Följ
Darrell Kienzle
Darrell Kienzle
Distinguished Technologist, HPE
Verifierad e-postadress på hpe.com
Titel
Citeras av
Citeras av
År
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid Malcode, 1-10, 2003
3412003
Efficient backups using dynamically shared storage pools in peer-to-peer networks
MP Spertus, S Kritov, DM Kienzle, HF Van Rietschote, AT Orling, ...
US Patent 7,529,785, 2009
1822009
A new model of security for distributed systems
WA Wulf, C Wang, D Kienzle
Proceedings of the 1996 workshop on New security paradigms, 34-43, 1996
981996
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
902002
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
812016
Preventing data from being submitted to a remote system in response to a malicious e-mail
D Kienzle, J Croall
US Patent 7,516,488, 2009
682009
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
612014
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia, USA, 2002
542002
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
442009
The meerkats cloud security architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
2012 32nd International Conference on Distributed Computing Systems …, 2012
422012
A practical approach to security assessment
DM Kienzle, WA Wulf
Proceedings of the 1997 workshop on New security paradigms, 5-16, 1998
401998
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
382002
On-box active reconnaissance
D Kienzle, P Swinton
US Patent 7,934,257, 2011
262011
Security patterns template and tutorial
DM Kienzle, M Elder, D Tyree, J Edwards-Hewitt
2002b. Accessed August 20, 6, 2002
242002
Preliminary experience using Z to specify a safety-critical system
JC Knight, DM Kienzle
Z User Workshop, London 1992: Proceedings of the Seventh Annual Z User …, 1993
231993
Security patterns repository
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
212002
Some weaknesses of the TCB model
B Blakley, DM Kienzle
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
161997
System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
M Hart, D Kienzle, P Ashley
US Patent 9,419,986, 2016
142016
Reuse of specifications
JC Knight, DM Kienzle
Proceedings of the 5th Annual Workshop on Software Reuse, 1992
141992
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
112015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20