Monrose

Results: 68



#Item
1Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose, The University of North Carolina at Chapel Hill https://www.usenix

Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose, The University of North Carolina at Chapel Hill https://www.usenix

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-08-10 04:01:14
    2DNS Prefetching and Its Privacy Implications: When Good Things Go Bad Srinivas Krishnan and Fabian Monrose Department of Computer Science University of North Carolina at Chapel Hill,

    DNS Prefetching and Its Privacy Implications: When Good Things Go Bad Srinivas Krishnan and Fabian Monrose Department of Computer Science University of North Carolina at Chapel Hill,

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2010-04-07 09:48:08
      3A Multifaceted Approach to Understanding the Botnet Phenomenon Moheeb Abu Rajab Jay Zarfoss Fabian Monrose Computer Science Department

      A Multifaceted Approach to Understanding the Botnet Phenomenon Moheeb Abu Rajab Jay Zarfoss Fabian Monrose Computer Science Department

      Add to Reading List

      Source URL: conferences.sigcomm.org

      - Date: 2006-09-19 17:40:17
        4Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY.,

        Keystroke Dynamics as a Biometric for Authentication Fabian Monrose Courant Institute of Mathematical Sciences, New York University, New York, NY.,

        Add to Reading List

        Source URL: avirubin.com

        Language: English - Date: 2012-11-01 14:27:11
          5The Challenges of Effectively Anonymizing Network Data Scott E. Coull∗ ∗ Fabian Monrose†

          The Challenges of Effectively Anonymizing Network Data Scott E. Coull∗ ∗ Fabian Monrose†

          Add to Reading List

          Source URL: www.scottcoull.com

          Language: English - Date: 2014-03-03 12:03:03
            6iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm  Department of Computer Science, University of North Ca

            iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm Department of Computer Science, University of North Ca

            Add to Reading List

            Source URL: cs.unc.edu

            Language: English - Date: 2011-11-03 14:17:56
              7Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Charles V. Wright Lucas Ballard Scott E. Coull Fabian Monrose Gerald M. Masson Johns Hopkins University Department of Computer Science Baltimo

              Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations Charles V. Wright Lucas Ballard Scott E. Coull Fabian Monrose Gerald M. Masson Johns Hopkins University Department of Computer Science Baltimo

              Add to Reading List

              Source URL: www.cs.jhu.edu

              Language: English - Date: 2008-06-18 14:35:16
                8iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm  Department of Computer Science, University of North Ca

                iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm Department of Computer Science, University of North Ca

                Add to Reading List

                Source URL: cs.unc.edu

                Language: English - Date: 2011-08-30 21:32:09
                  9Clear and Present Data: Opaque Traffic and its Security Implications for the Future Andrew M. White∗ , Srinivas Krishnan∗ , Michael Bailey† , Fabian Monrose∗ , Phillip Porras‡ ∗ University of North Carolina a

                  Clear and Present Data: Opaque Traffic and its Security Implications for the Future Andrew M. White∗ , Srinivas Krishnan∗ , Michael Bailey† , Fabian Monrose∗ , Phillip Porras‡ ∗ University of North Carolina a

                  Add to Reading List

                  Source URL: cs.unc.edu

                  Language: English - Date: 2013-01-05 12:45:46