Year |
Citation |
Score |
2014 |
Xu Y, Reynaga G, Chiasson S, Frahm JM, Monrose F, Van Oorschot PC. Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion Ieee Transactions On Dependable and Secure Computing. 11: 480-493. DOI: 10.1109/Tdsc.2013.52 |
0.371 |
|
2013 |
Raguram R, White AM, Xu Y, Frahm JM, Georgel P, Monrose F. On the privacy risks of virtual keyboards: Automatic reconstruction of typed input from compromising reflections Ieee Transactions On Dependable and Secure Computing. 10: 154-167. DOI: 10.1109/Tdsc.2013.16 |
0.322 |
|
2012 |
Krishnan S, Snow KZ, Monrose F. Trail of bytes: New techniques for supporting data provenance and limiting privacy breaches Ieee Transactions On Information Forensics and Security. 7: 1876-1889. DOI: 10.1109/Tifs.2012.2210217 |
0.394 |
|
2012 |
Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses Computers and Security. 31: 806-815. DOI: 10.1016/J.Cose.2012.05.005 |
0.677 |
|
2011 |
White AM, Matthews AR, Snow KZ, Monrose F. Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks Proceedings - Ieee Symposium On Security and Privacy. 3-18. DOI: 10.1109/SP.2011.34 |
0.342 |
|
2011 |
Huang X, Monrose F, Reiter MK. Amplifying limited expert input to sanitize large network traces Proceedings of the International Conference On Dependable Systems and Networks. 494-505. DOI: 10.1109/DSN.2011.5958262 |
0.327 |
|
2011 |
Krishnan S, Monrose F. An empirical study of the performance, security and privacy implications of domain name prefetching Proceedings of the International Conference On Dependable Systems and Networks. 61-72. DOI: 10.1109/DSN.2011.5958207 |
0.375 |
|
2010 |
Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Uncovering spoken phrases in encrypted Voice over IP conversations Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880029 |
0.644 |
|
2010 |
Rajab MA, Monrose F, Provos N. Peeking Through the Cloud Acm Transactions On Internet Technology. 10: 1-21. DOI: 10.1145/1852096.1852097 |
0.405 |
|
2009 |
Coull SE, Monrose F, Reiter MK, Bailey M. The challenges of effectively anonymizing network data Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 230-236. DOI: 10.1109/CATCH.2009.27 |
0.684 |
|
2008 |
Ballard L, Kamara S, Reiter MK, Monrose F. Towards practical biometric key generation with randomized biometric templates Proceedings of the Acm Conference On Computer and Communications Security. 235-244. DOI: 10.1145/1455770.1455801 |
0.606 |
|
2008 |
Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Proceedings - Ieee Symposium On Security and Privacy. 35-49. DOI: 10.1109/SP.2008.21 |
0.739 |
|
2008 |
Rajab MA, Monrose F, Terzis A, Provos N. Peeking through the cloud: DNS-based estimation and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 21-38. DOI: 10.1007/978-3-540-68914-0_2 |
0.301 |
|
2007 |
Ballard L, Lopresti D, Monrose F. Forgery quality and its implications for behavioral biometric security. Ieee Transactions On Systems, Man, and Cybernetics. Part B, Cybernetics : a Publication of the Ieee Systems, Man, and Cybernetics Society. 37: 1107-18. PMID 17926695 DOI: 10.1109/TSMCB.2007.903539 |
0.329 |
|
2007 |
Qiu SY, McDaniel PD, Monrose F. Toward valley-free inter-domain routing Ieee International Conference On Communications. 2009-2016. DOI: 10.1109/ICC.2007.334 |
0.575 |
|
2006 |
Abu Rajab M, Monrose F, Terzis A. On the impact of dynamic addressing on malware propagation Proceedings of the 4th Acm Workshop On Recurring Malcode, Worm'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 51-56. DOI: 10.1145/1179542.1179554 |
0.303 |
|
2006 |
Qiu SY, Monrose F, Terzis A, McDaniel PD. Efficient techniques for detecting false origin advertisements in inter-domain routing 2nd Workshop On Secure Network Protocols, Npsec. 12-19. DOI: 10.1109/NPSEC.2006.320341 |
0.555 |
|
2006 |
Qiu SY, McDaniel PD, Monrose F, Rubin AD. Characterizing address use structure and stability of origin advertisement in inter-domain routing Proceedings - International Symposium On Computers and Communications. 489-496. DOI: 10.1109/ISCC.2006.48 |
0.54 |
|
2006 |
Wright CV, Monrose F, Masson GM. On inferring application protocol behaviors in encrypted network traffic Journal of Machine Learning Research. 7: 2745-2769. |
0.431 |
|
2005 |
Small S, Terzis A, Monrose F, Doshi B, De Simone A. Scalable VPNs for the global information grid Proceedings - Ieee Military Communications Conference Milcom. 2005. DOI: 10.1109/MILCOM.2005.1605702 |
0.371 |
|
2005 |
Kamara S, Davis D, Ballard L, Caudy R, Monrose F. An extensible platform for evaluating security protocols Proceedings - Simulation Symposium. 204-213. DOI: 10.1109/ANSS.2005.11 |
0.673 |
|
2005 |
Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 414-426. DOI: 10.1007/11602897_35 |
0.635 |
|
2004 |
Wright C, Monrose F, Massen GM. HMM profiles for network traffic classification (extended abstract) Vizsec/Dmsec '04: Proceedings of the 2004 Acm Workshop On Visualization and Data Mining For Computer Security. 9-15. |
0.364 |
|
2000 |
Monrose F, Rubin AD. Keystroke dynamics as a biometric for authentication Future Generation Computer Systems. 16: 351-359. DOI: 10.1016/S0167-739X(99)00059-X |
0.451 |
|
Show low-probability matches. |