关注
Dorothy Denning
Dorothy Denning
Professor of Defense Analysis, Naval Postgraduate School
在 nps.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An intrusion-detection model
DE Denning
IEEE Transactions on software engineering, 222-232, 1987
63781987
Cryptography and Data Security
DE Denning
Addison-Wesley, 1982
35061982
A lattice model of secure information flow
DE Denning
Communications of the ACM 19 (5), 236-243, 1976
29381976
Certification of programs for secure information flow
DE Denning, PJ Denning
Communications of the ACM 20 (7), 504-513, 1977
15671977
Timestamps in key distribution protocols
DE Denning, GM Sacco
Communications of the ACM 24 (8), 533-536, 1981
13021981
Information warfare and security
DER Denning
Addison-Wesley, 1999
12241999
Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy
DE Denning
Networks and netwars: The future of terror, crime, and militancy 239, 288, 2001
9112001
Method and apparatus for authenticating the location of remote users of networked computing systems
PF MacDoran, MB Mathews, FA Ziel, KL Gold, SM Anderson, MA Coffey, ...
US Patent 5,757,916, 1998
5281998
The SeaView security model
TF Lunt, DE Denning, RR Schell, M Heckman, WR Shockley
IEEE Transactions on software engineering 16 (6), 593-607, 1990
4851990
Cyberterrorism: Testimony before the special oversight panel on terrorism committee on armed services US House of Representatives
DE Denning
Focus on terrorism 9 (1), 71-76, 2000
432*2000
Location-based authentication: Grounding cyberspace for better security
DE Denning, PF MacDoran
Computer Fraud & Security 1996 (2), 12-16, 1996
3661996
Requirements and model for IDES-a real-time intrusion-detection expert system
D Denning, PG Neumann
SRI International, 1985
3521985
Data security
DE Denning, PJ Denning
ACM computing surveys (CSUR) 11 (3), 227-249, 1979
3361979
The tracker: A threat to statistical database security
DE Denning, PJ Denning
ACM Transactions on Database Systems (TODS) 4 (1), 76-96, 1979
3361979
System and method for delivering encrypted information in a communication network using location identity and key tables
DE Denning, BJ Glick, RS Karpf, ME Seiler
US Patent 7,143,289, 2006
3092006
Secure statistical databases with random sample queries
DE Denning
ACM Transactions on Database Systems (TODS) 5 (3), 291-315, 1980
3071980
A taxonomy for key escrow encryption systems
DE Denning, DK Branstad
Communications of the ACM 39 (3), 34-40, 1996
2981996
A multilevel relational data model
DE Denning, TF Lunt
1987 IEEE Symposium on Security and Privacy, 220-220, 1987
2611987
Honeyfiles: deceptive files for intrusion detection
J Yuill, M Zappe, D Denning, F Feer
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
2282004
Views for multilevel database security
DE Denning, SG Akl, M Heckman, TF Lunt, M Morgenstern, PG Neumann, ...
IEEE Transactions on Software Engineering, 129-140, 1987
2231987
系统目前无法执行此操作,请稍后再试。
文章 1–20