The design and analysis of graphical passwords I Jermyn, A Mayer, F Monrose, MK Reiter, A Rubin 8th USENIX Security Symposium (USENIX Security 99), 1999 | 1210 | 1999 |
Keystroke dynamics as a biometric for authentication F Monrose, AD Rubin Future Generation computer systems 16 (4), 351-359, 2000 | 1114 | 2000 |
A multifaceted approach to understanding the botnet phenomenon M Abu Rajab, J Zarfoss, F Monrose, A Terzis Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 41-52, 2006 | 972 | 2006 |
Password hardening based on keystroke dynamics F Monrose, MK Reiter, S Wetzel Proceedings of the 6th ACM Conference on Computer and Communications …, 1999 | 757 | 1999 |
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization KZ Snow, F Monrose, L Davi, A Dmitrienko, C Liebchen, AR Sadeghi 2013 IEEE symposium on security and privacy, 574-588, 2013 | 753 | 2013 |
On user choice in graphical password schemes. D Davis, F Monrose, MK Reiter USENIX security symposium 13 (2004), 11-11, 2004 | 753 | 2004 |
Authentication via keystroke dynamics F Monrose, A Rubin Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 751 | 1997 |
All your iframes point to us N Provos, P Mavrommatis, M Rajab, F Monrose | 693 | 2008 |
Cryptographic key generation from voice F Monrose, MK Reiter, Q Li, S Wetzel Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 202-213, 2000 | 557 | 2000 |
Sok: Security evaluation of home-based iot deployments O Alrawi, C Lever, M Antonakakis, F Monrose 2019 IEEE symposium on security and privacy (sp), 1362-1380, 2019 | 478 | 2019 |
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. CV Wright, SE Coull, F Monrose NDSS 9, 2009 | 441 | 2009 |
Achieving efficient conjunctive keyword searches over encrypted data L Ballard, S Kamara, F Monrose Information and Communications Security: 7th International Conference, ICICS …, 2005 | 434 | 2005 |
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging M Fabian, MA Terzis Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding …, 2007 | 340 | 2007 |
On inferring application protocol behaviors in encrypted network traffic. CV Wright, F Monrose, GM Masson Journal of Machine Learning Research 7 (12), 2006 | 321 | 2006 |
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations CV Wright, L Ballard, SE Coull, F Monrose, GM Masson 2008 IEEE Symposium on Security and Privacy (sp 2008), 35-49, 2008 | 318 | 2008 |
The security of modern password expiration: An algorithmic framework and empirical analysis Y Zhang, F Monrose, MK Reiter Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 270 | 2010 |
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob? CV Wright, L Ballard, F Monrose, GM Masson USENIX Security Symposium 3, 43-54, 2007 | 269 | 2007 |
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. L Davi, C Liebchen, AR Sadeghi, KZ Snow, F Monrose NDSS, 2015 | 253 | 2015 |
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security S Das, J Werner, M Antonakakis, M Polychronakis, F Monrose 2019 IEEE Symposium on Security and Privacy (SP), 20-38, 2019 | 191 | 2019 |
Phonotactic reconstruction of encrypted voip conversations: Hookt on fon-iks AM White, AR Matthews, KZ Snow, F Monrose 2011 IEEE Symposium on Security and Privacy, 3-18, 2011 | 184 | 2011 |