2008 |
26 | EE | Kevin S. Killourhy,
Roy A. Maxion:
The Effect of Clock Resolution on Keystroke Dynamics.
RAID 2008: 331-350 |
2007 |
25 | EE | Kevin S. Killourhy,
Roy A. Maxion:
Toward Realistic and Artifact-Free Insider-Threat Data.
ACSAC 2007: 87-96 |
24 | EE | Rachel R. M. Roberts,
Roy A. Maxion,
Kevin S. Killourhy,
Fahd Arshad:
User Discrimination through Structured Writing on PDAs.
DSN 2007: 378-388 |
2006 |
23 | EE | Robert W. Reeder,
Roy A. Maxion:
User Interface Defect Detection by Hesitation Analysis.
DSN 2006: 61-72 |
22 | EE | Jeffery P. Hansen,
Kymie M. C. Tan,
Roy A. Maxion:
Anomaly Detector Performance Evaluation Using a Parameterized Environment.
RAID 2006: 106-126 |
2005 |
21 | EE | Kymie M. C. Tan,
Roy A. Maxion:
The Effects of Algorithmic Diversity on Anomaly Detector Performance.
DSN 2005: 216-225 |
20 | EE | Robert W. Reeder,
Roy A. Maxion:
User Interface Dependability through Goal-Error Prevention.
DSN 2005: 60-69 |
19 | EE | Roy A. Maxion,
Rachel R. M. Roberts:
Methodological Foundations: Enabling the Next Generation of Security.
IEEE Security & Privacy 3(2): 54-57 (2005) |
18 | EE | Roy A. Maxion,
Robert W. Reeder:
Improving user-interface dependability through mitigation of human error.
International Journal of Man-Machine Studies 63(1-2): 25-50 (2005) |
2004 |
17 | EE | Kevin S. Killourhy,
Roy A. Maxion,
Kymie M. C. Tan:
A Defense-Centric Taxonomy Based on Attack Manifestations.
DSN 2004: 102- |
16 | | Daniel P. Siewiorek,
Roy A. Maxion,
Priya Narasimhan:
Experimental research in dependable computing at Carnegie Mellon University.
IFIP Congress Topical Sessions 2004: 305-328 |
15 | EE | Roy A. Maxion,
Tahlia N. Townsend:
Masquerade detection augmented with error analysis.
IEEE Transactions on Reliability 53(1): 124-147 (2004) |
2003 |
14 | EE | Roy A. Maxion:
Masquerade Detection Using Enriched Command Lines.
DSN 2003: 5-14 |
2002 |
13 | EE | Roy A. Maxion,
Tahlia N. Townsend:
Masquerade Detection Using Truncated Command Lines.
DSN 2002: 219-228 |
12 | EE | Kymie M. C. Tan,
Roy A. Maxion:
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector.
IEEE Symposium on Security and Privacy 2002: 188-201 |
11 | EE | Kymie M. C. Tan,
Kevin S. Killourhy,
Roy A. Maxion:
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits.
RAID 2002: 54-73 |
10 | EE | Roy A. Maxion,
Kymie M. C. Tan:
Anomaly Detection in Embedded Systems.
IEEE Trans. Computers 51(2): 108-120 (2002) |
2001 |
9 | EE | Somesh Jha,
Kymie M. C. Tan,
Roy A. Maxion:
Markov Chains, Classifiers, and Intrusion Detection.
CSFW 2001: 206-219 |
2000 |
8 | EE | Roy A. Maxion,
Kymie M. C. Tan:
Benchmarking Anomaly-Based Detection Systems.
DSN 2000: 623-630 |
7 | EE | Roy A. Maxion,
Robert T. Olszewski:
Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study.
IEEE Trans. Software Eng. 26(9): 888-906 (2000) |
1998 |
6 | | Roy A. Maxion,
Robert T. Olszewski:
Improving Software Robustness with Dependability Cases.
FTCS 1998: 346-355 |
1997 |
5 | | Roy A. Maxion,
Philip A. Syme:
MetriStation: A Tool for User-Interface Fault Detection.
FTCS 1997: 89-98 |
1996 |
4 | | Roy A. Maxion,
Philip A. Syme:
Mitigating Operator-Induced Unavailability by Matching Imprecise Queries.
FTCS 1996: 240-249 |
1995 |
3 | | Roy A. Maxion,
Aimee L. deChambeau:
Depenability at the User Interface.
FTCS 1995: 528-535 |
1993 |
2 | | Roy A. Maxion,
Robert T. Olszewski:
Detection and Discrimination of Injected Network Faults.
FTCS 1993: 198-207 |
1 | EE | Frank Feather,
Daniel P. Siewiorek,
Roy A. Maxion:
Fault Detection in an Ethernet Network Using Anomaly Signature Matching.
SIGCOMM 1993: 279-288 |