Year |
Citation |
Score |
2014 |
Xu Y, Reynaga G, Chiasson S, Frahm JM, Monrose F, Van Oorschot PC. Security Analysis and Related Usability of Motion-Based CAPTCHAs: Decoding Codewords in Motion Ieee Transactions On Dependable and Secure Computing. 11: 480-493. DOI: 10.1109/Tdsc.2013.52 |
0.37 |
|
2013 |
Raguram R, White AM, Xu Y, Frahm JM, Georgel P, Monrose F. On the privacy risks of virtual keyboards: Automatic reconstruction of typed input from compromising reflections Ieee Transactions On Dependable and Secure Computing. 10: 154-167. DOI: 10.1109/Tdsc.2013.16 |
0.322 |
|
2012 |
Krishnan S, Snow KZ, Monrose F. Trail of bytes: New techniques for supporting data provenance and limiting privacy breaches Ieee Transactions On Information Forensics and Security. 7: 1876-1889. DOI: 10.1109/Tifs.2012.2210217 |
0.394 |
|
2012 |
Coull SE, White AM, Yen TF, Monrose F, Reiter MK. Understanding domain registration abuses Computers and Security. 31: 806-815. DOI: 10.1016/J.Cose.2012.05.005 |
0.676 |
|
2011 |
White AM, Matthews AR, Snow KZ, Monrose F. Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks Proceedings - Ieee Symposium On Security and Privacy. 3-18. DOI: 10.1109/SP.2011.34 |
0.341 |
|
2011 |
Huang X, Monrose F, Reiter MK. Amplifying limited expert input to sanitize large network traces Proceedings of the International Conference On Dependable Systems and Networks. 494-505. DOI: 10.1109/DSN.2011.5958262 |
0.327 |
|
2011 |
Krishnan S, Monrose F. An empirical study of the performance, security and privacy implications of domain name prefetching Proceedings of the International Conference On Dependable Systems and Networks. 61-72. DOI: 10.1109/DSN.2011.5958207 |
0.376 |
|
2010 |
Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Uncovering spoken phrases in encrypted Voice over IP conversations Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880029 |
0.648 |
|
2010 |
Rajab MA, Monrose F, Provos N. Peeking Through the Cloud Acm Transactions On Internet Technology. 10: 1-21. DOI: 10.1145/1852096.1852097 |
0.405 |
|
2009 |
Coull SE, Monrose F, Reiter MK, Bailey M. The challenges of effectively anonymizing network data Proceedings - Cybersecurity Applications and Technology Conference For Homeland Security, Catch 2009. 230-236. DOI: 10.1109/CATCH.2009.27 |
0.683 |
|
2008 |
Ballard L, Kamara S, Reiter MK, Monrose F. Towards practical biometric key generation with randomized biometric templates Proceedings of the Acm Conference On Computer and Communications Security. 235-244. DOI: 10.1145/1455770.1455801 |
0.606 |
|
2008 |
Wright CV, Ballard L, Coull SE, Monrose F, Masson GM. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Proceedings - Ieee Symposium On Security and Privacy. 35-49. DOI: 10.1109/SP.2008.21 |
0.738 |
|
2008 |
Rajab MA, Monrose F, Terzis A, Provos N. Peeking through the cloud: DNS-based estimation and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 21-38. DOI: 10.1007/978-3-540-68914-0_2 |
0.301 |
|
2007 |
Ballard L, Lopresti D, Monrose F. Forgery quality and its implications for behavioral biometric security. Ieee Transactions On Systems, Man, and Cybernetics. Part B, Cybernetics : a Publication of the Ieee Systems, Man, and Cybernetics Society. 37: 1107-18. PMID 17926695 DOI: 10.1109/TSMCB.2007.903539 |
0.329 |
|
2007 |
Qiu SY, McDaniel PD, Monrose F. Toward valley-free inter-domain routing Ieee International Conference On Communications. 2009-2016. DOI: 10.1109/ICC.2007.334 |
0.575 |
|
2006 |
Abu Rajab M, Monrose F, Terzis A. On the impact of dynamic addressing on malware propagation Proceedings of the 4th Acm Workshop On Recurring Malcode, Worm'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 51-56. DOI: 10.1145/1179542.1179554 |
0.303 |
|
2006 |
Qiu SY, Monrose F, Terzis A, McDaniel PD. Efficient techniques for detecting false origin advertisements in inter-domain routing 2nd Workshop On Secure Network Protocols, Npsec. 12-19. DOI: 10.1109/NPSEC.2006.320341 |
0.555 |
|
2006 |
