Search the dblp DataBase
Roy A. Maxion :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Somesh Jha , Kymie M. C. Tan , Roy A. Maxion Markov Chains, Classifiers, and Intrusion Detection. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:206-219 [Conf ] Kevin S. Killourhy , Roy A. Maxion , Kymie M. C. Tan A Defense-Centric Taxonomy Based on Attack Manifestations. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:102-0 [Conf ] Robert W. Reeder , Roy A. Maxion User Interface Dependability through Goal-Error Prevention. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:60-69 [Conf ] Robert W. Reeder , Roy A. Maxion User Interface Defect Detection by Hesitation Analysis. [Citation Graph (0, 0)][DBLP ] DSN, 2006, pp:61-72 [Conf ] Roy A. Maxion Masquerade Detection Using Enriched Command Lines. [Citation Graph (0, 0)][DBLP ] DSN, 2003, pp:5-14 [Conf ] Roy A. Maxion , Kymie M. C. Tan Benchmarking Anomaly-Based Detection Systems. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:623-630 [Conf ] Roy A. Maxion , Tahlia N. Townsend Masquerade Detection Using Truncated Command Lines. [Citation Graph (0, 0)][DBLP ] DSN, 2002, pp:219-228 [Conf ] Kymie M. C. Tan , Roy A. Maxion The Effects of Algorithmic Diversity on Anomaly Detector Performance. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:216-225 [Conf ] Roy A. Maxion , Robert T. Olszewski Detection and Discrimination of Injected Network Faults. [Citation Graph (0, 0)][DBLP ] FTCS, 1993, pp:198-207 [Conf ] Roy A. Maxion , Robert T. Olszewski Improving Software Robustness with Dependability Cases. [Citation Graph (0, 0)][DBLP ] FTCS, 1998, pp:346-355 [Conf ] Roy A. Maxion , Philip A. Syme Mitigating Operator-Induced Unavailability by Matching Imprecise Queries. [Citation Graph (0, 0)][DBLP ] FTCS, 1996, pp:240-249 [Conf ] Roy A. Maxion , Philip A. Syme MetriStation: A Tool for User-Interface Fault Detection. [Citation Graph (0, 0)][DBLP ] FTCS, 1997, pp:89-98 [Conf ] Roy A. Maxion , Aimee L. deChambeau Depenability at the User Interface. [Citation Graph (0, 0)][DBLP ] FTCS, 1995, pp:528-535 [Conf ] Daniel P. Siewiorek , Roy A. Maxion , Priya Narasimhan Experimental research in dependable computing at Carnegie Mellon University. [Citation Graph (0, 0)][DBLP ] IFIP Congress Topical Sessions, 2004, pp:305-328 [Conf ] Kymie M. C. Tan , Kevin S. Killourhy , Roy A. Maxion Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:54-73 [Conf ] Jeffery P. Hansen , Kymie M. C. Tan , Roy A. Maxion Anomaly Detector Performance Evaluation Using a Parameterized Environment. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:106-126 [Conf ] Frank Feather , Daniel P. Siewiorek , Roy A. Maxion Fault Detection in an Ethernet Network Using Anomaly Signature Matching. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1993, pp:279-288 [Conf ] Kymie M. C. Tan , Roy A. Maxion "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:188-201 [Conf ] Roy A. Maxion , Rachel R. M. Roberts Methodological Foundations: Enabling the Next Generation of Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:54-57 [Journal ] Roy A. Maxion , Robert W. Reeder Improving user-interface dependability through mitigation of human error. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:25-50 [Journal ] Roy A. Maxion , Kymie M. C. Tan Anomaly Detection in Embedded Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2002, v:51, n:2, pp:108-120 [Journal ] Roy A. Maxion , Robert T. Olszewski Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2000, v:26, n:9, pp:888-906 [Journal ] Rachel R. M. Roberts , Roy A. Maxion , Kevin S. Killourhy , Fahd Arshad User Discrimination through Structured Writing on PDAs. [Citation Graph (0, 0)][DBLP ] DSN, 2007, pp:378-388 [Conf ] Roy A. Maxion , Tahlia N. Townsend Masquerade detection augmented with error analysis. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Reliability, 2004, v:53, n:1, pp:124-147 [Journal ] Toward Realistic and Artifact-Free Insider-Threat Data. [Citation Graph (, )][DBLP ] Comparing anomaly-detection algorithms for keystroke dynamics. [Citation Graph (, )][DBLP ] The Effect of Clock Resolution on Keystroke Dynamics. [Citation Graph (, )][DBLP ] Why Did My Detector Do That ?! - Predicting Keystroke-Dynamics Error Rates. [Citation Graph (, )][DBLP ] Designing and evaluating usable security and privacy technology. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs