Maxion, Roy A. and Killourhy, Kevin S.
"Keystroke Biometrics with Number-Pad Input."
In IEEE/IFIP International Conference on Dependable Systems & Networks
(DSN-10), pp. 201-210, Chicago, Illinois, 28 June to 01 July 2010.
IEEE Computer Society Press, Los Alamitos, California, 2010.
Killourhy, Kevin S. and Maxion, Roy A.
"Comparing Anomaly-Detection Algorithms for Keystroke Dynamics."
In International Conference on Dependable Systems & Networks
(DSN-09), pp. 125-134, Estoril, Lisbon, Portugal, 29 June to 02 July 2009.
IEEE Computer Society Press, Los Alamitos, California, 2009.
Click here for keystroke data set and scripts.
Killourhy, Kevin S. and Maxion, Roy A.
"The Effect of Clock Resolution on Keystroke Dynamics."
In 11th International Symposium on Recent Advances in Intrusion
Detection (RAID-08), 15-17 September 2008, Cambridge, Massachusetts,
R. Lippmann, E. Kirda and A. Trachtenberg (Eds.), Lecture Notes in
Computer Science (LNCS), Vol. 5230, pp. 331-350, Springer-Verlag,
Berlin, Heidelberg.
Killourhy, Kevin S. and Maxion, Roy A.
"Toward Realistic and Artifact-Free Insider-Threat Data."
In 23rd Annual Computer Security Applications Conference (ACSAC-07),
pp. 87-96, Miami Beach, Florida, 10-14 December 2007.
IEEE Computer Society Press, Los Alamitos, California, 2007.
Roberts, Rachel R. M.; Maxion, Roy A.; Killourhy, Kevin S., and Arshad, Fahd.
"User Discrimination Through Structured Writing on PDAs."
In International Conference on Dependable Systems & Networks
(DSN-07), pp. 378-387, Edinburgh, Scotland, 25-28 June 2007.
IEEE Computer Society Press, Los Alamitos, California, 2007.
Reeder, Robert W. and Maxion, Roy A.
"User Interface Defect Detection by Hesitation Analysis."
In International Conference on Dependable Systems & Networks
(DSN-06), pp. 61-70, Philadelphia, Pennsylvania, 25-28 June 2006.
IEEE Computer Society Press, Los Alamitos, California, 2006.
Tan, Kymie M. C. and Maxion, Roy A.
"The Effects of Algorithmic Diversity on Anomaly Detector Performance."
In International Conference on Dependable Systems & Networks
(DSN-05), pp. 216-225, Yokohama, Japan, 28 June - 01 July 2005.
IEEE Computer Society Press, Los Alamitos, California, 2005.
Reeder, Robert W. and Maxion, Roy A.
"User Interface Dependability through Goal-Error Prevention."
In International Conference on Dependable Systems & Networks
(DSN-05), pp. 60-69, Yokohama, Japan, 28 June - 01 July 2005.
IEEE Computer Society Press, Los Alamitos, California, 2005.
Killourhy, Kevin S.; Maxion, Roy A. and Tan, Kymie M. C.
"A Defense-Centric Taxonomy Based on Attack Manifestations."
In International Conference on Dependable Systems & Networks
(DSN-04), pp. 102-111, Florence, Italy, 28 June - 01 July 2004.
IEEE Computer Society Press, Los Alamitos, California, 2004.
Maxion, Roy A. and Townsend, Tahlia N.
"Masquerade Detection Augmented with Error Detection."
IEEE Transactions on Reliability,
Special Section on Quality/Reliability Engineering of Information Systems,
Vol. 53, No. 1, pp. 124-147, March 2004.
Maxion, Roy A.
"Masquerade Detection Using Enriched Command Lines."
In International Conference on Dependable Systems & Networks
(DSN-03), pp. 5-14, San Francisco, California, 22-25 June 2003.
IEEE Computer Society Press, Los Alamitos, California, 2003.
Tan, Kymie M. C. and Maxion, Roy A. "Determining the
Operational Limits of an Anomaly-Based Intrusion Detector."
IEEE Journal on Selected Areas in Communications,
Special Issue on Design and Analysis Techniques for Security Assurance,
Vol. 21, No. 1, pp. 96-110, January 2003.
Tan, Kymie M. C.; Killourhy, Kevin S. and Maxion, Roy A.
"Undermining an Anomaly-Based Intrusion Detection System Using Common
Exploits."
In Fifth International Symposium on Recent Advances
in Intrusion Detection (RAID-2002),
Andreas Wespi, Giovanni Vigna and Luca Deri (Eds.),
16-18 October 2002, Zurich, Switzerland, pp. 54-73.
Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin, 2002.
Maxion, Roy A. and Townsend, Tahlia N.
"Masquerade Detection Using Truncated Command Lines."
International Conference on Dependable Systems and Networks (DSN-02),
pp. 219-228, Washington, D.C. 23-26 June 2002. IEEE Computer Society Press,
Los Alamitos, California, 2002.
Tan, Kymie M. C. and Maxion, Roy A.
"Why 6? Defining the Operational Limits of stide, an Anomaly-Based
Intrusion Detector."
IEEE Symposium on Security and Privacy, pages 188-201,
Berkeley, California, 12-15 May 2002. IEEE Computer Society Press, Los
Alamitos, California, 2002.
Maxion, Roy A. and Tan, Kymie M. C.
"Anomaly Detection in Embedded Systems."
IEEE Transactions on Computers,
Vol. 51, No. 2, pp. 108-120, February 2002.