Qiu SY, McDaniel PD, Monrose F, Rubin AD. Characterizing address use structure and stability of origin advertisement in inter-domain routing Proceedings - International Symposium On Computers and Communications. 489-496. DOI: 10.1109/ISCC.2006.48 |
0.54 |
|
2006 |
Wright CV, Monrose F, Masson GM. On inferring application protocol behaviors in encrypted network traffic Journal of Machine Learning Research. 7: 2745-2769. |
0.43 |
|
2005 |
Small S, Terzis A, Monrose F, Doshi B, De Simone A. Scalable VPNs for the global information grid Proceedings - Ieee Military Communications Conference Milcom. 2005. DOI: 10.1109/MILCOM.2005.1605702 |
0.371 |
|
2005 |
Kamara S, Davis D, Ballard L, Caudy R, Monrose F. An extensible platform for evaluating security protocols Proceedings - Simulation Symposium. 204-213. DOI: 10.1109/ANSS.2005.11 |
0.673 |
|
2005 |
Ballard L, Kamara S, Monrose F. Achieving efficient conjunctive keyword searches over encrypted data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3783: 414-426. DOI: 10.1007/11602897_35 |
0.635 |
|
2004 |
Wright C, Monrose F, Massen GM. HMM profiles for network traffic classification (extended abstract) Vizsec/Dmsec '04: Proceedings of the 2004 Acm Workshop On Visualization and Data Mining For Computer Security. 9-15. |
0.363 |
|
2000 |
Monrose F, Rubin AD. Keystroke dynamics as a biometric for authentication Future Generation Computer Systems. 16: 351-359. DOI: 10.1016/S0167-739X(99)00059-X |
0.451 |
|
Low-probability matches (unlikely to be authored by this person) |
2014 |
White AM, Shaw K, Monrose F, Moreton E. Isn't that fantabulous: Security, linguistic and usability challenges of pronounceable tokens Acm International Conference Proceeding Series. 15: 25-37. DOI: 10.1145/2683467.2683470 |
0.298 |
|
2009 |
Yen TF, Huang X, Monrose F, Reiter MK. Browser fingerprinting from coarse traffic summaries: Techniques and implications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5587: 157-175. DOI: 10.1007/978-3-642-02918-9_10 |
0.298 |
|
2009 |
Mason J, Small S, Monrose F, MacManus G. English shellcode Proceedings of the Acm Conference On Computer and Communications Security. 524-533. DOI: 10.1145/1653662.1653725 |
0.279 |
|
2008 |
Chen J, Lopresti D, Ballard L, Monrose F. Pseudo-signatures as a biometric Btas 2008 - Ieee 2nd International Conference On Biometrics: Theory, Applications and Systems. DOI: 10.1109/BTAS.2008.4699326 |
0.275 |
|
2009 |
Krishnan S, Monrose F. TimeCapsule: Secure recording of accesses to a protected datastore Proceedings of the Acm Conference On Computer and Communications Security. 23-31. DOI: 10.1145/1655148.1655152 |
0.274 |
|
2009 |
Chen J, Lopresti D, Monrose F. Toward resisting forgery attacks via pseudo-signatures Proceedings of the International Conference On Document Analysis and Recognition, Icdar. 51-55. DOI: 10.1109/ICDAR.2009.241 |
0.271 |
|
2010 |
Zhang Y, Monrose F, Reiter MK. The security of modern password expiration: An algorithmic framework and empirical analysis Proceedings of the Acm Conference On Computer and Communications Security. 176-186. DOI: 10.1145/1866307.1866328 |
0.257 |
|
2004 |
Davis D, Monrose F, Reiter MK. Time-scoped searching of encrypted audit logs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3269: 532-545. |
0.247 |
|
2001 |
Monrose F, Reiter MK, Li Q, Wetzel S. Cryptographic key generation from voice Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 202-213. |
0.242 |
|
2013 |
Stancill B, Snow KZ, Otterness N, Monrose F, Davi L, Sadeghi AR. Check my profile: Leveraging static analysis for fast and accurate detection of ROP gadgets Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8145: 62-81. DOI: 10.1007/978-3-642-41284-4_4 |
0.238 |
|
2010 |
Krishnan S, Snow K, Monrose F. Trail of bytes: Efficient support for forensic analysis Proceedings of the Acm Conference On Computer and Communications Security. 50-60. DOI: 10.1145/1866307.1866314 |
0.231 |
|
2005 |
