default search action
Roy A. Maxion
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Carla Viegas, Roy A. Maxion, Alexander G. Hauptmann, João Magalhães:
The Seven Faces of Stress: Understanding Facial Activity Patterns During Cognitive Stress. FG 2024: 1-9 - 2020
- [j15]Roy A. Maxion:
Reproducibility: Buy Low, Sell High. IEEE Secur. Priv. 18(6): 33-41 (2020) - [j14]Chao Shen, Yufei Chen, Xiaohong Guan, Roy A. Maxion:
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System. IEEE Trans. Dependable Secur. Comput. 17(2): 335-349 (2020)
2010 – 2019
- 2018
- [j13]Chao Shen, Yuanxun Li, Yufei Chen, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 13(1): 48-62 (2018) - [c40]Carla Viegas, Shing-Hon Lau, Roy A. Maxion, Alexander G. Hauptmann:
Towards Independent Stress Detection: A Dependent Model Using Facial Action Units. CBMI 2018: 1-6 - [c39]Carla Viegas, Shing-Hon Lau, Roy A. Maxion, Alexander G. Hauptmann:
Distinction of stress and non-stress tasks using facial action units. ICMI (adjunct) 2018: 7:1-7:6 - 2016
- [j12]Chao Shen, Zhongmin Cai, Xiaomei Liu, Xiaohong Guan, Roy A. Maxion:
MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System. IEEE Trans. Hum. Mach. Syst. 46(5): 734-748 (2016) - [j11]Chao Shen, Yong Zhang, Xiaohong Guan, Roy A. Maxion:
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication. IEEE Trans. Inf. Forensics Secur. 11(3): 498-513 (2016) - [c38]Masood Mansoori, Ian Welch, Kim-Kwang Raymond Choo, Roy A. Maxion:
Application of HAZOP to the Design of Cyber Security Experiments. AINA 2016: 790-799 - 2014
- [j10]Chao Shen, Zhongmin Cai, Xiaohong Guan, Roy A. Maxion:
Performance evaluation of anomaly-detection algorithms for mouse dynamics. Comput. Secur. 45: 156-171 (2014) - 2013
- [j9]Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion:
User Authentication Through Mouse Dynamics. IEEE Trans. Inf. Forensics Secur. 8(1): 16-30 (2013) - [c37]Chao Shen, Roy A. Maxion, Zhongmin Cai:
A Study of the Consistency in Keystroke Dynamics. CCBR 2013: 409-416 - [c36]Roy A. Maxion:
Keynote: Detecting cognitive state for operators of cyber-physical systems: Design of experiments. DSN Workshops 2013: 1 - [c35]Chao Shen, Zhongmin Cai, Roy A. Maxion, Xiaohong Guan:
On User Interaction Behavior as Evidence for Computer Forensic Analysis. IWDW 2013: 221-231 - 2012
- [c34]Chao Shen, Zhongmin Cai, Roy A. Maxion, Guang Xiang, Xiaohong Guan:
Comparing classification algorithm for mouse dynamics based user identification. BTAS 2012: 61-66 - 2011
- [c33]Roy A. Maxion:
Making Experiments Dependable. Dependable and Historic Computing 2011: 344-357 - [c32]Kevin S. Killourhy, Roy A. Maxion:
Should Security Researchers Experiment More and Draw More Inferences? CSET 2011 - 2010
- [c31]Roy A. Maxion, Kevin S. Killourhy:
Keystroke biometrics with number-pad input. DSN 2010: 201-210 - [c30]Roy A. Maxion, Thomas A. Longstaff, John McHugh:
Why is there no science in cyber science?: a panel discussion at NSPW 2010. NSPW 2010: 1-6 - [c29]Kevin S. Killourhy, Roy A. Maxion:
Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates. RAID 2010: 256-276
2000 – 2009
- 2009
- [c28]Kevin S. Killourhy, Roy A. Maxion:
Comparing anomaly-detection algorithms for keystroke dynamics. DSN 2009: 125-134 - [c27]Roy A. Maxion:
Experimental Methods for Computer Science Research. LADC 2009: 136 - [c26]Roy A. Maxion:
Dependability in the Time of Forensics. LADC 2009: 137 - [c25]Martina Angela Sasse, Clare-Marie Karat, Roy A. Maxion:
Designing and evaluating usable security and privacy technology. SOUPS 2009 - 2008
- [c24]Kevin S. Killourhy, Roy A. Maxion:
The Effect of Clock Resolution on Keystroke Dynamics. RAID 2008: 331-350 - [p1]Kevin S. Killourhy, Roy A. Maxion:
Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. Insider Attack and Cyber Security 2008: 91-112 - 2007
- [c23]Kevin S. Killourhy, Roy A. Maxion:
Toward Realistic and Artifact-Free Insider-Threat Data. ACSAC 2007: 87-96 - [c22]Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad:
User Discrimination through Structured Writing on PDAs. DSN 2007: 378-388 - 2006
