|
Search the dblp DataBase
Kevin S. Killourhy:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan
A Defense-Centric Taxonomy Based on Attack Manifestations. [Citation Graph (0, 0)][DBLP] DSN, 2004, pp:102-0 [Conf]
- Kymie M. C. Tan, John McHugh, Kevin S. Killourhy
Hiding Intrusions: From the Abnormal to the Normal and Beyond. [Citation Graph (0, 0)][DBLP] Information Hiding, 2002, pp:1-17 [Conf]
- Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. [Citation Graph (0, 0)][DBLP] RAID, 2002, pp:54-73 [Conf]
- Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad
User Discrimination through Structured Writing on PDAs. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:378-388 [Conf]
Toward Realistic and Artifact-Free Insider-Threat Data. [Citation Graph (, )][DBLP]
Comparing anomaly-detection algorithms for keystroke dynamics. [Citation Graph (, )][DBLP]
The Effect of Clock Resolution on Keystroke Dynamics. [Citation Graph (, )][DBLP]
Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. [Citation Graph (, )][DBLP]
Bayesian detection of router configuration anomalies. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|