The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fabian Monrose: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sujata Doshi, Fabian Monrose, Aviel D. Rubin
    Efficient Memory Bound Puzzles Using Pattern Databases. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:98-113 [Conf]
  2. Seny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose
    An Extensible Platform for Evaluating Security Protocols. [Citation Graph (0, 0)][DBLP]
    Annual Simulation Symposium, 2005, pp:204-213 [Conf]
  3. Fabian Monrose, Aviel D. Rubin
    Authentication via Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:48-56 [Conf]
  4. Fabian Monrose, Michael K. Reiter, Susanne Wetzel
    Password Hardening Based on Keystroke Dynamics. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:73-82 [Conf]
  5. Lucas Ballard, Seny Kamara, Fabian Monrose
    Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:414-426 [Conf]
  6. Darren Davis, Fabian Monrose, Michael K. Reiter
    Time-Scoped Searching of Encrypted Audit Logs. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:532-545 [Conf]
  7. Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis
    A multifaceted approach to understanding the botnet phenomenon. [Citation Graph (0, 0)][DBLP]
    Internet Measurement Conference, 2006, pp:41-52 [Conf]
  8. Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin
    Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:489-496 [Conf]
  9. Fabian Monrose, Peter Wyckoff, Aviel D. Rubin
    Distributed Execution with Remote Audit. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  10. Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
    Fast and Evasive Attacks: Highlighting the Challenges Ahead. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:206-225 [Conf]
  11. Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter
    Privacy-preserving global customization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2000, pp:176-184 [Conf]
  12. Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel
    Cryptographic Key Generation from Voice. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:202-213 [Conf]
  13. Darren Davis, Fabian Monrose, Michael K. Reiter
    On User Choice in Graphical Password Schemes. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:151-164 [Conf]
  14. Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih
    Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:283-296 [Conf]
  15. Charles Wright, Fabian Monrose, Gerald M. Masson
    HMM profiles for network traffic classification. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:9-15 [Conf]
  16. Charles V. Wright, Fabian Monrose, Gerald M. Masson
    Using visual motifs to classify encrypted traffic. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2006, pp:41-50 [Conf]
  17. Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
    Worm evolution tracking via timing analysis. [Citation Graph (0, 0)][DBLP]
    WORM, 2005, pp:52-59 [Conf]
  18. Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
    On the impact of dynamic addressing on malware propagation. [Citation Graph (0, 0)][DBLP]
    WORM, 2006, pp:51-56 [Conf]
  19. Fabian Monrose, Michael K. Reiter, Susanne Wetzel
    Password hardening based on keystroke dynamics. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:69-83 [Journal]
  20. Charles V. Wright, Fabian Monrose, Gerald M. Masson
    On Inferring Application Protocol Behaviors in Encrypted Network Traffic. [Citation Graph (0, 0)][DBLP]
    Journal of Machine Learning Research, 2006, v:6, n:, pp:2745-2769 [Journal]
  21. I. Jermyn, Fabian Monrose, Peter Wyckoff
    Leaving the sandbox: Third party validation for Java applications. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 1998, pp:436-439 [Conf]
  22. Fabian Monrose, Aviel D. Rubin
    Keystroke dynamics as a biometric for authentication. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:351-359 [Journal]

  23. Peeking Through the Cloud: DNS-Based Estimation and Its Applications. [Citation Graph (, )][DBLP]


  24. Towards practical biometric key generation with randomized biometric templates. [Citation Graph (, )][DBLP]


  25. English shellcode. [Citation Graph (, )][DBLP]


  26. Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. [Citation Graph (, )][DBLP]


  27. Toward Valley-Free Inter-domain Routing. [Citation Graph (, )][DBLP]


  28. Toward Resisting Forgery Attacks via Pseudo-Signatures. [Citation Graph (, )][DBLP]


  29. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. [Citation Graph (, )][DBLP]


  30. Taming the Devil: Techniques for Evaluating Anonymized Network Data. [Citation Graph (, )][DBLP]


  31. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. [Citation Graph (, )][DBLP]


  32. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. [Citation Graph (, )][DBLP]


  33. To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. [Citation Graph (, )][DBLP]


  34. All Your iFRAMEs Point to Us. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.307secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002