Follow
Darrell Kienzle
Darrell Kienzle
Distinguished Technologist, HPE
Verified email at hpe.com
Title
Cited by
Cited by
Year
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid Malcode, 1-10, 2003
3402003
Efficient backups using dynamically shared storage pools in peer-to-peer networks
MP Spertus, S Kritov, DM Kienzle, HF Van Rietschote, AT Orling, ...
US Patent 7,529,785, 2009
1802009
A new model of security for distributed systems
WA Wulf, C Wang, D Kienzle
Proceedings of the 1996 workshop on New security paradigms, 34-43, 1996
971996
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
902002
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
742016
Preventing data from being submitted to a remote system in response to a malicious e-mail
D Kienzle, J Croall
US Patent 7,516,488, 2009
662009
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia, USA, 2002
542002
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
532014
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
432009
The meerkats cloud security architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
2012 32nd International Conference on Distributed Computing Systems …, 2012
412012
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
382002
A practical approach to security assessment
DM Kienzle, WA Wulf
Proceedings of the 1997 workshop on New security paradigms, 5-16, 1998
381998
Security patterns template and tutorial
DM Kienzle, M Elder, D Tyree, J Edwards-Hewitt
2002b. Accessed August 20, 6, 2002
232002
Preliminary experience using Z to specify a safety-critical system
JC Knight, DM Kienzle
Z User Workshop, London 1992: Proceedings of the Seventh Annual Z User …, 1993
231993
On-box active reconnaissance
D Kienzle, P Swinton
US Patent 7,934,257, 2011
222011
Security patterns repository
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
212002
Some weaknesses of the TCB model
B Blakley, DM Kienzle
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
161997
Reuse of specifications
JC Knight, DM Kienzle
Proceedings of the 5th Annual Workshop on Software Reuse, 1992
151992
System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
M Hart, D Kienzle, P Ashley
US Patent 9,419,986, 2016
132016
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
112015
The system can't perform the operation now. Try again later.
Articles 1–20