John V. Monaco

Orcid: 0000-0002-5089-583X

According to our database1, John V. Monaco authored at least 39 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
TypeNet: Deep Learning Keystroke Biometrics.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Device Fingerprinting with Peripheral Timestamps.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
User Identification in Dynamic Web Traffic via Deep Temporal Features.
Proceedings of the IEEE Security and Privacy Workshops, 2021

2020
Temporal Behavior in Network Traffic as a Basis for Insider Threat Detection.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

General Purpose Computation with Spiking Neural Networks: Programming, Design Principles, and Patterns.
Proceedings of the NICE '20: Neuro-inspired Computational Elements Workshop, 2020

TypeNet: Scaling up Keystroke Biometrics.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020

Keystroke Biometrics in Response to Fake News Propagation in a Global Pandemic.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Bug or Feature? Covert Impairments to Human Computer Interaction.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete.
Proceedings of the 28th USENIX Security Symposium, 2019

Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2018
Factoring Integers With a Brain-Inspired Computer.
IEEE Trans. Circuits Syst. I Regul. Pap., 2018

The partially observable hidden Markov model and its application to keystroke dynamics.
Pattern Recognit., 2018

SoK: Keylogging Side Channels.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Solving Vertex Cover via Ising Model on a Neuromorphic Processor.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

2017
Keystroke Biometric Systems for User Authentication.
J. Signal Process. Syst., 2017

General Semiparametric Shared Frailty Model Estimation and Simulation with frailtySurv.
CoRR, 2017

A comparison of classifiers and features for authorship authentication of social networking messages.
Concurr. Comput. Pract. Exp., 2017

Biometric studies with hidden Markov model and its extension on short fixed-text input.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Integer factorization with a neuromorphic sieve.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017

Tightly integrated deep learning and symbolic programming on a single neuromorphic chip.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017

2016
Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation.
CoRR, 2016

The Partially Observable Hidden Markov Model with Application to Keystroke Biometrics.
CoRR, 2016

Robust Keystroke Biometric Anomaly Detection.
CoRR, 2016

KBOC: Keystroke biometrics OnGoing competition.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Crossing domains with the inductive transfer encoder: Case study in keystroke biometrics.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Keystroke biometric studies with short numeric input on smartphones.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

2015
Using a predefined passphrase to evaluate a speaker verification system.
Artif. Intell. Res., 2015

One-handed Keystroke Biometric Identification Competition.
Proceedings of the International Conference on Biometrics, 2015

Authentication and Identification Methods Used in Keystroke Biometric Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Approach to Minimize Crossings in Phylogenetic Trees.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Spoofing key-press latencies with a generative keystroke dynamics model.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

2014
A correlation method for handling infrequent data in keystroke biometric systems.
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

Authorship Authentication Using Short Messages from Social Networking Sites.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

Classification and authentication of one-dimensional behavioral biometrics.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

2013
Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

Keystroke Biometric Studies on Password and Numeric Keypad Input.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Developing a Keystroke Biometric System for Continual Authentication of Computer Users.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
An investigation of keystroke and stylometry traits for authenticating online test takers.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011


  Loading...