|
Search the dblp DataBase
Fabian Monrose:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sujata Doshi, Fabian Monrose, Aviel D. Rubin
Efficient Memory Bound Puzzles Using Pattern Databases. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:98-113 [Conf]
- Seny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose
An Extensible Platform for Evaluating Security Protocols. [Citation Graph (0, 0)][DBLP] Annual Simulation Symposium, 2005, pp:204-213 [Conf]
- Fabian Monrose, Aviel D. Rubin
Authentication via Keystroke Dynamics. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1997, pp:48-56 [Conf]
- Fabian Monrose, Michael K. Reiter, Susanne Wetzel
Password Hardening Based on Keystroke Dynamics. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:73-82 [Conf]
- Lucas Ballard, Seny Kamara, Fabian Monrose
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:414-426 [Conf]
- Darren Davis, Fabian Monrose, Michael K. Reiter
Time-Scoped Searching of Encrypted Audit Logs. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:532-545 [Conf]
- Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis
A multifaceted approach to understanding the botnet phenomenon. [Citation Graph (0, 0)][DBLP] Internet Measurement Conference, 2006, pp:41-52 [Conf]
- Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. [Citation Graph (0, 0)][DBLP] ISCC, 2006, pp:489-496 [Conf]
- Fabian Monrose, Peter Wyckoff, Aviel D. Rubin
Distributed Execution with Remote Audit. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
Fast and Evasive Attacks: Highlighting the Challenges Ahead. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:206-225 [Conf]
- Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter
Privacy-preserving global customization. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2000, pp:176-184 [Conf]
- Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel
Cryptographic Key Generation from Voice. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2001, pp:202-213 [Conf]
- Darren Davis, Fabian Monrose, Michael K. Reiter
On User Choice in Graphical Password Schemes. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:151-164 [Conf]
- Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:283-296 [Conf]
- Charles Wright, Fabian Monrose, Gerald M. Masson
HMM profiles for network traffic classification. [Citation Graph (0, 0)][DBLP] VizSEC, 2004, pp:9-15 [Conf]
- Charles V. Wright, Fabian Monrose, Gerald M. Masson
Using visual motifs to classify encrypted traffic. [Citation Graph (0, 0)][DBLP] VizSEC, 2006, pp:41-50 [Conf]
- Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
Worm evolution tracking via timing analysis. [Citation Graph (0, 0)][DBLP] WORM, 2005, pp:52-59 [Conf]
- Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
On the impact of dynamic addressing on malware propagation. [Citation Graph (0, 0)][DBLP] WORM, 2006, pp:51-56 [Conf]
- Fabian Monrose, Michael K. Reiter, Susanne Wetzel
Password hardening based on keystroke dynamics. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:2, pp:69-83 [Journal]
- Charles V. Wright, Fabian Monrose, Gerald M. Masson
On Inferring Application Protocol Behaviors in Encrypted Network Traffic. [Citation Graph (0, 0)][DBLP] Journal of Machine Learning Research, 2006, v:6, n:, pp:2745-2769 [Journal]
- I. Jermyn, Fabian Monrose, Peter Wyckoff
Leaving the sandbox: Third party validation for Java applications. [Citation Graph (0, 0)][DBLP] Computers and Their Applications, 1998, pp:436-439 [Conf]
- Fabian Monrose, Aviel D. Rubin
Keystroke dynamics as a biometric for authentication. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2000, v:16, n:4, pp:351-359 [Journal]
Peeking Through the Cloud: DNS-Based Estimation and Its Applications. [Citation Graph (, )][DBLP]
Towards practical biometric key generation with randomized biometric templates. [Citation Graph (, )][DBLP]
English shellcode. [Citation Graph (, )][DBLP]
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. [Citation Graph (, )][DBLP]
Toward Valley-Free Inter-domain Routing. [Citation Graph (, )][DBLP]
Toward Resisting Forgery Attacks via Pseudo-Signatures. [Citation Graph (, )][DBLP]
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. [Citation Graph (, )][DBLP]
Taming the Devil: Techniques for Evaluating Anonymized Network Data. [Citation Graph (, )][DBLP]
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. [Citation Graph (, )][DBLP]
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. [Citation Graph (, )][DBLP]
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. [Citation Graph (, )][DBLP]
All Your iFRAMEs Point to Us. [Citation Graph (, )][DBLP]
Search in 0.090secs, Finished in 0.092secs
|