Deborah A. Frincke
Affiliations: | University of Idaho, Moscow, ID, United States |
Area:
Computer ScienceGoogle:
"Deborah Frincke"Children
Sign in to add traineeChung-Tong ( Hu | grad student | 2002 | University of Idaho |
Barbara Endicott-Popovsky | grad student | 2007 | University of Idaho |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Narvaez J, Endicott-Popovsky B, Seifert C, et al. (2010) Drive-by-downloads Proceedings of the Annual Hawaii International Conference On System Sciences |
Endicott-Popovsky B, Narvaez J, Seifert C, et al. (2009) Use of deception to improve client honeypot detection of drive-by-download attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5638: 138-147 |
Endicott-Popovsky B, Frincke DA, Taylor CA. (2007) A theoretical framework for organizational network forensic readiness Journal of Computers. 2: 1-11 |
Erbacher RF, Endicott-Popovsky B, Frincke DA. (2007) Challenge paper: Validation of forensic techniques for criminal prosecution Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 150-151 |
Endicott-Popovsky BE, Fluckiger JD, Frincke DA. (2007) Establishing tap reliability in expert witness testimony: Using scenarios to identify calibration needs Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 131-144 |
Endicott-Popovsky BE, Frincke DA. (2007) The observability calibration test development framework Proceedings of the 2007 Ieee Workshop On Information Assurance, Iaw. 61-66 |
Taylor C, Endicott-Popovsky B, Frincke DA. (2007) Specifying digital forensics: A forensics policy approach Dfrws 2007 Annual Conference |
Endicott-Popovsky B, Frincke DA. (2007) Embedding hercule poirot in networks: Addressing inefficiencies in digital forensic investigations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4565: 364-372 |
Endicott-Popovsky BE, Frincke DA. (2006) Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 133-139 |
Endicott-Popovsky B, Frincke DA. (2004) A case study in rapid introduction of an information assurance track into a software engineering curriculum Software Engineering Education Conference, Proceedings. 17: 118-123 |