Recent/Selected Publications


  1. Shen, Chao; Cai, Zhongmin; Guan, Xiaohong; Du, Youtian and Maxion, Roy A. "User Authentication through Mouse Dynamics." IEEE Transactions on Information Forensics and Security, Vol. 8, No. 1, pp. 16-30, January 2013. (Available via IEEE.)
  2. Shen, Chao; Cai, Zhongmin; Maxion, Roy A.; Xiang, Guang and Guan, Xiaohong. "Comparing Classification Algorithms for Mouse Dynamics based User Identification." IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), 23-26 September 2012, Washington, DC, pp. 61-66, IEEE Press, Piscataway, New Jersey. (Available via IEEE.)
  3. Killourhy, Kevin S. and Maxion, Roy A. "Free vs. Transcribed Text for Keystroke-Dynamics Evaluations." LASER-12: Proceedings of the 2012 Workshop: Learning from Authoritative Security Experiment Results, pp. 1-8, 18-19 July 2012, Arlington, VA. ACM, New York, New York. (Available via ACM.)
  4. Maxion, Roy A. "Making Experiments Dependable." The Next Wave / NSA Magazine, Vol. 19, No. 1, pp. 13-22, March 2012, National Security Agency, Ft. Meade, Maryland. Reprinted from Dependable and Historic Computing , LNCS 6875, pp. 344-357, Springer, Berlin, 2011.
  5. Killourhy, Kevin S. and Maxion, Roy A. "Why Did My Detector Do That?! Predicting Keystroke-Dynamics Error Rates." 13th International Symposium on Recent Advances in Intrusion Detection, 15-17 September 2010, Ottawa, Ontario, Canada. S. Jha, R. Sommer, and C. Kreibich (Eds.): RAID 2010, Lecture Notes in Computer Science, LNCS Vol. 6307, pp. 256-276, Springer-Verlag, Berlin/Heidelberg, 2010. ISBN 978-3-642-15511-6.
  6. Maxion, Roy A. and Killourhy, Kevin S. "Keystroke Biometrics with Number-Pad Input." In IEEE/IFIP International Conference on Dependable Systems & Networks (DSN-10), pp. 201-210, Chicago, Illinois, 28 June to 01 July 2010. IEEE Computer Society Press, Los Alamitos, California, 2010.

  7. Killourhy, Kevin S. and Maxion, Roy A. "Comparing Anomaly-Detection Algorithms for Keystroke Dynamics." In International Conference on Dependable Systems & Networks (DSN-09), pp. 125-134, Estoril, Lisbon, Portugal, 29 June to 02 July 2009. IEEE Computer Society Press, Los Alamitos, California, 2009.
  8. Click here for keystroke data set and scripts.

