Follow
Fabian Monrose
Fabian Monrose
Verified email at ece.gatech.edu - Homepage
Title
Cited by
Cited by
Year
The design and analysis of graphical passwords
I Jermyn, A Mayer, F Monrose, MK Reiter, A Rubin
8th USENIX Security Symposium (USENIX Security 99), 1999
12051999
Keystroke dynamics as a biometric for authentication
F Monrose, AD Rubin
Future Generation computer systems 16 (4), 351-359, 2000
11282000
A multifaceted approach to understanding the botnet phenomenon
M Abu Rajab, J Zarfoss, F Monrose, A Terzis
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006
9852006
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi
2013 IEEE symposium on security and privacy, 574-588, 2013
7702013
Password hardening based on keystroke dynamics
F Monrose, MK Reiter, S Wetzel
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
7601999
On user choice in graphical password schemes.
D Davis, F Monrose, MK Reiter
USENIX security symposium 13 (2004), 11-11, 2004
7562004
Authentication via keystroke dynamics
F Monrose, A Rubin
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
7541997
All your iframes point to us
N Provos, P Mavrommatis, M Rajab, F Monrose
6932008
Cryptographic key generation from voice
F Monrose, MK Reiter, Q Li, S Wetzel
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000
5582000
Sok: Security evaluation of home-based iot deployments
O Alrawi, C Lever, M Antonakakis, F Monrose
2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019
5132019
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
CV Wright, SE Coull, F Monrose
NDSS 9, 2009
4492009
Achieving efficient conjunctive keyword searches over encrypted data
L Ballard, S Kamara, F Monrose
Information and Communications Security: 7th International Conference, ICICS …, 2005
4392005
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging
M Fabian, MA Terzis
Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007
3412007
On inferring application protocol behaviors in encrypted network traffic.
CV Wright, F Monrose, GM Masson
Journal of Machine Learning Research 7 (12), 2006
3302006
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
CV Wright, L Ballard, SE Coull, F Monrose, GM Masson
2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008
3222008
The security of modern password expiration: An algorithmic framework and empirical analysis
Y Zhang, F Monrose, MK Reiter
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2762010
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?
CV Wright, L Ballard, F Monrose, GM Masson
USENIX Security Symposium 3, 43-54, 2007
2712007
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose
NDSS, 2015
2492015
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security
S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose
2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019
2092019
Phonotactic reconstruction of encrypted voip conversations: Hookt on fon-iks
AM White, AR Matthews, KZ Snow, F Monrose
2011 IEEE Symposium on Security and Privacy, 3-18, 2011
1872011
The system can't perform the operation now. Try again later.
Articles 1–20