, 29-31, 2001 | 121 | 2001 |
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory D Yu, D Frincke Proceedings of the 43rd annual Southeast regional conference-Volume 2, 142-147, 2005 | 113 | 2005 |
Concerns about intrusions into remotely accessible substation controllers and SCADA systems P Oman, E Schweitzer, D Frincke Proceedings of the Twenty-Seventh Annual Western Protective Relay Conference 160, 2000 | 99 | 2000 |
A Theoretical Framework for Organizational Network Forensic Readiness. B Endicott-Popovsky, DA Frincke, CA Taylor J. Comput. 2 (3), 1-11, 2007 | 92 | 2007 |
Improving the quality of alerts and predicting intruder’s next goal with Hidden Colored Petri-Net D Yu, D Frincke Computer Networks 51 (3), 632-654, 2007 | 85 | 2007 |
A multi-phase network situational awareness cognitive task analysis RF Erbacher, DA Frincke, PC Wong, S Moody, G Fink Information Visualization 9 (3), 204-219, 2010 | 79 | 2010 |
A risk management approach to the “insider threat” M Bishop, S Engle, DA Frincke, C Gates, FL Greitzer, S Peisert, S Whalen Insider threats in cyber security, 115-137, 2010 | 71 | 2010 |
Balancing cooperation and risk in intrusion detection D Frincke ACM Transactions on Information and System Security (TISSEC) 3 (1), 1-29, 2000 | 67 | 2000 |
A novel framework for alert correlation and understanding D Yu, D Frincke Applied Cryptography and Network Security: Second International Conference …, 2004 | 64 | 2004 |
Specifying digital forensics: A forensics policy approach C Taylor, B Endicott-Popovsky, DA Frincke Digital investigation 4, 101-104, 2007 | 54 | 2007 |
Predictive modeling for insider threat mitigation FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke Richland, WA: Pacific Northwest National Laboratory, 6-17, 2009 | 53 | 2009 |
Analysis of an algorithm for distributed recognition and accountability C Ko, DA Frincke, T Goan Jr, T Heberlein, K Levitt, B Mukherjee, C Wee Proceedings of the 1st ACM conference on Computer and communications …, 1993 | 53 | 1993 |
Teaching secure programming M Bishop, DA Frincke IEEE security & privacy 3 (5), 54-56, 2005 | 50 | 2005 |
Social/ethical issues in predictive insider threat monitoring FL Greitzer, D Frincke, M Zabriskie Information assurance and security ethics in complex systems …, 2011 | 48 | 2011 |
Relationships and data sanitization: A study in scarlet M Bishop, J Cummins, S Peisert, A Singh, B Bhumiratana, D Agarwal, ... Proceedings of the 2010 New Security Paradigms Workshop, 151-164, 2010 | 47 | 2010 |