dblp.uni-trier.dewww.uni-trier.de

Fabian Monrose Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
35EETing-Fang Yen, Xin Huang, Fabian Monrose, Michael K. Reiter: Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications. DIMVA 2009: 157-175
34EEJin Chen, Daniel P. Lopresti, Fabian Monrose: Toward Resisting Forgery Attacks via Pseudo-Signatures. ICDAR 2009: 51-55
33EECharles V. Wright, Scott E. Coull, Fabian Monrose: Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. NDSS 2009
2008
32 Fabian Monrose: First USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 15, 2008, San Francisco, CA, USA, Proceedings USENIX Association 2008
31EELucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter: Towards practical biometric key generation with randomized biometric templates. ACM Conference on Computer and Communications Security 2008: 235-244
30EEMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos: Peeking Through the Cloud: DNS-Based Estimation and Its Applications. ACNS 2008: 21-38
29EECharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson: Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. IEEE Symposium on Security and Privacy 2008: 35-49
28EEScott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter: Taming the Devil: Techniques for Evaluating Anonymized Network Data. NDSS 2008
27EENiels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose: All Your iFRAMEs Point to Us. USENIX Security Symposium 2008: 1-16
26EESam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield: To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. USENIX Security Symposium 2008: 171-184
2007
25EESophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose: Toward Valley-Free Inter-domain Routing. ICC 2007: 2009-2016
24EEScott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter: Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. NDSS 2007
23EELucas Ballard, Daniel P. Lopresti, Fabian Monrose: Forgery Quality and Its Implications for Behavioral Biometric Security. IEEE Transactions on Systems, Man, and Cybernetics, Part B 37(5): 1107-1118 (2007)
2006
22EESujata Doshi, Fabian Monrose, Aviel D. Rubin: Efficient Memory Bound Puzzles Using Pattern Databases. ACNS 2006: 98-113
21EESophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin: Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ISCC 2006: 489-496
20EEMoheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis: A multifaceted approach to understanding the botnet phenomenon. Internet Measurement Conference 2006: 41-52
19EEMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis: Fast and Evasive Attacks: Highlighting the Challenges Ahead. RAID 2006: 206-225
18EECharles V. Wright, Fabian Monrose, Gerald M. Masson: Using visual motifs to classify encrypted traffic. VizSEC 2006: 41-50
17EEMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis: On the impact of dynamic addressing on malware propagation. WORM 2006: 51-56
16EECharles V. Wright, Fabian Monrose, Gerald M. Masson: On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Journal of Machine Learning Research 6: 2745-2769 (2006)
2005
15EESeny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose: An Extensible Platform for Evaluating Security Protocols. Annual Simulation Symposium 2005: 204-213
14EELucas Ballard, Seny Kamara, Fabian Monrose: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. ICICS 2005: 414-426
13EEMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis: Worm evolution tracking via timing analysis. WORM 2005: 52-59
2004
12EEDarren Davis, Fabian Monrose, Michael K. Reiter: Time-Scoped Searching of Encrypted Audit Logs. ICICS 2004: 532-545
11EEDarren Davis, Fabian Monrose, Michael K. Reiter: On User Choice in Graphical Password Schemes. USENIX Security Symposium 2004: 151-164
10EECharles V. Wright, Fabian Monrose, Gerald M. Masson: HMM profiles for network traffic classification. VizSEC 2004: 9-15
2002
9EEFabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih: Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. USENIX Security Symposium 2002: 283-296
8EEFabian Monrose, Michael K. Reiter, Susanne Wetzel: Password hardening based on keystroke dynamics. Int. J. Inf. Sec. 1(2): 69-83 (2002)
2001
7EEFabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel: Cryptographic Key Generation from Voice. IEEE Symposium on Security and Privacy 2001: 202-213
2000
6EERobert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter: Privacy-preserving global customization. ACM Conference on Electronic Commerce 2000: 176-184
5EEFabian Monrose, Aviel D. Rubin: Keystroke dynamics as a biometric for authentication. Future Generation Comp. Syst. 16(4): 351-359 (2000)
1999
4EEFabian Monrose, Michael K. Reiter, Susanne Wetzel: Password Hardening Based on Keystroke Dynamics. ACM Conference on Computer and Communications Security 1999: 73-82
3EEFabian Monrose, Peter Wyckoff, Aviel D. Rubin: Distributed Execution with Remote Audit. NDSS 1999
1998
2 I. Jermyn, Fabian Monrose, Peter Wyckoff: Leaving the sandbox: Third party validation for Java applications. Computers and Their Applications 1998: 436-439
1997
1EEFabian Monrose, Aviel D. Rubin: Authentication via Keystroke Dynamics. ACM Conference on Computer and Communications Security 1997: 48-56

Coauthor Index

1Robert M. Arlein [6]
2Lucas Ballard [14] [15] [23] [29] [31]
3Ryan Caudy [15]
4Jin Chen [34]
5Michael P. Collins [24]
6Scott E. Coull [24] [28] [29] [33]
7Darren Davis [11] [12] [15]
8Sujata Doshi [22]
9Xin Huang [35]
10Ben Jai [6]
11Markus Jakobsson [6]
12I. Jermyn [2]
13Seny Kamara [14] [15] [31]
14Angelos D. Keromytis [28]
15Qi Li [7] [9]
16Daniel P. Lopresti [9] [23] [34]
17Joshua Mason [26]
18Gerald M. Masson [10] [16] [18] [29]
19Panayiotis Mavrommatis [27]
20Patrick Drew McDaniel (Patrick McDaniel) [21] [25]
21Niels Provos [26] [27] [30]
22Sophie Y. Qiu [21] [25]
23Moheeb Abu Rajab [13] [17] [19] [20] [27] [30]
24Michael K. Reiter [4] [6] [7] [8] [9] [11] [12] [24] [28] [31] [35]
25Aviel D. Rubin [1] [3] [5] [21] [22]
26Chilin Shih [9]
27Sam Small [26]
28Adam Stubblefield [26]
29Andreas Terzis [13] [17] [19] [20] [30]
30Susanne Wetzel [4] [7] [8]
31Charles V. Wright [10] [16] [18] [24] [28] [29] [33]
32Peter Wyckoff [2] [3]
33Ting-Fang Yen [35]
34Jay Zarfoss [20]

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)