Cormac Herley

Orcid: 0000-0001-8436-5776

Affiliations:
  • Microsoft Research


According to our database1, Cormac Herley authored at least 98 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Can We Count on LLMs? The Fixed-Effect Fallacy and Claims of GPT-4 Capabilities.
CoRR, 2024

2023
Approximating Naive Bayes on Unlabelled Categorical Data.
Trans. Mach. Learn. Res., 2023

2022
Automated Detection of Automated Traffic.
Proceedings of the 31st USENIX Security Symposium, 2022

A Large-Scale Measurement of Cybercrime Against Individuals.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2020
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing.
IEEE Secur. Priv., 2020

2019
Distinguishing Attacks from Legitimate Authentication Traffic at Scale.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

StopGuessing: Using Guessed Passwords to Thwart Online Guessing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Letter to the Editor.
IEEE Secur. Priv., 2018

Science of Security: Combining Theory and Measurement to Reflect the Observable.
IEEE Secur. Priv., 2018

2017
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Justifying Security Measures - a Position Paper.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Unfalsifiability of security claims.
Proc. Natl. Acad. Sci. USA, 2016

Debunking Security-Usability Tradeoff Myths.
IEEE Secur. Priv., 2016

Pushing on string: the 'don't care' region of password strength.
Commun. ACM, 2016

2015
Passwords and the evolution of imperfect authentication.
Commun. ACM, 2015

"If you were attacked, you'd be sorry": Counterfactuals as security arguments.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

Measurement and Analysis of Traffic Exchange Services.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
More Is Not the Answer.
IEEE Secur. Priv., 2014

Socio-Technical Security Metrics (Dagstuhl Seminar 14491).
Dagstuhl Reports, 2014

Security, cybercrime, and scale.
Commun. ACM, 2014

FUD: a plea for intolerance.
Commun. ACM, 2014

Telepathwords: Preventing Weak Passwords by Reading Users' Minds.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

An Administrator's Guide to Internet Password Research.
Proceedings of the 28th Large Installation System Administration Conference, 2014

2013
When Does Targeting Make Sense for an Attacker?
IEEE Secur. Priv., 2013

Markets for zero-day exploits: ethics and implications.
Proceedings of the New Security Paradigms Workshop, 2013

Detecting malicious landing pages in Malware Distribution Networks.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Does my password go up to eleven?: the impact of password meters on password selection.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
A Research Agenda Acknowledging the Persistence of Passwords.
IEEE Secur. Priv., 2012

Is Everything We Know about Password Stealing Wrong?
IEEE Secur. Priv., 2012

Why do Nigerian Scammers Say They are From Nigeria?
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
Painless migration from passwords to two factor authentication.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Sex, Lies and Cyber-Crime Surveys.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

Sex, Lies and Cyber-crime Survey.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Where Do All the Attacks Go?
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

2010
Phishing and money mules.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

The Plight of the Targeted Attacker in a World of Scale.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Where do security policies come from?
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

A robust link-translating proxy server mirroring the whole web.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

So long, and no thanks for the externalities: the rational rejection of security advice by users.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

Passwords: If We're So Smart, Why Are We Still Using Them?
Proceedings of the Financial Cryptography and Data Security, 2009

2008
Protecting Financial Institutions from Brute-Force Attacks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A profitless endeavor: phishing as tragedy of the commons.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

One-Time Password Access to Any Server without Changing the Server.
Proceedings of the Information Security, 11th International Conference, 2008

Can "Something You Know" Be Saved?.
Proceedings of the Information Security, 11th International Conference, 2008

2007
A large-scale study of web password habits.
Proceedings of the 16th International Conference on World Wide Web, 2007

Do Strong Web Passwords Accomplish Anything?
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

Evaluating a trial deployment of password re-use for phishing prevention.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

2006
ARGOS: automatically extracting repeating objects from multimedia streams.
IEEE Trans. Multim., 2006

Password Rescue: A New Approach to Phishing Prevention.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Analysis and Improvement of Anti-Phishing Schemes.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Analyzing and Improving a BitTorrent Networks Performance Mechanisms.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Some observations on bitTorrent performance.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

