Monrose

Results: 68



#Item
1

Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose, The University of North Carolina at Chapel Hill https://www.usenix

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-08-10 04:01:14
    2

    DNS Prefetching and Its Privacy Implications: When Good Things Go Bad Srinivas Krishnan and Fabian Monrose Department of Computer Science University of North Carolina at Chapel Hill,

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2010-04-07 09:48:08
      3

      A Multifaceted Approach to Understanding the Botnet Phenomenon Moheeb Abu Rajab Jay Zarfoss Fabian Monrose Computer Science Department

      Add to Reading List

      Source URL: conferences.sigcomm.org

      - Date: 2006-09-19 17:40:17
        4

        Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY.,

        Add to Reading List

        Source URL: avirubin.com

        Language: English - Date: 2012-11-01 14:27:11
          5

          The Challenges of Effectively Anonymizing Network Data Scott E. Coull∗ ∗ Fabian Monrose†

          Add to Reading List

          Source URL: www.scottcoull.com

          Language: English - Date: 2014-03-03 12:03:03
            6

            iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm Department of Computer Science, University of North Ca

            Add to Reading List

            Source URL: cs.unc.edu

            Language: English - Date: 2011-11-03 14:17:56
              7

              Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Charles V. Wright Lucas Ballard Scott E. Coull Fabian Monrose Gerald M. Masson Johns Hopkins University Department of Computer Science Baltimo

              Add to Reading List

              Source URL: www.cs.jhu.edu

              Language: English - Date: 2008-06-18 14:35:16
                8

                iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm Department of Computer Science, University of North Ca

                Add to Reading List

                Source URL: cs.unc.edu

                Language: English - Date: 2011-08-30 21:32:09
                  9

                  Clear and Present Data: Opaque Traffic and its Security Implications for the Future Andrew M. White∗ , Srinivas Krishnan∗ , Michael Bailey† , Fabian Monrose∗ , Phillip Porras‡ ∗ University of North Carolina a

                  Add to Reading List

                  Source URL: cs.unc.edu

                  Language: English - Date: 2013-01-05 12:45:46
                    UPDATE