Deborah A. Frincke - Publications

Affiliations: 
University of Idaho, Moscow, ID, United States 
Area:
Computer Science

13 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2010 Narvaez J, Endicott-Popovsky B, Seifert C, Aval C, Frincke DA. Drive-by-downloads Proceedings of the Annual Hawaii International Conference On System Sciences. DOI: 10.1109/HICSS.2010.160  0.538
2009 Endicott-Popovsky B, Narvaez J, Seifert C, Frincke DA, O'Neil LR, Aval C. Use of deception to improve client honeypot detection of drive-by-download attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5638: 138-147. DOI: 10.1007/978-3-642-02812-0_17  0.565
2007 Endicott-Popovsky B, Frincke DA, Taylor CA. A theoretical framework for organizational network forensic readiness Journal of Computers. 2: 1-11. DOI: 10.4304/Jcp.2.3.1-11  0.65
2007 Erbacher RF, Endicott-Popovsky B, Frincke DA. Challenge paper: Validation of forensic techniques for criminal prosecution Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 150-151. DOI: 10.1109/SADFE.2007.5  0.565
2007 Endicott-Popovsky BE, Fluckiger JD, Frincke DA. Establishing tap reliability in expert witness testimony: Using scenarios to identify calibration needs Proceedings - Sadfe 2007: Second International Workshop On Systematic Approaches to Digital Forensic Engineering. 131-144. DOI: 10.1109/SADFE.2007.10  0.615
2007 Endicott-Popovsky BE, Frincke DA. The observability calibration test development framework Proceedings of the 2007 Ieee Workshop On Information Assurance, Iaw. 61-66. DOI: 10.1109/IAW.2007.381915  0.626
2007 Taylor C, Endicott-Popovsky B, Frincke DA. Specifying digital forensics: A forensics policy approach Dfrws 2007 Annual Conference. DOI: 10.1016/j.diin.2007.06.006  0.573
2007 Endicott-Popovsky B, Frincke DA. Embedding hercule poirot in networks: Addressing inefficiencies in digital forensic investigations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4565: 364-372.  0.641
2006 Endicott-Popovsky BE, Frincke DA. Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 133-139.  0.632
2004 Endicott-Popovsky B, Frincke DA. A case study in rapid introduction of an information assurance track into a software engineering curriculum Software Engineering Education Conference, Proceedings. 17: 118-123.  0.555
2002 Erbacher RF, Walker KL, Frincke DA. Intrusion and misuse detection in large-scale systems Pollution Engineering. 34: 38+40-48. DOI: 10.1109/38.974517  0.412
2001 Erbacher RF, Frincke D. Visual behavior characterization for intrusion and misuse detection Proceedings of Spie. 4302: 210-218. DOI: 10.1117/12.424930  0.375
2000 Frincke D. Balancing cooperation and risk in intrusion detection Acm Transactions On Information and System Security. 3: 1-29. DOI: 10.1145/353323.353324  0.385
Show low-probability matches.