Monrose

Results: 68



#Item
61Data / K-medoids / Medoid / Network packet / Transmission Control Protocol / K-means clustering / Communications protocol / Statistics / Information / Cluster analysis

Amplifying Limited Expert Input to Sanitize Large Network Traces Xin Huang, Fabian Monrose, Michael K. Reiter Department of Computer Science University of North Carolina at Chapel Hill Chapel Hill, NC, USA {huangxin,fabi

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2012-08-21 20:09:54
62Measuring instruments / Molecular biology / Microarrays

Towards Optimized Probe Scheduling for Active Measurement Studies N. Daniel Kumar, Fabian Monrose, and Michael K. Reiter Department of Computer Science University of North Carolina Chapel Hill, NC, USA

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-04-18 22:01:10
63Routing protocols / Border Gateway Protocol / Routing / Route Views / Path vector protocol / Router / IP hijacking / Network architecture / Internet / Computing

Efficient Techniques for Detecting False Origin Advertisements in Inter-domain Routing Sophie Y. Qiu, Fabian Monrose, Andreas Terzis, and Patrick D. McDaniel Dept. of CS, Johns Hopkins University  Dept. of CSE, Pennsylv

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:37
64Password / Access control / Cryptographic software / Keystroke dynamics / Salt / Transaction authentication number / OTPW / Security / Cryptography / Computer security

IJIS[removed]: 1–15 / Digital Object Identifier (DOI[removed]s102070100006 Password hardening based on keystroke dynamics Fabian Monrose, Michael K. Reiter∗ , Susanne Wetzel Bell Labs, Lucent Technologies, Murray

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:34
65Computing / Internet standards / Internet broadcasting / Multicast / Internet Group Management Protocol / IP multicast / Internet Group Management Protocol with Access Control / Internet / Internet protocols / Network architecture

Distillation Codes and DOS Resistant Multicast Prepared for CS 624 – Fabian Monrose Johns Hopkins University Ryan Gardner

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:20
66Software bugs / Shellcode / Buffer overflow / Malware / Software testing / Arbitrary code execution / Binary translation / QEMU / Code injection / Software / System software / Cyberwarfare

S HELL OS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose Department of Computer Science University of North Carolina at Chapel Hill, {kzsnow, kri

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-06-09 13:31:36
67Keystroke dynamics / Monrose / Ambient intelligence / USENIX / Computing / Cypherpunks / Year of birth missing / Niels Provos

Fabian N. Monrose [A] U NIVERSITY OF N ORTH C AROLINA , C HAPEL H ILL Computer Science Department Sitterson Hall, Chapel Hill, NC, [removed]Phone:

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2014-07-28 22:07:49
68Password strength / Password / Salt / John the Ripper / Rainbow table / Passphrase / Crypt / OTPW / Random password generator / Cryptography / Security / Computer security

The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis Yinqian Zhang Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2010-07-30 10:55:54
UPDATE