Παρακολούθηση
Darrell Kienzle
Darrell Kienzle
Distinguished Technologist, HPE
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα hpe.com
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid Malcode, 1-10, 2003
3402003
Efficient backups using dynamically shared storage pools in peer-to-peer networks
MP Spertus, S Kritov, DM Kienzle, HF Van Rietschote, AT Orling, ...
US Patent 7,529,785, 2009
1852009
A new model of security for distributed systems
WA Wulf, C Wang, D Kienzle
Proceedings of the 1996 workshop on New security paradigms, 34-43, 1996
941996
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
932002
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
892016
Preventing data from being submitted to a remote system in response to a malicious e-mail
D Kienzle, J Croall
US Patent 7,516,488, 2009
692009
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
682014
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia, USA, 2002
562002
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
462009
The meerkats cloud security architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
2012 32nd International Conference on Distributed Computing Systems …, 2012
412012
A practical approach to security assessment
DM Kienzle, WA Wulf
Proceedings of the 1997 workshop on New security paradigms, 5-16, 1998
391998
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
362002
On-box active reconnaissance
D Kienzle, P Swinton
US Patent 7,934,257, 2011
302011
Preliminary experience using Z to specify a safety-critical system
JC Knight, DM Kienzle
Z User Workshop, London 1992: Proceedings of the Seventh Annual Z User …, 1993
241993
Security patterns template and tutorial
DM Kienzle, M Elder, D Tyree, J Edwards-Hewitt
2002b. Accessed August 20, 6, 2002
232002
Security patterns repository
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
212002
Some weaknesses of the TCB model
B Blakley, DM Kienzle
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
171997
Reuse of specifications
JC Knight, DM Kienzle
Proceedings of the 5th Annual Workshop on Software Reuse, 1992
151992
System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
M Hart, D Kienzle, P Ashley
US Patent 9,419,986, 2016
142016
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
132015
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20