Accurate repeat finding and object skipping using fingerprints.
Proceedings of the 13th ACM International Conference on Multimedia, 2005

Inferring similarity between music objects with application to playlist generation.
Proceedings of the 7th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2005

Automatic occlusion removal from minimum number of images.
Proceedings of the 2005 International Conference on Image Processing, 2005

2004
Detection and deterrence of counterfeiting of valuable documents.
Proceedings of the 2004 International Conference on Image Processing, 2004

Efficient inscribing of noisy rectangular objects in scanned images.
Proceedings of the 2004 International Conference on Image Processing, 2004

Extracting repeats from media streams.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
Recursive method to extract rectangular objects from scans.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
Why watermarking is nonsense.
IEEE Signal Process. Mag., 2002

2001
Document capture using a digital camera.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Minimum rate sampling and reconstruction of signals with arbitrary frequency support.
IEEE Trans. Inf. Theory, 1999

Storage of Digital Camera Images.
Proceedings of the 1999 International Conference on Image Processing, 1999

1998
Correction To "occam Filters For Stochastic Sources With Application To Digital Images".
IEEE Trans. Signal Process., 1998

Occam filters for stochastic sources with application to digital images.
IEEE Trans. Signal Process., 1998

Trade-offs between Color Saturation and Noise Sensitivity in Image Sensors.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

A Post-Processing Algorithm for Compressed Digital Camera Images.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

1997
Flexible tree-structured signal expansions using time-varying wavelet packets.
IEEE Trans. Signal Process., 1997

Joint space-frequency segmentation using balanced wavelet packet trees for least-cost image representation.
IEEE Trans. Image Process., 1997

Area-Based Interpolation For Scaling of Images From a CCD.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Reconstruction for novel sampling structures.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

Image processing considerations for digital photography.
Proceedings of the Proceedings IEEE COMPCON 97, 1997

1996
Wavelets, subband coding, and best bases.
Proc. IEEE, 1996

Minimum rate sampling of signals with arbitrary frequency support.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Optimum Pre- and Post Filters for Robust Scalar Quantization.
Proceedings of the 6th Data Compression Conference (DCC '96), Snowbird, Utah, USA, March 31, 1996

1995
Exact interpolation and iterative subdivision schemes.
IEEE Trans. Signal Process., 1995

Space-frequency quantization for a space-varying wavelet packet image coder.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

An efficient algorithm to find a jointly optimal time-frequency segmentation using time-varying filter banks.
Proceedings of the 1995 International Conference on Acoustics, 1995

Exact reconstruction from periodic nonuniform samples.
Proceedings of the 1995 International Conference on Acoustics, 1995

1994
Orthogonal time-varying filter banks and wavelet packets.
IEEE Trans. Signal Process., 1994

Boundary Filters for Finite-Length Signals and Time-Varying Filter Banks.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

Multirate Operations for Exact Interpolation and Iterative Subdivision Schemes.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

Implementable orthogonal signal projections based on multirate filters.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1993
Wavelets and recursive filter banks.
IEEE Trans. Signal Process., 1993

Tilings of the time-frequency plane: construction of arbitrary orthogonal bases and fast tiling algorithms.
IEEE Trans. Signal Process., 1993

Orthogonal time-varying filter banks and wavelets.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993

Time-varying orthonormal tilings of the time-frequency plane.
Proceedings of the IEEE International Conference on Acoustics, 1993

1992
Wavelets and filter banks: theory and design.
IEEE Trans. Signal Process., 1992

Wavelets generated by IIR filter banks.
Proceedings of the 1992 IEEE International Conference on Acoustics, 1992

1991
Linear phase wavelets: theory and design.
Proceedings of the 1991 International Conference on Acoustics, 1991

1990
Wavelets and filter banks: relationships and new results.
Proceedings of the 1990 International Conference on Acoustics, 1990


  Loading...