Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,197,878 papers from all fields of science
Search
Sign In
Create Free Account
Dorothy E. Denning
Known as:
Dorothy Denning
, Dorothy Elizabeth Robling Denning
, Dorothy Elizabeth Denning
Expand
Dorothy Elizabeth Denning (born August 12, 1945) is an American information security researcher who is a graduate of the University of Michigan. She…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Anomaly detection
Clipper chip
Computer science
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
Is China Abolishing the Hukou System?*
K. Chan
,
William W. Buckingham
The China Quarterly
2008
Corpus ID: 31955241
Abstract In recent years, China has instituted a variety of reforms to its hukou system, an institution with the power to…
Expand
Highly Cited
2002
Highly Cited
2002
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Wenke Lee
,
Wei Fan
,
Matthew Miller
,
S. Stolfo
,
E. Zadok
Journal of computing and security
2002
Corpus ID: 11634231
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we…
Expand
Review
2000
Review
2000
Practice Guidelines for Diseases Caused by Aspergillus
D. Stevens
,
V. Kan
,
+7 authors
G. Pankey
2000
Corpus ID: 74728725
Aspergillosis comprises a variety of manifestations of infection. These guidelines are directed to 3 principal entities: invasive…
Expand
Highly Cited
2000
Highly Cited
2000
Knowledge management technology and the reproduction of knowledge work practices
Ulrike Schultze
,
R. Boland
Journal of strategic information systems
2000
Corpus ID: 34120102
Highly Cited
1996
Highly Cited
1996
A Sound Type System for Secure Flow Analysis
D. Volpano
,
C. Irvine
,
Geoffrey Smith
Journal of computing and security
1996
Corpus ID: 1256259
Ensuring secure information flow within programs in the context of multiple sensitivity levels has been widely studied…
Expand
Highly Cited
1995
Highly Cited
1995
Communication in reactive multiagent robotic systems
T. Balch
,
R. Arkin
Auton. Robots
1995
Corpus ID: 378655
Multiple cooperating robots are able to complete many tasks more quickly and reliably than one robot alone. Communication between…
Expand
Review
1993
Review
1993
Lattice-based access control models
R. Sandhu
Computer
1993
Corpus ID: 12185903
Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information…
Expand
Highly Cited
1988
Highly Cited
1988
Notes on the Difficulty of Studying the State (1977)
P. Abrams
1988
Corpus ID: 55094751
The state is not the reality which stands behind the mask of political practice. It is itselfthe mask which prevents our seeing…
Expand
Highly Cited
1983
Highly Cited
1983
In defense of external invalidity.
D. G. Mook
1983
Corpus ID: 53452876
Many psychological investigations are accused of "failure to generalize to the real world" because of sample bias or…
Expand
Highly Cited
1940
Highly Cited
1940
THE PHYSIOLOGICAL BASIS OF MEDICAL PRACTICE
C. Best
,
N. Taylor
Ulster medical journal
1940
Corpus ID: 10886568
time, and though every intelligent mian knowvs that in all medical treatment there is an element of risk the plaintiff often…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE