Follow
Roy Maxion
Roy Maxion
Research Professor of Computer Science/Machine Learning, Carnegie Mellon University
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Comparing anomaly-detection algorithms for keystroke dynamics
KS Killourhy, RA Maxion
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
7432009
Masquerade detection using truncated command lines
RA Maxion, TN Townsend
Proceedings international conference on dependable systems and networks, 219-228, 2002
3612002
Undermining an anomaly-based intrusion detection system using common exploits
KMC Tan, KS Killourhy, RA Maxion
Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002
3002002
Using cohort scheduling to enhance server performance
JR Larus, M Parkes
Proceedings of the ACM SIGPLAN workshop on Languages, compilers and tools …, 2001
296*2001
Markov Chains, Classifiers, and Intrusion Detection.
S Jha, KMC Tan, RA Maxion
csfw 1, 206, 2001
2202001
User authentication through mouse dynamics
C Shen, Z Cai, X Guan, Y Du, RA Maxion
IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2012
2052012
" Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector
KMC Tan, RA Maxion
Proceedings 2002 IEEE Symposium on Security and Privacy, 188-201, 2002
1902002
Benchmarking anomaly-based detection systems
RA Maxion, KMC Tan
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
1852000
Performance analysis of multi-motion sensor behavior for active smartphone authentication
C Shen, Y Li, Y Chen, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2017
1832017
Masquerade detection using enriched command lines
RA Maxion
2003 International Conference on Dependable Systems and Networks, 2003 …, 2003
1802003
A case study of ethernet anomalies in a distributed computing environment
RA Maxion, FE Feather
IEEE transactions on Reliability 39 (4), 433-443, 1990
1781990
Fault detection in an ethernet network using anomaly signature matching
F Feather, D Siewiorek, R Maxion
ACM SIGCOMM Computer Communication Review 23 (4), 279-288, 1993
1671993
Improving user-interface dependability through mitigation of human error
RA Maxion, RW Reeder
International Journal of human-computer studies 63 (1-2), 25-50, 2005
1632005
Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates
K Killourhy, R Maxion
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
1462010
Keystroke biometrics with number-pad input
RA Maxion, KS Killourhy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
1112010
A defense-centric taxonomy based on attack manifestations
KS Killourhy, RA Maxion, KMC Tan
International Conference on Dependable Systems and Networks, 2004, 102-111, 2004
1102004
Performance analysis of touch-interaction behavior for active smartphone authentication
C Shen, Y Zhang, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 11 (3), 498-513, 2015
1092015
Anomaly detection in embedded systems
RA Maxion, KMC Tan
IEEE Transactions on Computers 51 (2), 108-120, 2002
1042002
The effect of clock resolution on keystroke dynamics
K Killourhy, R Maxion
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
982008
An approach to measuring a system’s attack surface
PK Manadhata, KMC Tan, RA Maxion, JM Wing
Pittsburgh, PA, Tech. Rep, 2007
982007
The system can't perform the operation now. Try again later.
Articles 1–20