Follow
Darrell Kienzle
Darrell Kienzle
Distinguished Technologist, HPE
Verified email at hpe.com
Title
Cited by
Cited by
Year
Recent worms: a survey and trends
DM Kienzle, MC Elder
Proceedings of the 2003 ACM workshop on Rapid Malcode, 1-10, 2003
3462003
Efficient backups using dynamically shared storage pools in peer-to-peer networks
MP Spertus, S Kritov, DM Kienzle, HF Van Rietschote, AT Orling, ...
US Patent 7,529,785, 2009
1842009
A new model of security for distributed systems
WA Wulf, C Wang, D Kienzle
Proceedings of the 1996 workshop on New security paradigms, 34-43, 1996
961996
Security patterns repository version 1.0
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
912002
System and method for vulnerability risk analysis
MC Elder, DM Kienzle, PK Manadhata, RK Persaud
US Patent 9,317,692, 2016
852016
Preventing data from being submitted to a remote system in response to a malicious e-mail
D Kienzle, J Croall
US Patent 7,516,488, 2009
712009
Detecting network devices and mapping topology using network introspection by collaborating endpoints
D Kienzle, W Gauvin, M Elder, R Walters, A Schepis, B Hernacki
US Patent 8,844,041, 2014
652014
Final technical report: Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia, USA, 2002
542002
Validation of secure sockets layer communications
D Kienzle, M Elder
US Patent 7,634,811, 2009
452009
The meerkats cloud security architecture
AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ...
2012 32nd International Conference on Distributed Computing Systems …, 2012
432012
A practical approach to security assessment
DM Kienzle, WA Wulf
Proceedings of the 1997 workshop on New security paradigms, 5-16, 1998
411998
Security patterns for web application development
DM Kienzle, MC Elder
University of Virginia technical report, 2002
372002
On-box active reconnaissance
D Kienzle, P Swinton
US Patent 7,934,257, 2011
292011
Security patterns template and tutorial
DM Kienzle, M Elder, D Tyree, J Edwards-Hewitt
2002b. Accessed August 20, 6, 2002
242002
Preliminary experience using Z to specify a safety-critical system
JC Knight, DM Kienzle
Z User Workshop, London 1992: Proceedings of the Seventh Annual Z User …, 1993
241993
Security patterns repository
DM Kienzle, MC Elder, D Tyree, J Edwards-Hewitt
DARPA, Washington DC, 2002
212002
Some weaknesses of the TCB model
B Blakley, DM Kienzle
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
171997
Reuse of specifications
JC Knight, DM Kienzle
Proceedings of the 5th Annual Workshop on Software Reuse, 1992
151992
System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
M Hart, D Kienzle, P Ashley
US Patent 9,419,986, 2016
142016
Determining model information of devices based on network device identifiers
DM Kienzle, MC Elder, NS Evans
US Patent 9,135,293, 2015
132015
The system can't perform the operation now. Try again later.
Articles 1–20