Rajab MA, Monrose F, Terzis A. Worm evolution tracking via timing analysis Worm'05 - Proceedings of the 2005 Acm Workshop On Rapid Malcode. 52-59. |
0.229 |
|
2006 |
Abu Rajab M, Zarfoss J, Monrose F, Terzis A. A multifaceted approach to understanding the botnet phenomenon Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 41-52. DOI: 10.1145/1177080.1177086 |
0.227 |
|
2002 |
Monrose F, Reiter MK, Wetzel S. Password hardening based on keystroke dynamics International Journal of Information Security. 1: 69-83. DOI: 10.1007/S102070100006 |
0.225 |
|
2006 |
Rajab MA, Monrose F, Terzis A. Fast and evasive attacks: Highlighting the challenges ahead Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 206-225. |
0.22 |
|
2016 |
Werner J, Otterness N, Baltas G, Snow KZ, Polychronakis M, Dallara R, Monrose F. No-execute-after-read: Preventing code disclosure in commodity software Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 35-46. DOI: 10.1145/2897845:2897891 |
0.202 |
|
2013 |
Snow KZ, Monrose F, Davi L, Dmitrienko A, Liebchen C, Sadeghi AR. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization Proceedings - Ieee Symposium On Security and Privacy. 574-588. DOI: 10.1109/SP.2013.45 |
0.186 |
|
2013 |
Krishnan S, Taylor T, Monrose F, McHugh J. Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing Proceedings of the International Conference On Dependable Systems and Networks. DOI: 10.1109/DSN.2013.6575364 |
0.171 |
|
2016 |
Snow KZ, Rogowski R, Werner J, Koo H, Monrose F, Polychronakis M. Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks Proceedings - 2016 Ieee Symposium On Security and Privacy, Sp 2016. 954-968. DOI: 10.1109/SP.2016.61 |
0.167 |
|
2006 |
Doshi S, Monrose F, Rubin AD. Efficient memory bound puzzles using pattern databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 98-113. DOI: 10.1007/11767480_7 |
0.165 |
|
2006 |
Wright CV, Monrose F, Masson GM. Using visual motifs to classify encrypted traffic Proceedings of the 3rd International Workshop On Visualization For Computer Security, Vizsec'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 41-50. DOI: 10.1145/1179576.1179584 |
0.146 |
|
2014 |
Shaw KE, White AM, Moreton E, Monrose F. Emergent faithfulness to morphological and semantic heads in lexical blends Proceedings of the Annual Meetings On Phonology. 1. DOI: 10.3765/AMP.V1I1.45 |
0.144 |
|
2015 |
Bos H, Monrose F, Blanc G. Research in attacks, intrusions, and defenses: 18th international symposium, RAID 2015 Kyoto, Japan, november 2-4, 2015 proceedings Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9404. DOI: 10.1007/978-3-319-26362-5 |
0.133 |
|
2010 |
Lian W, Monrose F, McHugh J. Traffic classification using visual motifs: An empirical evaluation Acm International Conference Proceeding Series. 70-78. DOI: 10.1145/1850795.1850804 |
0.122 |
|
2015 |
Bos H, Monrose F. Foreword Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9404: V-VI. |
0.12 |
|
2014 |
Xu Y, Frahm JM, Monrose F. Watching the watchers: Automatically inferring TV content from outdoor light effusions Proceedings of the Acm Conference On Computer and Communications Security. 418-428. DOI: 10.1145/2660267.2660358 |
0.088 |
|
2006 |
Abe M, Aoki K, Ateniese G, Avanzi R, Beerliová Z, Billet O, Biryukov A, Blake I, Boyd C, Brier E, Castiglione A, Cha J, Chan A, Chen L, Cho K, ... ... Monrose F, et al. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960: V-VI. |
0.061 |
|
2011 |
Raguram R, White AM, Goswami D, Monrose F, Frahm JM. iSpy: Automatic reconstruction of typed input from compromising reflections Proceedings of the Acm Conference On Computer and Communications Security. 527-536. DOI: 10.1145/2046707.2046769 |
0.055 |
|
2013 |
Xu Y, Heinly J, White AM, Monrose F, Frahm JM. Seeing double: Reconstructing obscured typed input from repeated compromising reflections Proceedings of the Acm Conference On Computer and Communications Security. 1063-1074. DOI: 10.1145/2508859.2516709 |
0.046 |
|
Hide low-probability matches. |