Search Results - Frincke, D.
-
1
-
2
-
3
-
4
-
5
-
6
Adding the fourth "R" [CERT's model for computer security strategies]
Conference Proceeding -
7
-
8
-
9
Who watches the security educators?
Published in IEEE security & privacyGet full text
Magazinearticle -
10
GABSys: using genetic algorithms to breed a combustion engine
Conference Proceeding -
11
-
12
AZALIA: an A to Z assessment of the likelihood of insider attack
Conference Proceeding -
13
-
14
Joining the security education community
Published in IEEE security & privacyGet full text
Magazinearticle -
15
-
16
Configurable middleware-level intrusion detection for embedded systems
Conference Proceeding -
17
Academic degrees and professional certification
Published in IEEE security & privacyGet full text
Magazinearticle -
18
-
19
-
20