| 2008 |
| 7 | EE | Kevin S. Killourhy,
Roy A. Maxion:
The Effect of Clock Resolution on Keystroke Dynamics.
RAID 2008: 331-350 |
| 2007 |
| 6 | EE | Kevin S. Killourhy,
Roy A. Maxion:
Toward Realistic and Artifact-Free Insider-Threat Data.
ACSAC 2007: 87-96 |
| 5 | EE | Rachel R. M. Roberts,
Roy A. Maxion,
Kevin S. Killourhy,
Fahd Arshad:
User Discrimination through Structured Writing on PDAs.
DSN 2007: 378-388 |
| 2005 |
| 4 | EE | Khalid El-Arini,
Kevin S. Killourhy:
Bayesian detection of router configuration anomalies.
MineNet 2005: 221-222 |
| 2004 |
| 3 | EE | Kevin S. Killourhy,
Roy A. Maxion,
Kymie M. C. Tan:
A Defense-Centric Taxonomy Based on Attack Manifestations.
DSN 2004: 102- |
| 2002 |
| 2 | EE | Kymie M. C. Tan,
John McHugh,
Kevin S. Killourhy:
Hiding Intrusions: From the Abnormal to the Normal and Beyond.
Information Hiding 2002: 1-17 |
| 1 | EE | Kymie M. C. Tan,
Kevin S. Killourhy,
Roy A. Maxion:
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits.
RAID 2002: 54-73 |