Kevin S. Killourhy, Ph.D. - Publications
Affiliations: | 2012 | Carnegie Mellon University, Pittsburgh, PA |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2012 | Killourhy KS, Maxion RA. Free vs. transcribed text for keystroke-dynamics evaluations Acm International Conference Proceeding Series. 1-8. DOI: 10.1145/2379616.2379617 | 0.581 | |||
2010 | Maxion RA, Killourhy KS. Keystroke biometrics with number-pad input Proceedings of the International Conference On Dependable Systems and Networks. 201-210. DOI: 10.1109/DSN.2010.5544311 | 0.625 | |||
2009 | Killourhy KS, Maxion RA. Comparing anomaly-detection algorithms for keystroke dynamics Proceedings of the International Conference On Dependable Systems and Networks. 125-134. DOI: 10.1109/DSN.2009.5270346 | 0.652 | |||
2008 | Killourhy KS, Maxion RA. Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure Advances in Information Security. 39: 91-112. | 0.554 | |||
2007 | Roberts RRM, Maxion RA, Killourhy KS, Arshad F. User discrimination through structured writing on PDAs Proceedings of the International Conference On Dependable Systems and Networks. 378-387. DOI: 10.1109/DSN.2007.97 | 0.618 | |||
2007 | Killourhy KS, Maxion RA. Toward realistic and artifact-free insider-threat data Proceedings - Annual Computer Security Applications Conference, Acsac. 87-96. DOI: 10.1109/ACSAC.2007.31 | 0.624 | |||
2004 | Killourhy KS, Maxion RA, Tan KMC. A defense-centric taxonomy based on attack manifestations Proceedings of the International Conference On Dependable Systems and Networks. 102-111. | 0.643 | |||
2002 | Tan KMC, Killourhy KS, Maxion RA. Undermining an anomaly-based intrusion detection system using common exploits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 54-73. DOI: 10.1007/3-540-36084-0_4 | 0.625 | |||
Show low-probability matches. |