dblp.uni-trier.dewww.uni-trier.de

Roy A. Maxion

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
26EEKevin S. Killourhy, Roy A. Maxion: The Effect of Clock Resolution on Keystroke Dynamics. RAID 2008: 331-350
2007
25EEKevin S. Killourhy, Roy A. Maxion: Toward Realistic and Artifact-Free Insider-Threat Data. ACSAC 2007: 87-96
24EERachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad: User Discrimination through Structured Writing on PDAs. DSN 2007: 378-388
2006
23EERobert W. Reeder, Roy A. Maxion: User Interface Defect Detection by Hesitation Analysis. DSN 2006: 61-72
22EEJeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion: Anomaly Detector Performance Evaluation Using a Parameterized Environment. RAID 2006: 106-126
2005
21EEKymie M. C. Tan, Roy A. Maxion: The Effects of Algorithmic Diversity on Anomaly Detector Performance. DSN 2005: 216-225
20EERobert W. Reeder, Roy A. Maxion: User Interface Dependability through Goal-Error Prevention. DSN 2005: 60-69
19EERoy A. Maxion, Rachel R. M. Roberts: Methodological Foundations: Enabling the Next Generation of Security. IEEE Security & Privacy 3(2): 54-57 (2005)
18EERoy A. Maxion, Robert W. Reeder: Improving user-interface dependability through mitigation of human error. International Journal of Man-Machine Studies 63(1-2): 25-50 (2005)
2004
17EEKevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan: A Defense-Centric Taxonomy Based on Attack Manifestations. DSN 2004: 102-
16 Daniel P. Siewiorek, Roy A. Maxion, Priya Narasimhan: Experimental research in dependable computing at Carnegie Mellon University. IFIP Congress Topical Sessions 2004: 305-328
15EERoy A. Maxion, Tahlia N. Townsend: Masquerade detection augmented with error analysis. IEEE Transactions on Reliability 53(1): 124-147 (2004)
2003
14EERoy A. Maxion: Masquerade Detection Using Enriched Command Lines. DSN 2003: 5-14
2002
13EERoy A. Maxion, Tahlia N. Townsend: Masquerade Detection Using Truncated Command Lines. DSN 2002: 219-228
12EEKymie M. C. Tan, Roy A. Maxion: "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. IEEE Symposium on Security and Privacy 2002: 188-201
11EEKymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion: Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. RAID 2002: 54-73
10EERoy A. Maxion, Kymie M. C. Tan: Anomaly Detection in Embedded Systems. IEEE Trans. Computers 51(2): 108-120 (2002)
2001
9EESomesh Jha, Kymie M. C. Tan, Roy A. Maxion: Markov Chains, Classifiers, and Intrusion Detection. CSFW 2001: 206-219
2000
8EERoy A. Maxion, Kymie M. C. Tan: Benchmarking Anomaly-Based Detection Systems. DSN 2000: 623-630
7EERoy A. Maxion, Robert T. Olszewski: Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study. IEEE Trans. Software Eng. 26(9): 888-906 (2000)
1998
6 Roy A. Maxion, Robert T. Olszewski: Improving Software Robustness with Dependability Cases. FTCS 1998: 346-355
1997
5 Roy A. Maxion, Philip A. Syme: MetriStation: A Tool for User-Interface Fault Detection. FTCS 1997: 89-98
1996
4 Roy A. Maxion, Philip A. Syme: Mitigating Operator-Induced Unavailability by Matching Imprecise Queries. FTCS 1996: 240-249
1995
3 Roy A. Maxion, Aimee L. deChambeau: Depenability at the User Interface. FTCS 1995: 528-535
1993
2 Roy A. Maxion, Robert T. Olszewski: Detection and Discrimination of Injected Network Faults. FTCS 1993: 198-207
1EEFrank Feather, Daniel P. Siewiorek, Roy A. Maxion: Fault Detection in an Ethernet Network Using Anomaly Signature Matching. SIGCOMM 1993: 279-288

Coauthor Index

1Fahd Arshad [24]
2Frank Feather [1]
3Jeffery P. Hansen [22]
4Somesh Jha [9]
5Kevin S. Killourhy [11] [17] [24] [25] [26]
6Priya Narasimhan [16]
7Robert T. Olszewski [2] [6] [7]
8Robert W. Reeder [18] [20] [23]
9Rachel R. M. Roberts [19] [24]
10Daniel P. Siewiorek [1] [16]
11Philip A. Syme [4] [5]
12Kymie M. C. Tan [8] [9] [10] [11] [12] [17] [21] [22]
13Tahlia N. Townsend [13] [15]
14Aimee L. deChambeau [3]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)