default search action
Cormac Herley
Person information
- affiliation: Microsoft Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Thomas Ball, Shuo Chen, Cormac Herley:
Can We Count on LLMs? The Fixed-Effect Fallacy and Claims of GPT-4 Capabilities. CoRR abs/2409.07638 (2024) - 2023
- [j27]Cormac Herley:
Approximating Naive Bayes on Unlabelled Categorical Data. Trans. Mach. Learn. Res. 2023 (2023) - 2022
- [c71]Casey F. Breen, Cormac Herley, Elissa M. Redmiles:
A Large-Scale Measurement of Cybercrime Against Individuals. CHI 2022: 122:1-122:41 - [c70]Cormac Herley:
Automated Detection of Automated Traffic. USENIX Security Symposium 2022: 1615-1632 - 2020
- [j26]Yuan Tian, Cormac Herley, Stuart E. Schechter:
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing. IEEE Secur. Priv. 18(3): 38-47 (2020)
2010 – 2019
- 2019
- [c69]Stuart E. Schechter, Yuan Tian, Cormac Herley:
StopGuessing: Using Guessed Passwords to Thwart Online Guessing. EuroS&P 2019: 576-589 - [c68]Cormac Herley, Stuart E. Schechter:
Distinguishing Attacks from Legitimate Authentication Traffic at Scale. NDSS 2019 - 2018
- [j25]Cormac Herley, Paul C. van Oorschot:
Science of Security: Combining Theory and Measurement to Reflect the Observable. IEEE Secur. Priv. 16(1): 12-22 (2018) - [j24]John D. McLean, Cormac Herley, Paul C. van Oorschot:
Letter to the Editor. IEEE Secur. Priv. 16(3): 6-10 (2018) - 2017
- [c67]Cormac Herley:
Justifying Security Measures - a Position Paper. ESORICS (1) 2017: 11-17 - [c66]Cormac Herley, Paul C. van Oorschot:
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. IEEE Symposium on Security and Privacy 2017: 99-120 - 2016
- [j23]Dinei Florêncio, Cormac Herley, Paul C. van Oorschot:
Pushing on string: the 'don't care' region of password strength. Commun. ACM 59(11): 66-74 (2016) - [j22]M. Angela Sasse, Matthew Smith, Cormac Herley, Heather Lipford, Kami Vaniea:
Debunking Security-Usability Tradeoff Myths. IEEE Secur. Priv. 14(5): 33-39 (2016) - [j21]Cormac Herley:
Unfalsifiability of security claims. Proc. Natl. Acad. Sci. USA 113(23): 6415-6420 (2016) - 2015
- [j20]Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
Passwords and the evolution of imperfect authentication. Commun. ACM 58(7): 78-87 (2015) - [c65]Mobin Javed, Cormac Herley, Marcus Peinado, Vern Paxson:
Measurement and Analysis of Traffic Exchange Services. Internet Measurement Conference 2015: 1-12 - [c64]Cormac Herley, Wolter Pieters:
"If you were attacked, you'd be sorry": Counterfactuals as security arguments. NSPW 2015: 112-123 - 2014
- [j19]Dinei Florêncio, Cormac Herley, Adam Shostack:
FUD: a plea for intolerance. Commun. ACM 57(6): 31-33 (2014) - [j18]Cormac Herley:
Security, cybercrime, and scale. Commun. ACM 57(9): 64-71 (2014) - [j17]Cormac Herley:
More Is Not the Answer. IEEE Secur. Priv. 12(1): 14-19 (2014) - [c63]Dinei Florêncio, Cormac Herley, Paul C. van Oorschot:
An Administrator's Guide to Internet Password Research. LISA 2014: 35-52 - [c62]Dinei Florêncio, Cormac Herley, Paul C. van Oorschot:
Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. USENIX Security Symposium 2014: 575-590 - [c61]Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, Stuart E. Schechter:
Telepathwords: Preventing Weak Passwords by Reading Users' Minds. USENIX Security Symposium 2014: 591-606 - [i1]Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela Sasse:
Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports 4(12): 1-28 (2014) - 2013
- [j16]Cormac Herley:
