The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kevin S. Killourhy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan
    A Defense-Centric Taxonomy Based on Attack Manifestations. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:102-0 [Conf]
  2. Kymie M. C. Tan, John McHugh, Kevin S. Killourhy
    Hiding Intrusions: From the Abnormal to the Normal and Beyond. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:1-17 [Conf]
  3. Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion
    Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:54-73 [Conf]
  4. Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad
    User Discrimination through Structured Writing on PDAs. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:378-388 [Conf]

  5. Toward Realistic and Artifact-Free Insider-Threat Data. [Citation Graph (, )][DBLP]


  6. Comparing anomaly-detection algorithms for keystroke dynamics. [Citation Graph (, )][DBLP]


  7. The Effect of Clock Resolution on Keystroke Dynamics. [Citation Graph (, )][DBLP]


  8. Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. [Citation Graph (, )][DBLP]


  9. Bayesian detection of router configuration anomalies. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002