Follow
Roy Maxion
Roy Maxion
Research Professor of Computer Science/Machine Learning, Carnegie Mellon University
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Comparing anomaly-detection algorithms for keystroke dynamics
KS Killourhy, RA Maxion
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
7432009
Masquerade detection using truncated command lines
RA Maxion, TN Townsend
Proceedings international conference on dependable systems and networks, 219-228, 2002
3582002
Undermining an anomaly-based intrusion detection system using common exploits
KMC Tan, KS Killourhy, RA Maxion
Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002
3162002
Using cohort scheduling to enhance server performance
JR Larus, M Parkes
Proceedings of the ACM SIGPLAN workshop on Languages, compilers and tools …, 2001
296*2001
Markov Chains, Classifiers, and Intrusion Detection.
S Jha, KMC Tan, RA Maxion
csfw 1, 206, 2001
2182001
" Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector
KMC Tan, RA Maxion
Proceedings 2002 IEEE Symposium on Security and Privacy, 188-201, 2002
1892002
Performance analysis of multi-motion sensor behavior for active smartphone authentication
C Shen, Y Li, Y Chen, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 13 (1), 48-62, 2017
1862017
User authentication through mouse dynamics
C Shen, Z Cai, X Guan, Y Du, RA Maxion
IEEE Transactions on Information Forensics and Security 8 (1), 16-30, 2012
1862012
Benchmarking anomaly-based detection systems
RA Maxion, KMC Tan
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
1852000
Masquerade detection using enriched command lines
RA Maxion
2003 International Conference on Dependable Systems and Networks, 2003 …, 2003
1792003
A case study of ethernet anomalies in a distributed computing environment
RA Maxion, FE Feather
IEEE transactions on Reliability 39 (4), 433-443, 1990
1761990
Fault detection in an ethernet network using anomaly signature matching
F Feather, D Siewiorek, R Maxion
ACM SIGCOMM Computer Communication Review 23 (4), 279-288, 1993
1661993
Improving user-interface dependability through mitigation of human error
RA Maxion, RW Reeder
International Journal of human-computer studies 63 (1-2), 25-50, 2005
1642005
Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates
K Killourhy, R Maxion
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
1482010
A defense-centric taxonomy based on attack manifestations
KS Killourhy, RA Maxion, KMC Tan
International Conference on Dependable Systems and Networks, 2004, 102-111, 2004
1112004
Performance analysis of touch-interaction behavior for active smartphone authentication
C Shen, Y Zhang, X Guan, RA Maxion
IEEE Transactions on Information Forensics and Security 11 (3), 498-513, 2015
1102015
Keystroke biometrics with number-pad input
RA Maxion, KS Killourhy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
1092010
Anomaly detection in embedded systems
RA Maxion, KMC Tan
IEEE Transactions on Computers 51 (2), 108-120, 2002
1022002
The effect of clock resolution on keystroke dynamics
K Killourhy, R Maxion
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
982008
Masquerade detection augmented with error analysis
RA Maxion, TN Townsend
IEEE Transactions on Reliability 53 (1), 124-147, 2004
972004
The system can't perform the operation now. Try again later.
Articles 1–20