BibTeX records: Frank J. Stech

download as .bib file

@incollection{DBLP:books/sp/16/StechHS16,
  author    = {Frank J. Stech and
               Kristin E. Heckman and
               Blake E. Strom},
  editor    = {Sushil Jajodia and
               V. S. Subrahmanian and
               Vipin Swarup and
               Cliff Wang},
  title     = {Integrating Cyber-D{\&}D into Adversary Modeling for Active Cyber
               Defense},
  booktitle = {Cyber Deception, Building the Scientific Foundation},
  pages     = {1--24},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-32699-3\_1},
  doi       = {10.1007/978-3-319-32699-3\_1},
  timestamp = {Wed, 25 Sep 2019 17:41:11 +0200},
  biburl    = {https://dblp.org/rec/books/sp/16/StechHS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/HeckmanSTST15,
  author    = {Kristin E. Heckman and
               Frank J. Stech and
               Roshan K. Thomas and
               Ben S. Schmoker and
               Alexander W. Tsow},
  title     = {Cyber Denial, Deception and Counter Deception - {A} Framework for
               Supporting Active Cyber Defense},
  series    = {Advances in Information Security},
  volume    = {64},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-25133-2},
  doi       = {10.1007/978-3-319-25133-2},
  isbn      = {978-3-319-25131-8},
  timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/series/ais/HeckmanSTST15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HeckmanSST15,
  author    = {Kristin E. Heckman and
               Frank J. Stech and
               Ben S. Schmoker and
               Roshan K. Thomas},
  title     = {Denial and Deception in Cyber Defense},
  journal   = {{IEEE} Computer},
  volume    = {48},
  number    = {4},
  pages     = {36--44},
  year      = {2015},
  url       = {https://doi.org/10.1109/MC.2015.104},
  doi       = {10.1109/MC.2015.104},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/computer/HeckmanSST15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/HilliardSHB15,
  author    = {Phil Hilliard and
               Frank J. Stech and
               Kristin E. Heckman and
               Janice Redington Ballo},
  title     = {Scientometric Analysis of Chinese Cyber-Denial and Deception Research},
  journal   = {Int. J. Cyber Warf. Terror.},
  volume    = {5},
  number    = {4},
  pages     = {15--58},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJCWT.2015100102},
  doi       = {10.4018/IJCWT.2015100102},
  timestamp = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcwt/HilliardSHB15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HeckmanS15,
  author    = {Kristin E. Heckman and
               Frank J. Stech},
  editor    = {Sushil Jajodia and
               Paulo Shakarian and
               V. S. Subrahmanian and
               Vipin Swarup and
               Cliff Wang},
  title     = {Cyber Counterdeception: How to Detect Denial {\&} Deception (D{\&}D)},
  booktitle = {Cyber Warfare - Building the Scientific Foundation},
  series    = {Advances in Information Security},
  volume    = {56},
  pages     = {103--140},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-14039-1\_6},
  doi       = {10.1007/978-3-319-14039-1\_6},
  timestamp = {Tue, 16 May 2017 14:24:25 +0200},
  biburl    = {https://dblp.org/rec/series/ais/HeckmanS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeckmanWSODH13,
  author    = {Kristin E. Heckman and
               Michael J. Walsh and
               Frank J. Stech and
               Todd A. O'Boyle and
               Stephen R. DiCato and
               Audra F. Herber},
  title     = {Active cyber defense with denial and deception: {A} cyber-wargame
               experiment},
  journal   = {Comput. Secur.},
  volume    = {37},
  pages     = {72--77},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.cose.2013.03.015},
  doi       = {10.1016/j.cose.2013.03.015},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/HeckmanWSODH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/psychnology/StechHHB11,
  author    = {Frank J. Stech and
               Kristin E. Heckman and
               Phil Hilliard and
               Janice Redington Ballo},
  title     = {Scientometrics of Deception, Counter-deception, and Deception Detection
               in Cyber-space},
  journal   = {PsychNology Journal},
  volume    = {9},
  number    = {2},
  pages     = {79--122},
  year      = {2011},
  url       = {http://207.210.83.249/psychnology/File/PNJ9(2)/PSYCHNOLOGY\_JOURNAL\_9\_2\_HECKMAN.pdf},
  timestamp = {Mon, 13 Jun 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/psychnology/StechHHB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics