The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Roy A. Maxion: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Somesh Jha, Kymie M. C. Tan, Roy A. Maxion
    Markov Chains, Classifiers, and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:206-219 [Conf]
  2. Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan
    A Defense-Centric Taxonomy Based on Attack Manifestations. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:102-0 [Conf]
  3. Robert W. Reeder, Roy A. Maxion
    User Interface Dependability through Goal-Error Prevention. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:60-69 [Conf]
  4. Robert W. Reeder, Roy A. Maxion
    User Interface Defect Detection by Hesitation Analysis. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:61-72 [Conf]
  5. Roy A. Maxion
    Masquerade Detection Using Enriched Command Lines. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:5-14 [Conf]
  6. Roy A. Maxion, Kymie M. C. Tan
    Benchmarking Anomaly-Based Detection Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:623-630 [Conf]
  7. Roy A. Maxion, Tahlia N. Townsend
    Masquerade Detection Using Truncated Command Lines. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:219-228 [Conf]
  8. Kymie M. C. Tan, Roy A. Maxion
    The Effects of Algorithmic Diversity on Anomaly Detector Performance. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:216-225 [Conf]
  9. Roy A. Maxion, Robert T. Olszewski
    Detection and Discrimination of Injected Network Faults. [Citation Graph (0, 0)][DBLP]
    FTCS, 1993, pp:198-207 [Conf]
  10. Roy A. Maxion, Robert T. Olszewski
    Improving Software Robustness with Dependability Cases. [Citation Graph (0, 0)][DBLP]
    FTCS, 1998, pp:346-355 [Conf]
  11. Roy A. Maxion, Philip A. Syme
    Mitigating Operator-Induced Unavailability by Matching Imprecise Queries. [Citation Graph (0, 0)][DBLP]
    FTCS, 1996, pp:240-249 [Conf]
  12. Roy A. Maxion, Philip A. Syme
    MetriStation: A Tool for User-Interface Fault Detection. [Citation Graph (0, 0)][DBLP]
    FTCS, 1997, pp:89-98 [Conf]
  13. Roy A. Maxion, Aimee L. deChambeau
    Depenability at the User Interface. [Citation Graph (0, 0)][DBLP]
    FTCS, 1995, pp:528-535 [Conf]
  14. Daniel P. Siewiorek, Roy A. Maxion, Priya Narasimhan
    Experimental research in dependable computing at Carnegie Mellon University. [Citation Graph (0, 0)][DBLP]
    IFIP Congress Topical Sessions, 2004, pp:305-328 [Conf]
  15. Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion
    Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:54-73 [Conf]
  16. Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion
    Anomaly Detector Performance Evaluation Using a Parameterized Environment. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:106-126 [Conf]
  17. Frank Feather, Daniel P. Siewiorek, Roy A. Maxion
    Fault Detection in an Ethernet Network Using Anomaly Signature Matching. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1993, pp:279-288 [Conf]
  18. Kymie M. C. Tan, Roy A. Maxion
    "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:188-201 [Conf]
  19. Roy A. Maxion, Rachel R. M. Roberts
    Methodological Foundations: Enabling the Next Generation of Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:54-57 [Journal]
  20. Roy A. Maxion, Robert W. Reeder
    Improving user-interface dependability through mitigation of human error. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:25-50 [Journal]
  21. Roy A. Maxion, Kymie M. C. Tan
    Anomaly Detection in Embedded Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:2, pp:108-120 [Journal]
  22. Roy A. Maxion, Robert T. Olszewski
    Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:9, pp:888-906 [Journal]
  23. Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad
    User Discrimination through Structured Writing on PDAs. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:378-388 [Conf]
  24. Roy A. Maxion, Tahlia N. Townsend
    Masquerade detection augmented with error analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2004, v:53, n:1, pp:124-147 [Journal]

  25. Toward Realistic and Artifact-Free Insider-Threat Data. [Citation Graph (, )][DBLP]


  26. Comparing anomaly-detection algorithms for keystroke dynamics. [Citation Graph (, )][DBLP]


  27. The Effect of Clock Resolution on Keystroke Dynamics. [Citation Graph (, )][DBLP]


  28. Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. [Citation Graph (, )][DBLP]


  29. Designing and evaluating usable security and privacy technology. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002