Follow
Roy Maxion
Roy Maxion
Research Professor of Computer Science/Machine Learning, Carnegie Mellon University
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Comparing anomaly-detection algorithms for keystroke dynamics
KS Killourhy, RA Maxion
2009 IEEE/IFIP international conference on dependable systems & networks …, 2009
7572009
Masquerade detection using truncated command lines
RA Maxion, TN Townsend
Proceedings international conference on dependable systems and networks, 219-228, 2002
3552002
Undermining an anomaly-based intrusion detection system using common exploits
KMC Tan, KS Killourhy, RA Maxion
Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002
3182002
Using cohort scheduling to enhance server performance
JR Larus, M Parkes
Proceedings of the ACM SIGPLAN workshop on Languages, compilers and tools …, 2001
299*2001
Markov Chains, Classifiers, and Intrusion Detection.
S Jha, KMC Tan, RA Maxion
csfw 1, 206, 2001
2192001
Performance analysis of multi-motion sensor behavior for active smartphone authentication
C Shen, Y Li, Y Chen, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2017
1952017
User authentication through mouse dynamics
C Shen, Z Cai, X Guan, Y Du, RA Maxion
IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2012
1912012
" Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector
KMC Tan, RA Maxion
Proceedings 2002 IEEE Symposium on Security and Privacy, 188-201, 2002
1902002
Benchmarking anomaly-based detection systems
RA Maxion, KMC Tan
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
1882000
Masquerade detection using enriched command lines
RA Maxion
2003 International Conference on Dependable Systems and Networks, 2003 …, 2003
1802003
A case study of ethernet anomalies in a distributed computing environment
RA Maxion, FE Feather
IEEE transactions on Reliability 39 (4), 433-443, 1990
1761990
Fault detection in an ethernet network using anomaly signature matching
F Feather, D Siewiorek, R Maxion
ACM SIGCOMM Computer Communication Review 23 (4), 279-288, 1993
1681993
Improving user-interface dependability through mitigation of human error
RA Maxion, RW Reeder
International Journal of human-computer studies 63 (1-2), 25-50, 2005
1622005
Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates
K Killourhy, R Maxion
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
1462010
Performance analysis of touch-interaction behavior for active smartphone authentication
C Shen, Y Zhang, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 11 (3), 498-513, 2015
1152015
Keystroke biometrics with number-pad input
RA Maxion, KS Killourhy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
1102010
A defense-centric taxonomy based on attack manifestations
KS Killourhy, RA Maxion, KMC Tan
International Conference on Dependable Systems and Networks, 2004, 102-111, 2004
1102004
Anomaly detection in embedded systems
RA Maxion, KMC Tan
IEEE Transactions on Computers 51 (2), 108-120, 2002
1062002
Masquerade detection augmented with error analysis
RA Maxion, TN Townsend
IEEE Transactions on Reliability 53 (1), 124-147, 2004
992004
The effect of clock resolution on keystroke dynamics
K Killourhy, R Maxion
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
982008
The system can't perform the operation now. Try again later.
Articles 1–20