Roy A. Maxion
Orcid: 0000-0002-2833-7276Affiliations:
- Carnegie Mellon University, Pittsburgh, USA
According to our database1,
Roy A. Maxion
authored at least 57 papers
between 1981 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2008, "For contributions to real-time monitoring and analysis of computer systems for trend analysis, fault prediction, and anomaly detection".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.cmu.edu
On csauthors.net:
Bibliography
2024
The Seven Faces of Stress: Understanding Facial Activity Patterns During Cognitive Stress.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024
2020
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System.
IEEE Trans. Dependable Secur. Comput., 2020
2018
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the International Conference on Multimodal Interaction: Adjunct, 2018
Proceedings of the 2018 International Conference on Content-Based Multimedia Indexing, 2018
2016
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Hum. Mach. Syst., 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2014
Comput. Secur., 2014
2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Keynote: Detecting cognitive state for operators of cyber-physical systems: Design of experiments.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013
2012
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the Dependable and Historic Computing, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
2005
Int. J. Hum. Comput. Stud., 2005
IEEE Secur. Priv., 2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
Experimental research in dependable computing at Carnegie Mellon University - From Faults to Manifestations.
Proceedings of the Building the Information Society, 2004
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
2003
IEEE J. Sel. Areas Commun., 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
2002
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study.
IEEE Trans. Software Eng., 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
1998
Proceedings of the Digest of Papers: FTCS-28, 1998
1997
Proceedings of the Digest of Papers: FTCS-27, 1997
1996
Proceedings of the Digest of Papers: FTCS-26, 1996
1995
Visual Programming and Hypermedia Implementation within a Distributed Laboratory Environment.
Intell. Autom. Soft Comput., 1995
Proceedings of the Digest of Papers: FTCS-25, 1995
1993
Proceedings of the ACM SIGCOMM 1993 Conference on Communications Architectures, 1993
Proceedings of the Digest of Papers: FTCS-23, 1993
1990
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990
1989
Microprocessing and Microprogramming, 1989
1981
Proceedings of the ACM 1981 Annual Conference, Los Angeles, CA, USA, November 9-11, 1981., 1981