Roy A. Maxion

Orcid: 0000-0002-2833-7276

Affiliations:
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Roy A. Maxion authored at least 57 papers between 1981 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2008, "For contributions to real-time monitoring and analysis of computer systems for trend analysis, fault prediction, and anomaly detection".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Seven Faces of Stress: Understanding Facial Activity Patterns During Cognitive Stress.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024

2020
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System.
IEEE Trans. Dependable Secur. Comput., 2020

Reproducibility: Buy Low, Sell High.
IEEE Secur. Priv., 2020

2018
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2018

Distinction of stress and non-stress tasks using facial action units.
Proceedings of the International Conference on Multimodal Interaction: Adjunct, 2018

Towards Independent Stress Detection: A Dependent Model Using Facial Action Units.
Proceedings of the 2018 International Conference on Content-Based Multimedia Indexing, 2018

2016
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2016

MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System.
IEEE Trans. Hum. Mach. Syst., 2016

Application of HAZOP to the Design of Cyber Security Experiments.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2014
Performance evaluation of anomaly-detection algorithms for mouse dynamics.
Comput. Secur., 2014

2013
User Authentication Through Mouse Dynamics.
IEEE Trans. Inf. Forensics Secur., 2013

On User Interaction Behavior as Evidence for Computer Forensic Analysis.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Keynote: Detecting cognitive state for operators of cyber-physical systems: Design of experiments.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

A Study of the Consistency in Keystroke Dynamics.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

2012
Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
Should Security Researchers Experiment More and Draw More Inferences?
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Making Experiments Dependable.
Proceedings of the Dependable and Historic Computing, 2011

2010
Why Did My Detector Do <i>That</i>?! - Predicting Keystroke-Dynamics Error Rates.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Why is there no science in cyber science?: a panel discussion at NSPW 2010.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Keystroke biometrics with number-pad input.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Designing and evaluating usable security and privacy technology.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Dependability in the Time of Forensics.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Experimental Methods for Computer Science Research.
Proceedings of the Fourth Latin-American Symposium on Dependable Computing, 2009

Comparing anomaly-detection algorithms for keystroke dynamics.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

The Effect of Clock Resolution on Keystroke Dynamics.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
User Discrimination through Structured Writing on PDAs.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Toward Realistic and Artifact-Free Insider-Threat Data.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Anomaly Detector Performance Evaluation Using a Parameterized Environment.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

User Interface Defect Detection by Hesitation Analysis.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
Improving user-interface dependability through mitigation of human error.
Int. J. Hum. Comput. Stud., 2005

Methodological Foundations: Enabling the Next Generation of Security.
IEEE Secur. Priv., 2005

Use of diversity as a defense mechanism.
Proceedings of the New Security Paradigms Workshop 2005, 2005

The Effects of Algorithmic Diversity on Anomaly Detector Performance.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

User Interface Dependability through Goal-Error Prevention.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Masquerade detection augmented with error analysis.
IEEE Trans. Reliab., 2004

Experimental research in dependable computing at Carnegie Mellon University - From Faults to Manifestations.
Proceedings of the Building the Information Society, 2004

A Defense-Centric Taxonomy Based on Attack Manifestations.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Determining the operational limits of an anomaly-based intrusion detector.
IEEE J. Sel. Areas Commun., 2003

Masquerade Detection Using Enriched Command Lines.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Anomaly Detection in Embedded Systems.
IEEE Trans. Computers, 2002

"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

Masquerade Detection Using Truncated Command Lines.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Markov Chains, Classifiers, and Intrusion Detection.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study.
IEEE Trans. Software Eng., 2000

Benchmarking Anomaly-Based Detection Systems.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1998
Improving Software Robustness with Dependability Cases.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
MetriStation: A Tool for User-Interface Fault Detection.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Mitigating Operator-Induced Unavailability by Matching Imprecise Queries.
Proceedings of the Digest of Papers: FTCS-26, 1996

1995
Visual Programming and Hypermedia Implementation within a Distributed Laboratory Environment.
Intell. Autom. Soft Comput., 1995

Depenability at the User Interface.
Proceedings of the Digest of Papers: FTCS-25, 1995

1993
Fault Detection in an Ethernet Network Using Anomaly Signature Matching.
Proceedings of the ACM SIGCOMM 1993 Conference on Communications Architectures, 1993

Detection and Discrimination of Injected Network Faults.
Proceedings of the Digest of Papers: FTCS-23, 1993

1990
Anomaly detection for diagnosis.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

1989
Expert system design for symptom based diagnosis in local area networks.
Microprocessing and Microprogramming, 1989

1981
Fault prediction and dynamic error analysis in computer systems.
Proceedings of the ACM 1981 Annual Conference, Los Angeles, CA, USA, November 9-11, 1981., 1981


  Loading...