Fabian Monrose
Affiliations: | Johns Hopkins University, Baltimore, MD |
Area:
Computer ScienceGoogle:
"Fabian Monrose"Children
Sign in to add traineeCharles V. Wright | grad student | Johns Hopkins University; Whiting School of Engineering (Neurotree) | |
Sophie Y. Qiu | grad student | 2007 | Johns Hopkins |
Seny Kamara | grad student | 2008 | Johns Hopkins |
Scott E. Coull | grad student | 2009 | Johns Hopkins |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Xu Y, Reynaga G, Chiasson S, et al. (2014) Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion Ieee Transactions On Dependable and Secure Computing. 11: 480-493 |
Raguram R, White AM, Xu Y, et al. (2013) On the privacy risks of virtual keyboards: Automatic reconstruction of typed input from compromising reflections Ieee Transactions On Dependable and Secure Computing. 10: 154-167 |
Krishnan S, Snow KZ, Monrose F. (2012) Trail of bytes: New techniques for supporting data provenance and limiting privacy breaches Ieee Transactions On Information Forensics and Security. 7: 1876-1889 |
Coull SE, White AM, Yen TF, et al. (2012) Understanding domain registration abuses Computers and Security. 31: 806-815 |
White AM, Matthews AR, Snow KZ, et al. (2011) Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks Proceedings - Ieee Symposium On Security and Privacy. 3-18 |
Huang X, Monrose F, Reiter MK. (2011) Amplifying limited expert input to sanitize large network traces Proceedings of the International Conference On Dependable Systems and Networks. 494-505 |
Krishnan S, Monrose F. (2011) An empirical study of the performance, security and privacy implications of domain name prefetching Proceedings of the International Conference On Dependable Systems and Networks. 61-72 |
Wright CV, Ballard L, Coull SE, et al. (2010) Uncovering spoken phrases in encrypted Voice over IP conversations Acm Transactions On Information and System Security. 13 |
Rajab MA, Monrose F, Provos N. (2010) Peeking Through the Cloud Acm Transactions On Internet Technology. 10: 1-21 |
Coull SE, Monrose F, Reiter MK, et al. (2009) The challenges of effectively anonymizing network data Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 230-236 |