Follow
Karen Scarfone
Karen Scarfone
Principal Consultant, Scarfone Cybersecurity
Verified email at scarfonecybersecurity.com - Homepage
Title
Cited by
Cited by
Year
Guide to industrial control systems (ICS) security
K Stouffer, J Falco, K Scarfone
NIST special publication 800 (82), 16-16, 2011
23332011
Guide to Supervisory Control and Data Acquisition (SCADA) and industrial control systems security–initial public draft
K Stouffer, J Falco, K Kent
National Institute of Standards and Technology, Gaithersburg, Maryland, 2006
2288*2006
Guide to intrusion detection and prevention systems (idps)
K Scarfone, P Mell
NIST special publication 800 (2007), 94, 2007
18252007
Blockchain technology overview
D Yaga, P Mell, N Roby, K Scarfone
arXiv preprint arXiv:1906.11078, 2019
16402019
Guide to attribute based access control (abac) definition and considerations (draft)
VC Hu, D Ferraiolo, R Kuhn, AR Friedman, AJ Lang, MM Cogdell, ...
NIST special publication 800 (162), 1-54, 2013
12472013
A complete guide to the common vulnerability scoring system version 2.0
P Mell, K Scarfone, S Romanosky
Published by FIRST-forum of incident response and security teams 1, 23, 2007
914*2007
Common vulnerability scoring system
P Mell, K Scarfone, S Romanosky
IEEE Security & Privacy 4 (6), 85-89, 2006
6292006
Computer security incident handling guide
P Cichonski, T Millar, T Grance, K Scarfone
NIST Special Publication 800 (61), 1-147, 2012
5592012
Sp 800-122. guide to protecting the confidentiality of personally identifiable information (pii)
E McCallister, T Grance, KA Scarfone
National Institute of Standards & Technology, 2010
544*2010
Technical guide to information security testing and assessment
K Scarfone, M Souppaya, A Cody, A Orebaugh
NIST Special Publication 800 (115), 2-25, 2008
5202008
Guide to malware incident prevention and handling
P Mell, K Kent, J Nusbaum
US Department of Commerce, Technology Administration, National Institute of …, 2005
465*2005
Guide to Computer Security Log Management:.
KA Kent, M Souppaya
US Department of Commerce, Technology Administration, National Institute of …, 2006
4152006
Guide to bluetooth security: recommendations of the national institute of standards and technology
J Padgette, KA Kent
US Department of Commerce, National Institute of Standards and Technology, 2011
393*2011
Guidelines on firewalls and firewall policy
J Wack, K Cutler, J Pole
NIST special publication 800, 41, 2002
379*2002
An analysis of CVSS version 2 vulnerability scoring
K Scarfone, P Mell
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
2352009
Guide to security for full virtualization technologies
MP Souppaya, K Scarfone, P Hoffman
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman, 2011
168*2011
Recommendations of the national institute of standards and technology
A Regenscheid, K Scarfone
NIST special publication 800, 155, 2011
1622011
Nistir 8202 blockchain technology overview
D Yaga, P Mell, N Roby, K Scarfone
National Institute of Standards and Technology, US Department of Commerce …, 2018
1412018
Guidelines for managing the security of mobile devices in the enterprise
M Souppaya, K Scarfone
NIST special publication 800, 124, 2013
1412013
Inside network perimeter security: The definitive guide to firewalls, VPNs, routers, and intrusion detection systems
S Northcutt, S Winters, K Frederick, L Zeltser, RW Ritchey
Pearson Education, 2002
1352002
The system can't perform the operation now. Try again later.
Articles 1–20