- [c21]Robert W. Reeder, Roy A. Maxion:
User Interface Defect Detection by Hesitation Analysis. DSN 2006: 61-72 - [c20]Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion:
Anomaly Detector Performance Evaluation Using a Parameterized Environment. RAID 2006: 106-126 - 2005
- [j8]Roy A. Maxion, Rachel R. M. Roberts:
Methodological Foundations: Enabling the Next Generation of Security. IEEE Secur. Priv. 3(2): 54-57 (2005) - [j7]Roy A. Maxion, Robert W. Reeder:
Improving user-interface dependability through mitigation of human error. Int. J. Hum. Comput. Stud. 63(1-2): 25-50 (2005) - [c19]Robert W. Reeder, Roy A. Maxion:
User Interface Dependability through Goal-Error Prevention. DSN 2005: 60-69 - [c18]Kymie M. C. Tan, Roy A. Maxion:
The Effects of Algorithmic Diversity on Anomaly Detector Performance. DSN 2005: 216-225 - [c17]Roy A. Maxion:
Use of diversity as a defense mechanism. NSPW 2005: 21-22 - 2004
- [j6]Roy A. Maxion, Tahlia N. Townsend:
Masquerade detection augmented with error analysis. IEEE Trans. Reliab. 53(1): 124-147 (2004) - [c16]Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan:
A Defense-Centric Taxonomy Based on Attack Manifestations. DSN 2004: 102- - [c15]Daniel P. Siewiorek, Roy A. Maxion, Priya Narasimhan:
Experimental research in dependable computing at Carnegie Mellon University - From Faults to Manifestations. IFIP Congress Topical Sessions 2004: 305-328 - 2003
- [j5]Kymie M. C. Tan, Roy A. Maxion:
Determining the operational limits of an anomaly-based intrusion detector. IEEE J. Sel. Areas Commun. 21(1): 96-110 (2003) - [c14]Roy A. Maxion:
Masquerade Detection Using Enriched Command Lines. DSN 2003: 5-14 - 2002
- [j4]Roy A. Maxion, Kymie M. C. Tan:
Anomaly Detection in Embedded Systems. IEEE Trans. Computers 51(2): 108-120 (2002) - [c13]Roy A. Maxion, Tahlia N. Townsend:
Masquerade Detection Using Truncated Command Lines. DSN 2002: 219-228 - [c12]Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion:
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits. RAID 2002: 54-73 - [c11]Kymie M. C. Tan, Roy A. Maxion:
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. S&P 2002: 188-201 - 2001
- [c10]Somesh Jha, Kymie M. C. Tan, Roy A. Maxion:
Markov Chains, Classifiers, and Intrusion Detection. CSFW 2001: 206-219 - 2000
- [j3]Roy A. Maxion, Robert T. Olszewski:
Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study. IEEE Trans. Software Eng. 26(9): 888-906 (2000) - [c9]Roy A. Maxion, Kymie M. C. Tan:
Benchmarking Anomaly-Based Detection Systems. DSN 2000: 623-630
1990 – 1999
- 1998
- [c8]Roy A. Maxion, Robert T. Olszewski:
Improving Software Robustness with Dependability Cases. FTCS 1998: 346-355 - 1997
- [c7]Roy A. Maxion, Philip A. Syme:
MetriStation: A Tool for User-Interface Fault Detection. FTCS 1997: 89-98 - 1996
- [c6]Roy A. Maxion, Philip A. Syme:
Mitigating Operator-Induced Unavailability by Matching Imprecise Queries. FTCS 1996: 240-249 - 1995
- [j2]Matthew W. Gertz, Roy A. Maxion, Pradeep K. Khosla:
Visual Programming and Hypermedia Implementation within a Distributed Laboratory Environment. Intell. Autom. Soft Comput. 1(1): 43-62 (1995) - [c5]Roy A. Maxion, Aimee L. deChambeau:
Depenability at the User Interface. FTCS 1995: 528-535 - 1993
- [c4]Roy A. Maxion, Robert T. Olszewski:
Detection and Discrimination of Injected Network Faults. FTCS 1993: 198-207 - [c3]Frank Feather, Daniel P. Siewiorek, Roy A. Maxion:
Fault Detection in an Ethernet Network Using Anomaly Signature Matching. SIGCOMM 1993: 279-288 - 1990
- [c2]Roy A. Maxion:
Anomaly detection for diagnosis. FTCS 1990: 20-27
1980 – 1989
- 1989
- [j1]Perfecto Mariño, Roy A. Maxion:
Expert system design for symptom based diagnosis in local area networks. Microprocessing and Microprogramming 27(1-5): 757-764 (1989) - 1981
- [c1]Roy A. Maxion:
Fault prediction and dynamic error analysis in computer systems. ACM Annual Conference 1981: 244
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-01 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint