Comparing anomaly-detection algorithms for keystroke dynamics KS Killourhy, RA Maxion 2009 IEEE/IFIP international conference on dependable systems & networks …, 2009 | 771 | 2009 |
Masquerade detection using truncated command lines RA Maxion, TN Townsend Proceedings international conference on dependable systems and networks, 219-228, 2002 | 358 | 2002 |
Undermining an anomaly-based intrusion detection system using common exploits KMC Tan, KS Killourhy, RA Maxion Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002 | 319 | 2002 |
Using cohort scheduling to enhance server performance JR Larus, M Parkes Proceedings of the ACM SIGPLAN workshop on Languages, compilers and tools …, 2001 | 301* | 2001 |
Markov Chains, Classifiers, and Intrusion Detection. S Jha, KMC Tan, RA Maxion csfw 1, 206, 2001 | 221 | 2001 |
Performance analysis of multi-motion sensor behavior for active smartphone authentication C Shen, Y Li, Y Chen, X Guan, RA Maxion IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2017 | 202 | 2017 |
User authentication through mouse dynamics C Shen, Z Cai, X Guan, Y Du, RA Maxion IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2012 | 197 | 2012 |
" Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector KMC Tan, RA Maxion Proceedings 2002 IEEE Symposium on Security and Privacy, 188-201, 2002 | 193 | 2002 |
Benchmarking anomaly-based detection systems RA Maxion, KMC Tan Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000 | 190 | 2000 |
Masquerade detection using enriched command lines RA Maxion 2003 International Conference on Dependable Systems and Networks, 2003 …, 2003 | 183 | 2003 |
A case study of ethernet anomalies in a distributed computing environment RA Maxion, FE Feather IEEE transactions on Reliability 39 (4), 433-443, 1990 | 176 | 1990 |
Fault detection in an ethernet network using anomaly signature matching F Feather, D Siewiorek, R Maxion ACM SIGCOMM Computer Communication Review 23 (4), 279-288, 1993 | 169 | 1993 |
Improving user-interface dependability through mitigation of human error RA Maxion, RW Reeder International Journal of human-computer studies 63 (1-2), 25-50, 2005 | 163 | 2005 |
Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates K Killourhy, R Maxion Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 147 | 2010 |
Performance analysis of touch-interaction behavior for active smartphone authentication C Shen, Y Zhang, X Guan, RA Maxion IEEE Transactions on Information Forensics and Security 11 (3), 498-513, 2015 | 119 | 2015 |
Keystroke biometrics with number-pad input RA Maxion, KS Killourhy 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 112 | 2010 |
A defense-centric taxonomy based on attack manifestations KS Killourhy, RA Maxion, KMC Tan International Conference on Dependable Systems and Networks, 2004, 102-111, 2004 | 110 | 2004 |
Anomaly detection in embedded systems RA Maxion, KMC Tan IEEE Transactions on Computers 51 (2), 108-120, 2002 | 107 | 2002 |
Masquerade detection augmented with error analysis RA Maxion, TN Townsend IEEE Transactions on Reliability 53 (1), 124-147, 2004 | 100 | 2004 |
The effect of clock resolution on keystroke dynamics K Killourhy, R Maxion Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 99 | 2008 |