Fabian

Results: 1148



#Item
891Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing Srinivas Krishnan, Teryl Taylor, Fabian Monrose  John McHugh

Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing Srinivas Krishnan, Teryl Taylor, Fabian Monrose John McHugh

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-27 15:45:47
892Traffic Classification Using Visual Motifs: An Empirical Evaluation Wilson Lian Fabian Monrose

Traffic Classification Using Visual Motifs: An Empirical Evaluation Wilson Lian Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-04-18 21:59:44
893On User Choice in Graphical Password Schemes Darren Davis Fabian Monrose Michael K. Reiter Johns Hopkins University Carnegie Mellon University {ddavis,fabian}@cs.jhu.edu

On User Choice in Graphical Password Schemes Darren Davis Fabian Monrose Michael K. Reiter Johns Hopkins University Carnegie Mellon University {ddavis,fabian}@cs.jhu.edu

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:42
8941  Forgery Quality and its Implications for Behavioral Biometric Security Lucas Ballard, Daniel Lopresti, Senior Member, IEEE, and Fabian Monrose

1 Forgery Quality and its Implications for Behavioral Biometric Security Lucas Ballard, Daniel Lopresti, Senior Member, IEEE, and Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:50
895On the Impact of Dynamic Addressing on Malware Propagation Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

On the Impact of Dynamic Addressing on Malware Propagation Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:43
896Microsoft Word - Antarctica_Guide

Microsoft Word - Antarctica_Guide

Add to Reading List

Source URL: www.otago.ac.nz

Language: English - Date: 2013-12-19 17:11:00
897Cryptographic Key Generation from Voice (Extended Abstract) Fabian Monrose  Michael K. Reiter

Cryptographic Key Generation from Voice (Extended Abstract) Fabian Monrose Michael K. Reiter

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:35
8982013 IEEE Symposium on Security and Privacy  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-28 17:28:59
899On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose  Andreas Terzis

On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:43
900Distributed Execution with Remote Audit  Fabian Monrose New York University New York, NY

Distributed Execution with Remote Audit Fabian Monrose New York University New York, NY

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:35