Folgen
Fabian Monrose
Fabian Monrose
Bestätigte E-Mail-Adresse bei ece.gatech.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The design and analysis of graphical passwords
I Jermyn, A Mayer, F Monrose, MK Reiter, A Rubin
8th USENIX Security Symposium (USENIX Security 99), 1999
11981999
Keystroke dynamics as a biometric for authentication
F Monrose, AD Rubin
Future Generation computer systems 16 (4), 351-359, 2000
11032000
A multifaceted approach to understanding the botnet phenomenon
M Abu Rajab, J Zarfoss, F Monrose, A Terzis
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006
9652006
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
7551999
Authentication via keystroke dynamics
F Monrose, A Rubin
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
7471997
On user choice in graphical password schemes.
D Davis, F Monrose, MK Reiter
USENIX security symposium 13 (2004), 11-11, 2004
7462004
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE symposium on security and privacy, 574-588, 2013
7442013
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
6912008
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
5552000
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019
4472019
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
4342009
Achieving efficient conjunctive keyword searches over encrypted data
L Ballard, S Kamara, F Monrose
Information and Communications Security: 7th International Conference, ICICS …, 2005
4322005
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging
M Fabian, MA Terzis
Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007
3382007
On inferring application protocol behaviors in encrypted network traffic.
CV Wright, F Monrose, GM Masson
Journal of Machine Learning Research 7 (12), 2006
3202006
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
3162008
The security of modern password expiration: An algorithmic framework and empirical analysis
Y Zhang, F Monrose, MK Reiter
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2702010
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?
CV Wright, L Ballard, F Monrose, GM Masson
USENIX Security Symposium 3, 43-54, 2007
2672007
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose
NDSS, 2015
2472015
Phonotactic reconstruction of encrypted voip conversations: Hookt on fon-iks
AM White, AR Matthews, KZ Snow, F Monrose
2011 IEEE Symposium on Security and Privacy, 3-18, 2011
1832011
HMM profiles for network traffic classification
C Wright, F Monrose, GM Masson
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
1762004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20