Fabian Monrose
Fabian Monrose
Professor of Computer Science, UNC Chapel Hill
Verifierad e-postadress på cs.unc.edu
Titel
Citeras av
Citeras av
År
The design and analysis of graphical passwords.
IH Jermyn, A Mayer, F Monrose, MK Reiter, AD Rubin
USENIX Association, 1999
10321999
Keystroke dynamics as a biometric for authentication
F Monrose, AD Rubin
Future Generation computer systems 16 (4), 351-359, 2000
8962000
A multifaceted approach to understanding the botnet phenomenon
M Abu Rajab, J Zarfoss, F Monrose, A Terzis
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006
8222006
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
International journal of Information security 1 (2), 69-83, 2002
6552002
On user choice in graphical password schemes.
D Davis, F Monrose, MK Reiter
USENIX Security Symposium 13 (2004), 11-11, 2004
6282004
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
6122008
Authentication via keystroke dynamics
F Monrose, A Rubin
Proceedings of the 4th ACM conference on Computer and communications …, 1997
6041997
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
4932000
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE Symposium on Security and Privacy, 574-588, 2013
4402013
Achieving efficient conjunctive keyword searches over encrypted data
L Ballard, S Kamara, F Monrose
International Conference on Information and Communications Security, 414-426, 2005
3432005
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
L Davi, AR Sadeghi, D Lehmann, F Monrose
23rd {USENIX} Security Symposium ({USENIX} Security 14), 401-416, 2014
3142014
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging
M Fabian, MA Terzis
Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007
3072007
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
2922009
On inferring application protocol behaviors in encrypted network traffic
CV Wright, F Monrose, GM Masson
Journal of Machine Learning Research 7 (Dec), 2745-2769, 2006
2732006
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
2432008
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?
CV Wright, L Ballard, F Monrose, GM Masson
USENIX Security Symposium 3, 43-54, 2007
2062007
The security of modern password expiration: An algorithmic framework and empirical analysis
Y Zhang, F Monrose, MK Reiter
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1972010
Isomeron: Code randomization resilient to (just-in-time) return-oriented programming.
L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose
NDSS, 2015
1582015
HMM profiles for network traffic classification
C Wright, F Monrose, GM Masson
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
1452004
Methods and apparatus for providing privacy-preserving global customization
RM Arlein, B Jai, BM Jakobsson, F Monrose, MK Reiter
US Patent 7,107,269, 2006
1402006
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20