2008 |
31 | | Fabian Monrose:
First USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 15, 2008, San Francisco, CA, USA, Proceedings
USENIX Association 2008 |
30 | EE | Lucas Ballard,
Seny Kamara,
Fabian Monrose,
Michael K. Reiter:
Towards practical biometric key generation with randomized biometric templates.
ACM Conference on Computer and Communications Security 2008: 235-244 |
29 | EE | Moheeb Abu Rajab,
Fabian Monrose,
Andreas Terzis,
Niels Provos:
Peeking Through the Cloud: DNS-Based Estimation and Its Applications.
ACNS 2008: 21-38 |
28 | EE | Charles V. Wright,
Lucas Ballard,
Scott E. Coull,
Fabian Monrose,
Gerald M. Masson:
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
IEEE Symposium on Security and Privacy 2008: 35-49 |
27 | EE | Niels Provos,
Panayiotis Mavrommatis,
Moheeb Abu Rajab,
Fabian Monrose:
All Your iFRAMEs Point to Us.
USENIX Security Symposium 2008: 1-16 |
26 | EE | Sam Small,
Joshua Mason,
Fabian Monrose,
Niels Provos,
Adam Stubblefield:
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
USENIX Security Symposium 2008: 171-184 |
2007 |
25 | EE | Sophie Y. Qiu,
Patrick Drew McDaniel,
Fabian Monrose:
Toward Valley-Free Inter-domain Routing.
ICC 2007: 2009-2016 |
24 | EE | Scott E. Coull,
Charles V. Wright,
Fabian Monrose,
Michael P. Collins,
Michael K. Reiter:
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
NDSS 2007 |
23 | EE | Lucas Ballard,
Daniel P. Lopresti,
Fabian Monrose:
Forgery Quality and Its Implications for Behavioral Biometric Security.
IEEE Transactions on Systems, Man, and Cybernetics, Part B 37(5): 1107-1118 (2007) |
2006 |
22 | EE | Sujata Doshi,
Fabian Monrose,
Aviel D. Rubin:
Efficient Memory Bound Puzzles Using Pattern Databases.
ACNS 2006: 98-113 |
21 | EE | Sophie Y. Qiu,
Patrick Drew McDaniel,
Fabian Monrose,
Aviel D. Rubin:
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing.
ISCC 2006: 489-496 |
20 | EE | Moheeb Abu Rajab,
Jay Zarfoss,
Fabian Monrose,
Andreas Terzis:
A multifaceted approach to understanding the botnet phenomenon.
Internet Measurement Conference 2006: 41-52 |
19 | EE | Moheeb Abu Rajab,
Fabian Monrose,
Andreas Terzis:
Fast and Evasive Attacks: Highlighting the Challenges Ahead.
RAID 2006: 206-225 |
18 | EE | Charles V. Wright,
Fabian Monrose,
Gerald M. Masson:
Using visual motifs to classify encrypted traffic.
VizSEC 2006: 41-50 |
17 | EE | Moheeb Abu Rajab,
Fabian Monrose,
Andreas Terzis:
On the impact of dynamic addressing on malware propagation.
WORM 2006: 51-56 |
16 | EE | Charles V. Wright,
Fabian Monrose,
Gerald M. Masson:
On Inferring Application Protocol Behaviors in Encrypted Network Traffic.
Journal of Machine Learning Research 6: 2745-2769 (2006) |
2005 |
15 | EE | Seny Kamara,
Darren Davis,
Lucas Ballard,
Ryan Caudy,
Fabian Monrose:
An Extensible Platform for Evaluating Security Protocols.
Annual Simulation Symposium 2005: 204-213 |
14 | EE | Lucas Ballard,
Seny Kamara,
Fabian Monrose:
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data.
ICICS 2005: 414-426 |
13 | EE | Moheeb Abu Rajab,
Fabian Monrose,
Andreas Terzis:
Worm evolution tracking via timing analysis.
WORM 2005: 52-59 |
2004 |
12 | EE | Darren Davis,
Fabian Monrose,
Michael K. Reiter:
Time-Scoped Searching of Encrypted Audit Logs.
ICICS 2004: 532-545 |
11 | EE | Darren Davis,
Fabian Monrose,
Michael K. Reiter:
On User Choice in Graphical Password Schemes.
USENIX Security Symposium 2004: 151-164 |
10 | EE | Charles V. Wright,
Fabian Monrose,
Gerald M. Masson:
HMM profiles for network traffic classification.
VizSEC 2004: 9-15 |
2002 |
9 | EE | Fabian Monrose,
Michael K. Reiter,
Qi Li,
Daniel P. Lopresti,
Chilin Shih:
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices.
USENIX Security Symposium 2002: 283-296 |
8 | EE | Fabian Monrose,
Michael K. Reiter,
Susanne Wetzel:
Password hardening based on keystroke dynamics.
Int. J. Inf. Sec. 1(2): 69-83 (2002) |
2001 |
7 | EE | Fabian Monrose,
Michael K. Reiter,
Qi Li,
Susanne Wetzel:
Cryptographic Key Generation from Voice.
IEEE Symposium on Security and Privacy 2001: 202-213 |
2000 |
6 | EE | Robert M. Arlein,
Ben Jai,
Markus Jakobsson,
Fabian Monrose,
Michael K. Reiter:
Privacy-preserving global customization.
ACM Conference on Electronic Commerce 2000: 176-184 |
5 | EE | Fabian Monrose,
Aviel D. Rubin:
Keystroke dynamics as a biometric for authentication.
Future Generation Comp. Syst. 16(4): 351-359 (2000) |
1999 |
4 | EE | Fabian Monrose,
Michael K. Reiter,
Susanne Wetzel:
Password Hardening Based on Keystroke Dynamics.
ACM Conference on Computer and Communications Security 1999: 73-82 |
3 | EE | Fabian Monrose,
Peter Wyckoff,
Aviel D. Rubin:
Distributed Execution with Remote Audit.
NDSS 1999 |
1998 |
2 | | I. Jermyn,
Fabian Monrose,
Peter Wyckoff:
Leaving the sandbox: Third party validation for Java applications.
Computers and Their Applications 1998: 436-439 |
1997 |
1 | EE | Fabian Monrose,
Aviel D. Rubin:
Authentication via Keystroke Dynamics.
ACM Conference on Computer and Communications Security 1997: 48-56 |