When Does Targeting Make Sense for an Attacker? IEEE Secur. Priv. 11(2): 89-92 (2013) - [c60]Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley:
Does my password go up to eleven?: the impact of password meters on password selection. CHI 2013: 2379-2388 - [c59]Gang Wang, Jack W. Stokes, Cormac Herley, David Felstead:
Detecting malicious landing pages in Malware Distribution Networks. DSN 2013: 1-11 - [c58]Serge Egelman, Cormac Herley, Paul C. van Oorschot:
Markets for zero-day exploits: ethics and implications. NSPW 2013: 41-46 - 2012
- [j15]Cormac Herley, Paul C. van Oorschot:
A Research Agenda Acknowledging the Persistence of Passwords. IEEE Secur. Priv. 10(1): 28-36 (2012) - [j14]Dinei A. F. Florêncio, Cormac Herley:
Is Everything We Know about Password Stealing Wrong? IEEE Secur. Priv. 10(6): 63-69 (2012) - [c57]Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. IEEE Symposium on Security and Privacy 2012: 553-567 - [c56]Cormac Herley:
Why do Nigerian Scammers Say They are From Nigeria? WEIS 2012 - [e2]Richard Ford, Mary Ellen Zurko, Cormac Herley, Tara Whalen:
The New Security Paradigms Workshop, NSPW '12, Bertinoro, Italy - September 18 - 21, 2012. ACM 2012, ISBN 978-1-4503-1794-8 [contents] - 2011
- [c55]Dinei A. F. Florêncio, Cormac Herley:
Where Do All the Attacks Go? WEIS 2011 - [c54]Dinei A. F. Florêncio, Cormac Herley:
Sex, Lies and Cyber-crime Survey. WEIS 2011 - [c53]Dinei Florêncio, Cormac Herley:
Where Do All the Attacks Go? WEIS (Springer Volume) 2011: 13-33 - [c52]Dinei Florêncio, Cormac Herley:
Sex, Lies and Cyber-Crime Surveys. WEIS (Springer Volume) 2011: 35-53 - [c51]Ziqing Mao, Dinei A. F. Florêncio, Cormac Herley:
Painless migration from passwords to two factor authentication. WIFS 2011: 1-6 - [e1]Sean Peisert, Richard Ford, Carrie Gates, Cormac Herley:
2011 New Security Paradigms Workshop, NSPW '11, Marin County, CA, USA, September 12-15, 2011. ACM 2011, ISBN 978-1-4503-1078-9 [contents] - 2010
- [c50]Ziqing Mao, Cormac Herley:
A robust link-translating proxy server mirroring the whole web. SAC 2010: 818-825 - [c49]Dinei A. F. Florêncio, Cormac Herley:
Where do security policies come from? SOUPS 2010 - [c48]Stuart E. Schechter, Cormac Herley, Michael Mitzenmacher:
Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks. HotSec 2010 - [c47]Serge Egelman, David Molnar, Nicolas Christin, Alessandro Acquisti, Cormac Herley, Shriram Krishnamurthi:
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays. WEIS 2010 - [c46]Cormac Herley:
The Plight of the Targeted Attacker in a World of Scale. WEIS 2010 - [c45]Dinei Florêncio, Cormac Herley:
Phishing and money mules. WIFS 2010: 1-5
2000 – 2009
- 2009
- [c44]Cormac Herley, Paul C. van Oorschot, Andrew S. Patrick:
Passwords: If We're So Smart, Why Are We Still Using Them? Financial Cryptography 2009: 230-237 - [c43]Cormac Herley:
So long, and no thanks for the externalities: the rational rejection of security advice by users. NSPW 2009: 133-144 - [c42]Cormac Herley, Dinei A. F. Florêncio:
Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. WEIS 2009 - 2008
- [c41]Dinei A. F. Florêncio, Cormac Herley:
One-Time Password Access to Any Server without Changing the Server. ISC 2008: 401-420 - [c40]Baris Coskun, Cormac Herley:
Can "Something You Know" Be Saved?. ISC 2008: 421-440 - [c39]Cormac Herley, Dinei A. F. Florêncio:
A profitless endeavor: phishing as tragedy of the commons. NSPW 2008: 59-70 - [c38]Cormac Herley, Dinei A. F. Florêncio:
Protecting Financial Institutions from Brute-Force Attacks. SEC 2008: 681-685 - 2007