  9. Killourhy, Kevin S. and Maxion, Roy A. "The Effect of Clock Resolution on Keystroke Dynamics." In 11th International Symposium on Recent Advances in Intrusion Detection (RAID-08), 15-17 September 2008, Cambridge, Massachusetts, R. Lippmann, E. Kirda and A. Trachtenberg (Eds.), Lecture Notes in Computer Science (LNCS), Vol. 5230, pp. 331-350, Springer-Verlag, Berlin, Heidelberg.
  10. Killourhy, Kevin S. and Maxion, Roy A. "Toward Realistic and Artifact-Free Insider-Threat Data." In 23rd Annual Computer Security Applications Conference (ACSAC-07), pp. 87-96, Miami Beach, Florida, 10-14 December 2007. IEEE Computer Society Press, Los Alamitos, California, 2007.
  11. Roberts, Rachel R. M.; Maxion, Roy A.; Killourhy, Kevin S., and Arshad, Fahd. "User Discrimination Through Structured Writing on PDAs." In International Conference on Dependable Systems & Networks (DSN-07), pp. 378-387, Edinburgh, Scotland, 25-28 June 2007. IEEE Computer Society Press, Los Alamitos, California, 2007.
  12. Reeder, Robert W. and Maxion, Roy A. "User Interface Defect Detection by Hesitation Analysis." In International Conference on Dependable Systems & Networks (DSN-06), pp. 61-70, Philadelphia, Pennsylvania, 25-28 June 2006. IEEE Computer Society Press, Los Alamitos, California, 2006.
  13. Tan, Kymie M. C. and Maxion, Roy A. "The Effects of Algorithmic Diversity on Anomaly Detector Performance." In International Conference on Dependable Systems & Networks (DSN-05), pp. 216-225, Yokohama, Japan, 28 June - 01 July 2005. IEEE Computer Society Press, Los Alamitos, California, 2005.
  14. Reeder, Robert W. and Maxion, Roy A. "User Interface Dependability through Goal-Error Prevention." In International Conference on Dependable Systems & Networks (DSN-05), pp. 60-69, Yokohama, Japan, 28 June - 01 July 2005. IEEE Computer Society Press, Los Alamitos, California, 2005.
  15. Killourhy, Kevin S.; Maxion, Roy A. and Tan, Kymie M. C. "A Defense-Centric Taxonomy Based on Attack Manifestations." In International Conference on Dependable Systems & Networks (DSN-04), pp. 102-111, Florence, Italy, 28 June - 01 July 2004. IEEE Computer Society Press, Los Alamitos, California, 2004.
  16. Maxion, Roy A. and Townsend, Tahlia N. "Masquerade Detection Augmented with Error Detection." IEEE Transactions on Reliability, Special Section on Quality/Reliability Engineering of Information Systems, Vol. 53, No. 1, pp. 124-147, March 2004.
  17. Maxion, Roy A. "Masquerade Detection Using Enriched Command Lines." In International Conference on Dependable Systems & Networks (DSN-03), pp. 5-14, San Francisco, California, 22-25 June 2003. IEEE Computer Society Press, Los Alamitos, California, 2003.
  18. Tan, Kymie M. C. and Maxion, Roy A. "Determining the Operational Limits of an Anomaly-Based Intrusion Detector." IEEE Journal on Selected Areas in Communications, Special Issue on Design and Analysis Techniques for Security Assurance, Vol. 21, No. 1, pp. 96-110, January 2003.
  19. Tan, Kymie M. C.; Killourhy, Kevin S. and Maxion, Roy A. "Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits." In Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002), Andreas Wespi, Giovanni Vigna and Luca Deri (Eds.), 16-18 October 2002, Zurich, Switzerland, pp. 54-73. Lecture Notes in Computer Science #2516, Springer-Verlag, Berlin, 2002.
  20. Maxion, Roy A. and Townsend, Tahlia N. "Masquerade Detection Using Truncated Command Lines." International Conference on Dependable Systems and Networks (DSN-02), pp. 219-228, Washington, D.C. 23-26 June 2002. IEEE Computer Society Press, Los Alamitos, California, 2002.
  21. Tan, Kymie M. C. and Maxion, Roy A. "Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector." IEEE Symposium on Security and Privacy, pages 188-201, Berkeley, California, 12-15 May 2002. IEEE Computer Society Press, Los Alamitos, California, 2002.
  22. Maxion, Roy A. and Tan, Kymie M. C. "Anomaly Detection in Embedded Systems." IEEE Transactions on Computers, Vol. 51, No. 2, pp. 108-120, February 2002.
  23. Jha, Somesh; Tan, Kymie M. C. and Maxion, Roy A. "Markov Chains, Classifiers and Intrusion Detection." 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, pp. 206-219, 11-13 June 2001.
  24. Maxion, Roy A. and Olszewski, Robert T. "Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study." IEEE Transactions on Software Engineering, Vol. 26, No. 9, pages 888-906, September 2000.
  25. Maxion, Roy A. and Tan, Kymie M. C. "Benchmarking Anomaly-Based Detection Systems." In International Conference on Dependable Systems and Networks, pages 623-630, New York, New York; 25-28 June 2000. IEEE Computer Society Press.
  26. Maxion, Roy A. and Olszewski, Robert T. "Improving Software Robustness with Dependability Cases." In 28th International Symposium on Fault-Tolerant Computing, pages 346-355, Munich, Germany; 23-25 June 1998. IEEE Computer Society Press.
  27. Baluja, S. and Maxion, R.A. "Artificial Neural Network Based Approaches to Detection and Diagnosis of Plasma-Etch Anomalies." The Journal of Intelligent Systems. Vol. 7, Nos. 1-2, pages 57-82, 1997.
  28. Maxion, R.A. and Syme, P.A. "Mitigating Operator-Induced Unavailability by Matching Imprecise Queries." In Twenty-Sixth International Symposium on Fault-Tolerant Computing, Sendai, Japan, June 1996.
  29. Maxion, R.A. and deChambeau A.L. "Dependability at the User Interface." In Twenty-Fifth International Symposium on Fault-Tolerant Computing, Pasadena, California, June 1995.
  30. Maxion, R.A. and Olszewski, R.T. "Detection and Discrimination of Injected Network Faults." In Twenty-Third International Symposium on Fault-Tolerant Computing, Toulouse, France, June 1993.