Kevin S. Killourhy

According to our database1, Kevin S. Killourhy authored at least 13 papers between 2002 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Clear, Unambiguous Password Policies: An Oxymoron?
Proceedings of the Cross-Cultural Design, 2014

2011
Should Security Researchers Experiment More and Draw More Inferences?
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

2010
Why Did My Detector Do <i>That</i>?! - Predicting Keystroke-Dynamics Error Rates.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Keystroke biometrics with number-pad input.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Comparing anomaly-detection algorithms for keystroke dynamics.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

The Effect of Clock Resolution on Keystroke Dynamics.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
User Discrimination through Structured Writing on PDAs.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Toward Realistic and Artifact-Free Insider-Threat Data.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2005
Bayesian detection of router configuration anomalies.
Proceedings of the 1st Annual ACM Workshop on Mining Network Data, 2005

2004
A Defense-Centric Taxonomy Based on Attack Manifestations.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2002
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

Hiding Intrusions: From the Abnormal to the Normal and Beyond.
Proceedings of the Information Hiding, 5th International Workshop, 2002


  Loading...