- [c37]Dinei A. F. Florêncio, Cormac Herley:
Evaluating a trial deployment of password re-use for phishing prevention. eCrime Researchers Summit 2007: 26-36 - [c36]Dinei Florêncio, Cormac Herley, Baris Coskun:
Do Strong Web Passwords Accomplish Anything? HotSec 2007 - [c35]Dinei A. F. Florêncio, Cormac Herley:
A large-scale study of web password habits. WWW 2007: 657-666 - 2006
- [j13]Cormac Herley:
ARGOS: automatically extracting repeating objects from multimedia streams. IEEE Trans. Multim. 8(1): 115-129 (2006) - [c34]Dinei A. F. Florêncio, Cormac Herley:
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. ACSAC 2006: 67-76 - [c33]Ashwin R. Bharambe, Cormac Herley, Venkata N. Padmanabhan:
Analyzing and Improving a BitTorrent Networks Performance Mechanisms. INFOCOM 2006 - [c32]Dinei A. F. Florêncio, Cormac Herley:
Analysis and Improvement of Anti-Phishing Schemes. SEC 2006: 148-157 - [c31]Dinei Florêncio, Cormac Herley:
Password Rescue: A New Approach to Phishing Prevention. HotSec 2006 - 2005
- [c30]Cormac Herley:
Automatic occlusion removal from minimum number of images. ICIP (2) 2005: 1046-1049 - [c29]Robert Ragno, Christopher J. C. Burges, Cormac Herley:
Inferring similarity between music objects with application to playlist generation. Multimedia Information Retrieval 2005: 73-80 - [c28]Cormac Herley:
Accurate repeat finding and object skipping using fingerprints. ACM Multimedia 2005: 656-665 - [c27]Ashwin R. Bharambe, Cormac Herley, Venkata N. Padmanabhan:
Some observations on bitTorrent performance. SIGMETRICS 2005: 398-399 - 2004
- [c26]Cormac Herley:
Extracting repeats from media streams. ICASSP (5) 2004: 913-916 - [c25]Cormac Herley:
Efficient inscribing of noisy rectangular objects in scanned images. ICIP 2004: 2399-2402 - [c24]Cormac Herley, Poorvi L. Vora, Shawn Yang:
Detection and deterrence of counterfeiting of valuable documents. ICIP 2004: 2423-2426 - 2003
- [c23]Cormac Herley:
Recursive method to extract rectangular objects from scans. ICIP (3) 2003: 989-992 - 2002
- [j12]Cormac Herley:
Why watermarking is nonsense. IEEE Signal Process. Mag. 19(5): 10-11 (2002) - 2001
- [c22]Cormac Herley:
Document capture using a digital camera. ICIP (2) 2001: 1041-1044 - 2000
- [c21]Cormac Herley:
Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking. ICIP 2000: 660-663
1990 – 1999
- 1999
- [j11]Cormac Herley, Ping Wah Wong:
Minimum rate sampling and reconstruction of signals with arbitrary frequency support. IEEE Trans. Inf. Theory 45(5): 1555-1564 (1999) - [c20]Cormac Herley:
Storage of Digital Camera Images. ICIP (3) 1999: 940-942 - 1998
- [j10]Balas K. Natarajan, Konstantinos Konstantinides, Cormac Herley:
Occam filters for stochastic sources with application to digital images. IEEE Trans. Signal Process. 46(5): 1434-1438 (1998) - [j9]Balas K. Natarajan, Konstantinos Konstantinides, Cormac Herley:
Correction To "occam Filters For Stochastic Sources With Application To Digital Images". IEEE Trans. Signal Process. 46(6): 1777 (1998) - [c19]Poorvi L. Vora, Cormac Herley:
Trade-offs between Color Saturation and Noise Sensitivity in Image Sensors. ICIP (1) 1998: 196-200 - [c18]Cormac Herley:
A Post-Processing Algorithm for Compressed Digital Camera Images. ICIP (1) 1998: 396-400 - 1997
- [j8]Cormac Herley, Zixiang Xiong, Kannan Ramchandran, Michael T. Orchard:
Joint space-frequency segmentation using balanced wavelet packet trees for least-cost image representation. IEEE Trans. Image Process. 6(9): 1213-1230 (1997) - [j7]Zixiang Xiong, Kannan Ramchandran, Cormac Herley, Michael T. Orchard:
Flexible tree-structured signal expansions using time-varying wavelet packets. IEEE Trans. Signal Process. 45(2): 333-345 (1997) - [c17]Ping Wah Wong, Daniel Tretter, Cormac Herley, Nader Moayeri, Ruby B. Lee:
Image processing considerations for digital photography. COMPCON 1997: 280-285 - [c16]Cormac Herley:
Reconstruction for novel sampling structures. ICASSP 1997: 2433-2436 - [c15]Ping Wah Wong, Cormac Herley:
Area-Based Interpolation For Scaling of Images From a CCD. ICIP (1) 1997: 905-908 - 1996
- [j6]Kannan Ramchandran, Martin Vetterli, Cormac Herley:
Wavelets, subband coding, and best bases. Proc. IEEE 84(4): 541-560 (1996) - [c14]Ping Wah Wong, Nader Moayeri, Cormac Herley:
Optimum Pre- and Post Filters for Robust Scalar Quantization. Data Compression Conference 1996: 240-249 - [c13]Cormac Herley, Ping Wah Wong:
Minimum rate sampling of signals with arbitrary frequency support. ICIP (2) 1996: 85-88 - [c12]Balas K. Natarajan, Konstantinos Konstantinides, Cormac Herley:
Occam filters for stochastic sources with application to digital images. ICIP (1) 1996: 399-402 - 1995
- [j5]Cormac Herley:
Exact interpolation and iterative subdivision schemes. IEEE Trans. Signal Process. 43(6): 1348-1359 (1995) - [c11]Brian Foster, Cormac Herley:
Exact reconstruction from periodic nonuniform samples. ICASSP 1995: 1452-1455 - [c10]Cormac Herley, Zixiang Xiong, Kannan Ramchandran, Michael T. Orchard:
An efficient algorithm to find a jointly optimal time-frequency segmentation using time-varying filter banks. ICASSP 1995: 1516-1519 - [c9]Zixiang Xiong, Cormac Herley, Kannan Ramchandran, Michael T. Orchard:
Space-frequency quantization for a space-varying wavelet packet image coder. ICIP 1995: 614-617 - 1994
- [j4]Cormac Herley, Martin Vetterli:
Orthogonal time-varying filter banks and wavelet packets. IEEE Trans. Signal Process. 42(10): 2650-2663 (1994) - [c8]Cormac Herley, Nguyen T. Thao:
Implementable orthogonal signal projections based on multirate filters. ICASSP (3) 1994: 161-164 - [c7]Cormac Herley:
Multirate Operations for Exact Interpolation and Iterative Subdivision Schemes. ISCAS 1994: 169-172 - [c6]Cormac Herley:
Boundary Filters for Finite-Length Signals and Time-Varying Filter Banks. ISCAS 1994: 637-640 - 1993
- [j3]Cormac Herley, Martin Vetterli:
Wavelets and recursive filter banks. IEEE Trans. Signal Process. 41(8): 2536-2556 (1993) - [j2]Cormac Herley, Jelena Kovacevic, Kannan Ramchandran, Martin Vetterli:
Tilings of the time-frequency plane: construction of arbitrary orthogonal bases and fast tiling algorithms. IEEE Trans. Signal Process. 41(12): 3341-3359 (1993) - [c5]Cormac Herley, Jelena Kovacevic, Kannan Ramchandran, Martin Vetterli:
Time-varying orthonormal tilings of the time-frequency plane. ICASSP (3) 1993: 205-208 - [c4]Cormac Herley, Martin Vetterli:
Orthogonal time-varying filter banks and wavelets. ISCAS 1993: 391-394 - 1992
- [j1]Martin Vetterli, Cormac Herley:
Wavelets and filter banks: theory and design. IEEE Trans. Signal Process. 40(9): 2207-2232 (1992) - [c3]Cormac Herley, Martin Vetterli:
Wavelets generated by IIR filter banks. ICASSP 1992: 601-604 - 1991
- [c2]Cormac Herley, Martin Vetterli:
Linear phase wavelets: theory and design. ICASSP 1991: 2017-2020 - 1990
- [c1]Martin Vetterli, Cormac Herley:
Wavelets and filter banks: relationships and new results. ICASSP 1990: 1723-1726
Coauthor Index
aka: Dinei Florêncio
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint