Kevin S. Killourhy, Ph.D. - Publications

Affiliations: 
2012 Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science

8 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2012 Killourhy KS, Maxion RA. Free vs. transcribed text for keystroke-dynamics evaluations Acm International Conference Proceeding Series. 1-8. DOI: 10.1145/2379616.2379617  0.581
2010 Maxion RA, Killourhy KS. Keystroke biometrics with number-pad input Proceedings of the International Conference On Dependable Systems and Networks. 201-210. DOI: 10.1109/DSN.2010.5544311  0.625
2009 Killourhy KS, Maxion RA. Comparing anomaly-detection algorithms for keystroke dynamics Proceedings of the International Conference On Dependable Systems and Networks. 125-134. DOI: 10.1109/DSN.2009.5270346  0.652
2008 Killourhy KS, Maxion RA. Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure Advances in Information Security. 39: 91-112.  0.554
2007 Roberts RRM, Maxion RA, Killourhy KS, Arshad F. User discrimination through structured writing on PDAs Proceedings of the International Conference On Dependable Systems and Networks. 378-387. DOI: 10.1109/DSN.2007.97  0.618
2007 Killourhy KS, Maxion RA. Toward realistic and artifact-free insider-threat data Proceedings - Annual Computer Security Applications Conference, Acsac. 87-96. DOI: 10.1109/ACSAC.2007.31  0.624
2004 Killourhy KS, Maxion RA, Tan KMC. A defense-centric taxonomy based on attack manifestations Proceedings of the International Conference On Dependable Systems and Networks. 102-111.  0.643
2002 Tan KMC, Killourhy KS, Maxion RA. Undermining an anomaly-based intrusion detection system using common exploits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 54-73. DOI: 10.1007/3-540-36084-0_4  0.625
Show low-probability matches.