dblp.uni-trier.dewww.uni-trier.de

Fabian Monrose

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
31 Fabian Monrose: First USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 15, 2008, San Francisco, CA, USA, Proceedings USENIX Association 2008
30EELucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter: Towards practical biometric key generation with randomized biometric templates. ACM Conference on Computer and Communications Security 2008: 235-244
29EEMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos: Peeking Through the Cloud: DNS-Based Estimation and Its Applications. ACNS 2008: 21-38
28EECharles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson: Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. IEEE Symposium on Security and Privacy 2008: 35-49
27EENiels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose: All Your iFRAMEs Point to Us. USENIX Security Symposium 2008: 1-16
26EESam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield: To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. USENIX Security Symposium 2008: 171-184
2007
25EESophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose: Toward Valley-Free Inter-domain Routing. ICC 2007: 2009-2016
24EEScott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter: Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. NDSS 2007
23EELucas Ballard, Daniel P. Lopresti, Fabian Monrose: Forgery Quality and Its Implications for Behavioral Biometric Security. IEEE Transactions on Systems, Man, and Cybernetics, Part B 37(5): 1107-1118 (2007)
2006
22EESujata Doshi, Fabian Monrose, Aviel D. Rubin: Efficient Memory Bound Puzzles Using Pattern Databases. ACNS 2006: 98-113
21EESophie Y. Qiu, Patrick Drew McDaniel, Fabian Monrose, Aviel D. Rubin: Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing. ISCC 2006: 489-496
20EEMoheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis: A multifaceted approach to understanding the botnet phenomenon. Internet Measurement Conference 2006: 41-52
19EEMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis: Fast and Evasive Attacks: Highlighting the Challenges Ahead. RAID 2006: 206-225
18EECharles V. Wright, Fabian Monrose, Gerald M. Masson: Using visual motifs to classify encrypted traffic. VizSEC 2006: 41-50
17EEMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis: On the impact of dynamic addressing on malware propagation. WORM 2006: 51-56
16EECharles V. Wright, Fabian Monrose, Gerald M. Masson: On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Journal of Machine Learning Research 6: 2745-2769 (2006)
2005
15EESeny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose: An Extensible Platform for Evaluating Security Protocols. Annual Simulation Symposium 2005: 204-213
14EELucas Ballard, Seny Kamara, Fabian Monrose: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. ICICS 2005: 414-426
13EEMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis: Worm evolution tracking via timing analysis. WORM 2005: 52-59
2004
12EEDarren Davis, Fabian Monrose, Michael K. Reiter: Time-Scoped Searching of Encrypted Audit Logs. ICICS 2004: 532-545
11EEDarren Davis, Fabian Monrose, Michael K. Reiter: On User Choice in Graphical Password Schemes. USENIX Security Symposium 2004: 151-164
10EECharles V. Wright, Fabian Monrose, Gerald M. Masson: HMM profiles for network traffic classification. VizSEC 2004: 9-15
2002
9EEFabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih: Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. USENIX Security Symposium 2002: 283-296
8EEFabian Monrose, Michael K. Reiter, Susanne Wetzel: Password hardening based on keystroke dynamics. Int. J. Inf. Sec. 1(2): 69-83 (2002)
2001
7EEFabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel: Cryptographic Key Generation from Voice. IEEE Symposium on Security and Privacy 2001: 202-213
2000
6EERobert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter: Privacy-preserving global customization. ACM Conference on Electronic Commerce 2000: 176-184
5EEFabian Monrose, Aviel D. Rubin: Keystroke dynamics as a biometric for authentication. Future Generation Comp. Syst. 16(4): 351-359 (2000)
1999
4EEFabian Monrose, Michael K. Reiter, Susanne Wetzel: Password Hardening Based on Keystroke Dynamics. ACM Conference on Computer and Communications Security 1999: 73-82
3EEFabian Monrose, Peter Wyckoff, Aviel D. Rubin: Distributed Execution with Remote Audit. NDSS 1999
1998
2 I. Jermyn, Fabian Monrose, Peter Wyckoff: Leaving the sandbox: Third party validation for Java applications. Computers and Their Applications 1998: 436-439
1997
1EEFabian Monrose, Aviel D. Rubin: Authentication via Keystroke Dynamics. ACM Conference on Computer and Communications Security 1997: 48-56

Coauthor Index

1Robert M. Arlein [6]
2Lucas Ballard [14] [15] [23] [28] [30]
3Ryan Caudy [15]
4Michael P. Collins [24]
5Scott E. Coull [24] [28]
6Darren Davis [11] [12] [15]
7Sujata Doshi [22]
8Ben Jai [6]
9Markus Jakobsson [6]
10I. Jermyn [2]
11Seny Kamara [14] [15] [30]
12Qi Li [7] [9]
13Daniel P. Lopresti [9] [23]
14Joshua Mason [26]
15Gerald M. Masson [10] [16] [18] [28]
16Panayiotis Mavrommatis [27]
17Patrick Drew McDaniel (Patrick McDaniel) [21] [25]
18Niels Provos [26] [27] [29]
19Sophie Y. Qiu [21] [25]
20Moheeb Abu Rajab [13] [17] [19] [20] [27] [29]
21Michael K. Reiter [4] [6] [7] [8] [9] [11] [12] [24] [30]
22Aviel D. Rubin [1] [3] [5] [21] [22]
23Chilin Shih [9]
24Sam Small [26]
25Adam Stubblefield [26]
26Andreas Terzis [13] [17] [19] [20] [29]
27Susanne Wetzel [4] [7] [8]
28Charles V. Wright [10] [16] [18] [24] [28]
29Peter Wyckoff [2] [3]
30Jay Zarfoss [20]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)