His primary areas of investigation include Computer security, Encryption, Password, Password strength and S/KEY. Fabian Monrose has researched Computer security in several fields, including The Internet and World Wide Web. The study incorporates disciplines such as Exploit kit and Code reuse in addition to The Internet.
While the research belongs to areas of Encryption, Fabian Monrose spends his time largely on the problem of Network packet, intersecting his research to questions surrounding Network security, Voice over IP, Identification and Traffic generation model. In his research on the topic of One-time password, Operating system and Input device is strongly related with Human–computer interaction. In his study, which falls under the umbrella issue of Authentication, Internet privacy is strongly linked to Biometrics.
Fabian Monrose mainly investigates Computer security, Encryption, Exploit, The Internet and Network security. His work in Computer security is not limited to one particular discipline; it also encompasses Internet privacy. His Encryption research is multidisciplinary, incorporating elements of Hidden Markov model, Keystroke dynamics and Network packet.
His study focuses on the intersection of Network packet and fields such as Voice over IP with connections in the field of Speech recognition. His The Internet research is multidisciplinary, incorporating perspectives in Code reuse and Cache. In his work, Machine learning and Artificial intelligence is strongly intertwined with Key, which is a subfield of Password.
Fabian Monrose mainly focuses on Computer security, Code reuse, Exploit, Code and Artificial intelligence. His studies in Computer security integrate themes in fields like Overhead, Compiler and Hypervisor. His Code reuse research is multidisciplinary, incorporating elements of Return-oriented programming, Byte, Address space layout randomization and Gadget.
His Exploit research is multidisciplinary, relying on both Adversary, The Internet, Enterprise information security architecture and Backward compatibility. In his study, Inference and Keystroke logging is inextricably linked to Machine learning, which falls within the broad field of Artificial intelligence. His Encryption research incorporates elements of Password and Cloud computing.
The scientist’s investigation covers issues in Computer security, Exploit, Adversary, Authentication and Network security. His Computer security study incorporates themes from Software, Computer network and Scalability. Fabian Monrose combines subjects such as Correctness, Computer hardware, Central processing unit and Microarchitecture with his study of Exploit.
His research in Adversary intersects with topics in Backward compatibility, The Internet and Enterprise information security architecture. His research integrates issues of Password and Encryption in his study of Authentication. His work carried out in the field of Network security brings together such families of science as Unsupervised learning, Clustering coefficient, Cluster analysis and Feature vector.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The design and analysis of graphical passwords
Ian Jermyn;Alain Mayer;Fabian Monrose;Michael K. Reiter.
usenix security symposium (1999)
Keystroke dynamics as a biometric for authentication
Fabian Monrose;Aviel D. Rubin.
Future Generation Computer Systems (2000)
A multifaceted approach to understanding the botnet phenomenon
Moheeb Abu Rajab;Jay Zarfoss;Fabian Monrose;Andreas Terzis.
internet measurement conference (2006)
Password hardening based on keystroke dynamics
Fabian Monrose;Michael K. Reiter;Susanne Wetzel.
International Journal of Information Security (2002)
All your iFRAMEs point to Us
Niels Provos;Panayiotis Mavrommatis;Moheeb Abu Rajab;Fabian Monrose.
usenix security symposium (2008)
Authentication via keystroke dynamics
Fabian Monrose;Aviel Rubin.
computer and communications security (1997)
On user choice in graphical password schemes
Darren Davis;Fabian Monrose;Michael K. Reiter.
usenix security symposium (2004)
Cryptographic key generation from voice
F. Monrose;M.K. Reiter;Qi Li;S. Wetzel.
ieee symposium on security and privacy (2001)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
K. Z. Snow;F. Monrose;L. Davi;A. Dmitrienko.
ieee symposium on security and privacy (2013)
Achieving efficient conjunctive keyword searches over encrypted data
Lucas Ballard;Seny Kamara;Fabian Monrose.
international conference on information and communication security (2005)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: