Fabian Monrose - Publications

Affiliations: 
Johns Hopkins University, Baltimore, MD 
Area:
Computer Science

24 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Xu Y, Reynaga G, Chiasson S, Frahm JM, Monrose F, Van Oorschot PC. Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion Ieee Transactions On Dependable and Secure Computing. 11: 480-493. DOI: 10.1109/Tdsc.2013.52  0.371
2013 Raguram R, White AM, Xu Y, Frahm JM, Georgel P, Monrose F. On the privacy risks of virtual keyboards: Automatic reconstruction of typed input from compromising reflections Ieee Transactions On Dependable and Secure Computing. 10: 154-167. DOI: 10.1109/Tdsc.2013.16  0.322
2012 Krishnan S, Snow KZ, Monrose F. Trail of bytes: New techniques for supporting data provenance and limiting privacy breaches Ieee Transactions On Information Forensics and Security. 7: 1876-1889. DOI: 10.1109/Tifs.2012.2210217  0.394
2012 Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses Computers and Security. 31: 806-815. DOI: 10.1016/J.Cose.2012.05.005  0.677
2011 White AM, Matthews AR, Snow KZ, Monrose F. Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks Proceedings - Ieee Symposium On Security and Privacy. 3-18. DOI: 10.1109/SP.2011.34  0.342
2011 Huang X, Monrose F, Reiter MK. Amplifying limited expert input to sanitize large network traces Proceedings of the International Conference On Dependable Systems and Networks. 494-505. DOI: 10.1109/DSN.2011.5958262  0.327
2011 Krishnan S, Monrose F. An empirical study of the performance, security and privacy implications of domain name prefetching Proceedings of the International Conference On Dependable Systems and Networks. 61-72. DOI: 10.1109/DSN.2011.5958207  0.375
2010 Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Uncovering spoken phrases in encrypted Voice over IP conversations Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880029  0.644
2010 Rajab MA, Monrose F, Provos N. Peeking Through the Cloud Acm Transactions On Internet Technology. 10: 1-21. DOI: 10.1145/1852096.1852097  0.405
2009 Coull SE, Monrose F, Reiter MK, Bailey M. The challenges of effectively anonymizing network data Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 230-236. DOI: 10.1109/CATCH.2009.27  0.684
2008 Ballard L, Kamara S, Reiter MK, Monrose F. Towards practical biometric key generation with randomized biometric templates Proceedings of the Acm Conference On Computer and Communications Security. 235-244. DOI: 10.1145/1455770.1455801  0.606
2008 Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Proceedings - Ieee Symposium On Security and Privacy. 35-49. DOI: 10.1109/SP.2008.21  0.739
2008 Rajab MA, Monrose F, Terzis A, Provos N. Peeking through the cloud: DNS-based estimation and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 21-38. DOI: 10.1007/978-3-540-68914-0_2  0.301
2007 Ballard L, Lopresti D, Monrose F. Forgery quality and its implications for behavioral biometric security. Ieee Transactions On Systems, Man, and Cybernetics. Part B, Cybernetics : a Publication of the Ieee Systems, Man, and Cybernetics Society. 37: 1107-18. PMID 17926695 DOI: 10.1109/TSMCB.2007.903539  0.329
2007 Qiu SY, McDaniel PD, Monrose F. Toward valley-free inter-domain routing Ieee International Conference On Communications. 2009-2016. DOI: 10.1109/ICC.2007.334  0.575
2006 Abu Rajab M, Monrose F, Terzis A. On the impact of dynamic addressing on malware propagation Proceedings of the 4th Acm Workshop On Recurring Malcode, Worm'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 51-56. DOI: 10.1145/1179542.1179554  0.303
2006 Qiu SY, Monrose F, Terzis A, McDaniel PD. Efficient techniques for detecting false origin advertisements in inter-domain routing 2nd Workshop On Secure Network Protocols, Npsec. 12-19. DOI: 10.1109/NPSEC.2006.320341  0.555
2006 Qiu SY, McDaniel PD, Monrose F, Rubin AD. Characterizing address use structure and stability of origin advertisement in inter-domain routing Proceedings - International Symposium On Computers and Communications. 489-496. DOI: 10.1109/ISCC.2006.48  0.54
2006 Wright CV, Monrose F, Masson GM. On inferring application protocol behaviors in encrypted network traffic Journal of Machine Learning Research. 7: 2745-2769.  0.431
2005 Small S, Terzis A, Monrose F, Doshi B, De Simone A. Scalable VPNs for the global information grid Proceedings - Ieee Military Communications Conference Milcom. 2005. DOI: 10.1109/MILCOM.2005.1605702  0.371
2005 Kamara S, Davis D, Ballard L, Caudy R, Monrose F. An extensible platform for evaluating security protocols Proceedings - Simulation Symposium. 204-213. DOI: 10.1109/ANSS.2005.11  0.673
2005 Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 414-426. DOI: 10.1007/11602897_35  0.635
2004 Wright C, Monrose F, Massen GM. HMM profiles for network traffic classification (extended abstract) Vizsec/Dmsec '04: Proceedings of the 2004 Acm Workshop On Visualization and Data Mining For Computer Security. 9-15.  0.364
2000 Monrose F, Rubin AD. Keystroke dynamics as a biometric for authentication Future Generation Computer Systems. 16: 351-359. DOI: 10.1016/S0167-739X(99)00059-X  0.451
Show low-probability matches.