Year |
Citation |
Score |
2014 |
Shen C, Cai Z, Guan X, Maxion R. Performance evaluation of anomaly-detection algorithms for mouse dynamics Computers and Security. 45: 156-171. DOI: 10.1016/J.Cose.2014.05.002 |
0.489 |
|
2013 |
Shen C, Cai Z, Guan X, Du Y, Maxion RA. User authentication through mouse dynamics Ieee Transactions On Information Forensics and Security. 8: 16-30. DOI: 10.1109/Tifs.2012.2223677 |
0.311 |
|
2012 |
Killourhy KS, Maxion RA. Free vs. transcribed text for keystroke-dynamics evaluations Acm International Conference Proceeding Series. 1-8. DOI: 10.1145/2379616.2379617 |
0.701 |
|
2012 |
Shen C, Cai Z, Maxion RA, Xiang G, Guan X. Comparing classification algorithm for mouse dynamics based user identification 2012 Ieee 5th International Conference On Biometrics: Theory, Applications and Systems, Btas 2012. 61-66. DOI: 10.1109/BTAS.2012.6374551 |
0.366 |
|
2010 |
Maxion RA, Killourhy KS. Keystroke biometrics with number-pad input Proceedings of the International Conference On Dependable Systems and Networks. 201-210. DOI: 10.1109/DSN.2010.5544311 |
0.728 |
|
2010 |
Killourhy K, Maxion R. Why did my detector do that?! Predicting keystroke-dynamics error rates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 256-276. DOI: 10.1007/978-3-642-15512-3_14 |
0.312 |
|
2009 |
Killourhy KS, Maxion RA. Comparing anomaly-detection algorithms for keystroke dynamics Proceedings of the International Conference On Dependable Systems and Networks. 125-134. DOI: 10.1109/DSN.2009.5270346 |
0.744 |
|
2008 |
Killourhy K, Maxion R. The effect of clock resolution on keystroke dynamics Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 331-350. DOI: 10.1007/978-3-540-87403-4_18 |
0.353 |
|
2008 |
Killourhy KS, Maxion RA. Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure Advances in Information Security. 39: 91-112. |
0.684 |
|
2007 |
Roberts RRM, Maxion RA, Killourhy KS, Arshad F. User discrimination through structured writing on PDAs Proceedings of the International Conference On Dependable Systems and Networks. 378-387. DOI: 10.1109/DSN.2007.97 |
0.724 |
|
2007 |
Killourhy KS, Maxion RA. Toward realistic and artifact-free insider-threat data Proceedings - Annual Computer Security Applications Conference, Acsac. 87-96. DOI: 10.1109/ACSAC.2007.31 |
0.727 |
|
2006 |
Reeder RW, Maxion RA. User interface defect detection by hesitation analysis Proceedings of the International Conference On Dependable Systems and Networks. 2006: 61-70. DOI: 10.1109/DSN.2006.71 |
0.319 |
|
2006 |
Hansen JP, Tan KMC, Maxion RA. Anomaly detector performance evaluation using a parameterized environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 106-126. |
0.383 |
|
2005 |
Tan KMC, Maxion RA. The effects of algorithmic diversity on anomaly detector performance Proceedings of the International Conference On Dependable Systems and Networks. 216-225. DOI: 10.1109/DSN.2005.91 |
0.312 |
|
2004 |
Maxion RA, Townsend TN. Masquerade detection augmented with error analysis Ieee Transactions On Reliability. 53: 124-147. DOI: 10.1109/TR.2004.824828 |
0.332 |
|
2004 |
Killourhy KS, Maxion RA, Tan KMC. A defense-centric taxonomy based on attack manifestations Proceedings of the International Conference On Dependable Systems and Networks. 102-111. |
0.738 |
|
2003 |
Maxion RA. Masquerade Detection Using Enriched Command Lines Proceedings of the International Conference On Dependable Systems and Networks. 5-14. DOI: 10.1109/DSN.2003.1209911 |
0.363 |
|
2003 |
Banks DL, Olszewski RT, Maxion RA. Comparing methods for multivariate nonparametric regression Communications in Statistics Part B: Simulation and Computation. 32: 541-571. DOI: 10.1081/Sac-120017506 |
0.569 |
|
2002 |
Maxion RA, Townsend TN. Masquerade detection using truncated command lines Proceedings of the 2002 International Conference On Dependable Systems and Networks. 219-228. DOI: 10.1109/DSN.2002.1028903 |
0.387 |
|
2002 |
Tan KMC, Killourhy KS, Maxion RA. Undermining an anomaly-based intrusion detection system using common exploits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 54-73. DOI: 10.1007/3-540-36084-0_4 |
0.728 |
|
2000 |
Maxion RA, Tan KMC. Benchmarking anomaly-based detection systems Proceedings of the 2002 International Conference On Dependable Systems and Networks. 623-630. DOI: 10.1109/ICDSN.2000.857599 |
0.329 |
|
Show low-probability matches. |