| 2004 |
11 | | Donald G. Marks,
Peter Mell,
Michael Stinson:
Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents.
J. Network Syst. Manage. 12(1): (2004) |
| 2003 |
10 | | Alec Yasinsac,
Robert F. Erbacher,
Donald G. Marks,
Mark Pollitt,
Peter M. Sommer:
Computer Forensics Education.
IEEE Security & Privacy 1(4): 15-23 (2003) |
| 2000 |
9 | | Peter Mell,
Donald G. Marks,
Mark McLarnon:
A denial-of-service resistant intrusion detection architecture.
Computer Networks 34(4): 641-658 (2000) |
| 1999 |
8 | | Donald G. Marks:
Enforcing Integrity While Maintaining Secrecy.
DBSec 1999: 237-251 |
7 | | William V. Maconachy,
Thomas Harper,
Donald G. Marks,
Terry Mayfield:
Selected Topics in Infrastructure and Information Assurance (Panel).
DBSec 1999: 97-113 |
| 1996 |
6 | | Donald G. Marks,
Amihai Motro,
Sushil Jajodia:
Enhancing the Controlled Disclosure of Sensitive Information.
ESORICS 1996: 290-303 |
5 | | Donald G. Marks:
Inference in MLS Database Systems.
IEEE Trans. Knowl. Data Eng. 8(1): 46-55 (1996) |
4 | | Donald G. Marks,
Peter J. Sell,
Bhavani M. Thuraisingham:
MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications.
JOOP 9(4): 22-29 (1996) |
| 1995 |
3 | | Tsau Young Lin,
Thomas H. Hinke,
Donald G. Marks,
Bhavani M. Thuraisingham:
Security and Data Mining.
DBSec 1995: 391-399 |
| 1994 |
2 | | Donald G. Marks,
Leonard J. Binns,
Bhavani M. Thuraisingham:
Hypersemantic Data Modeling for Inference Analysis.
DBSec 1994: 157-180 |
1 | | Amihai Motro,
Donald G. Marks,
Sushil Jajodia:
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information.
ESORICS 1994: 431-445 |