Roy Maxion - Publications

Affiliations: 
Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science

21 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Shen C, Cai Z, Guan X, Maxion R. Performance evaluation of anomaly-detection algorithms for mouse dynamics Computers and Security. 45: 156-171. DOI: 10.1016/J.Cose.2014.05.002  0.489
2013 Shen C, Cai Z, Guan X, Du Y, Maxion RA. User authentication through mouse dynamics Ieee Transactions On Information Forensics and Security. 8: 16-30. DOI: 10.1109/Tifs.2012.2223677  0.311
2012 Killourhy KS, Maxion RA. Free vs. transcribed text for keystroke-dynamics evaluations Acm International Conference Proceeding Series. 1-8. DOI: 10.1145/2379616.2379617  0.701
2012 Shen C, Cai Z, Maxion RA, Xiang G, Guan X. Comparing classification algorithm for mouse dynamics based user identification 2012 Ieee 5th International Conference On Biometrics: Theory, Applications and Systems, Btas 2012. 61-66. DOI: 10.1109/BTAS.2012.6374551  0.366
2010 Maxion RA, Killourhy KS. Keystroke biometrics with number-pad input Proceedings of the International Conference On Dependable Systems and Networks. 201-210. DOI: 10.1109/DSN.2010.5544311  0.728
2010 Killourhy K, Maxion R. Why did my detector do that?! Predicting keystroke-dynamics error rates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 256-276. DOI: 10.1007/978-3-642-15512-3_14  0.312
2009 Killourhy KS, Maxion RA. Comparing anomaly-detection algorithms for keystroke dynamics Proceedings of the International Conference On Dependable Systems and Networks. 125-134. DOI: 10.1109/DSN.2009.5270346  0.744
2008 Killourhy K, Maxion R. The effect of clock resolution on keystroke dynamics Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 331-350. DOI: 10.1007/978-3-540-87403-4_18  0.353
2008 Killourhy KS, Maxion RA. Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure Advances in Information Security. 39: 91-112.  0.684
2007 Roberts RRM, Maxion RA, Killourhy KS, Arshad F. User discrimination through structured writing on PDAs Proceedings of the International Conference On Dependable Systems and Networks. 378-387. DOI: 10.1109/DSN.2007.97  0.724
2007 Killourhy KS, Maxion RA. Toward realistic and artifact-free insider-threat data Proceedings - Annual Computer Security Applications Conference, Acsac. 87-96. DOI: 10.1109/ACSAC.2007.31  0.727
2006 Reeder RW, Maxion RA. User interface defect detection by hesitation analysis Proceedings of the International Conference On Dependable Systems and Networks. 2006: 61-70. DOI: 10.1109/DSN.2006.71  0.319
2006 Hansen JP, Tan KMC, Maxion RA. Anomaly detector performance evaluation using a parameterized environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 106-126.  0.383
2005 Tan KMC, Maxion RA. The effects of algorithmic diversity on anomaly detector performance Proceedings of the International Conference On Dependable Systems and Networks. 216-225. DOI: 10.1109/DSN.2005.91  0.312
2004 Maxion RA, Townsend TN. Masquerade detection augmented with error analysis Ieee Transactions On Reliability. 53: 124-147. DOI: 10.1109/TR.2004.824828  0.332
2004 Killourhy KS, Maxion RA, Tan KMC. A defense-centric taxonomy based on attack manifestations Proceedings of the International Conference On Dependable Systems and Networks. 102-111.  0.738
2003 Maxion RA. Masquerade Detection Using Enriched Command Lines Proceedings of the International Conference On Dependable Systems and Networks. 5-14. DOI: 10.1109/DSN.2003.1209911  0.363
2003 Banks DL, Olszewski RT, Maxion RA. Comparing methods for multivariate nonparametric regression Communications in Statistics Part B: Simulation and Computation. 32: 541-571. DOI: 10.1081/Sac-120017506  0.569
2002 Maxion RA, Townsend TN. Masquerade detection using truncated command lines Proceedings of the 2002 International Conference On Dependable Systems and Networks. 219-228. DOI: 10.1109/DSN.2002.1028903  0.387
2002 Tan KMC, Killourhy KS, Maxion RA. Undermining an anomaly-based intrusion detection system using common exploits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 54-73. DOI: 10.1007/3-540-36084-0_4  0.728
2000 Maxion RA, Tan KMC. Benchmarking anomaly-based detection systems Proceedings of the 2002 International Conference On Dependable Systems and Networks. 623-630. DOI: 10.1109/ICDSN.2000.857599  0.329
Show low-probability matches.