His primary areas of investigation include Computer security, Encryption, Password, Password strength and S/KEY. Fabian Monrose has researched Computer security in several fields, including The Internet and World Wide Web. The study incorporates disciplines such as Exploit kit and Code reuse in addition to The Internet.
While the research belongs to areas of Encryption, Fabian Monrose spends his time largely on the problem of Network packet, intersecting his research to questions surrounding Network security, Voice over IP, Identification and Traffic generation model. In his research on the topic of One-time password, Operating system and Input device is strongly related with Human–computer interaction. In his study, which falls under the umbrella issue of Authentication, Internet privacy is strongly linked to Biometrics.
Fabian Monrose mainly investigates Computer security, Encryption, Exploit, The Internet and Network security. His work in Computer security is not limited to one particular discipline; it also encompasses Internet privacy. His Encryption research is multidisciplinary, incorporating elements of Hidden Markov model, Keystroke dynamics and Network packet.
His study focuses on the intersection of Network packet and fields such as Voice over IP with connections in the field of Speech recognition. His The Internet research is multidisciplinary, incorporating perspectives in Code reuse and Cache. In his work, Machine learning and Artificial intelligence is strongly intertwined with Key, which is a subfield of Password.
Fabian Monrose mainly focuses on Computer security, Code reuse, Exploit, Code and Artificial intelligence. His studies in Computer security integrate themes in fields like Overhead, Compiler and Hypervisor. His Code reuse research is multidisciplinary, incorporating elements of Return-oriented programming, Byte, Address space layout randomization and Gadget.
His Exploit research is multidisciplinary, relying on both Adversary, The Internet, Enterprise information security architecture and Backward compatibility. In his study, Inference and Keystroke logging is inextricably linked to Machine learning, which falls within the broad field of Artificial intelligence. His Encryption research incorporates elements of Password and Cloud computing.
The scientist’s investigation covers issues in Computer security, Exploit, Adversary, Authentication and Network security. His Computer security study incorporates themes from Software, Computer network and Scalability. Fabian Monrose combines subjects such as Correctness, Computer hardware, Central processing unit and Microarchitecture with his study of Exploit.
His research in Adversary intersects with topics in Backward compatibility, The Internet and Enterprise information security architecture. His research integrates issues of Password and Encryption in his study of Authentication. His work carried out in the field of Network security brings together such families of science as Unsupervised learning, Clustering coefficient, Cluster analysis and Feature vector.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The design and analysis of graphical passwords
Ian Jermyn;Alain Mayer;Fabian Monrose;Michael K. Reiter.
usenix security symposium (1999)
Keystroke dynamics as a biometric for authentication
Fabian Monrose;Aviel D. Rubin.
Future Generation Computer Systems (2000)
A multifaceted approach to understanding the botnet phenomenon
Moheeb Abu Rajab;Jay Zarfoss;Fabian Monrose;Andreas Terzis.
internet measurement conference (2006)
Password hardening based on keystroke dynamics
Fabian Monrose;Michael K. Reiter;Susanne Wetzel.
International Journal of Information Security (2002)
Authentication via keystroke dynamics
Fabian Monrose;Aviel Rubin.
computer and communications security (1997)
On user choice in graphical password schemes
Darren Davis;Fabian Monrose;Michael K. Reiter.
usenix security symposium (2004)
All your iFRAMEs point to Us
Niels Provos;Panayiotis Mavrommatis;Moheeb Abu Rajab;Fabian Monrose.
usenix security symposium (2008)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
K. Z. Snow;F. Monrose;L. Davi;A. Dmitrienko.
ieee symposium on security and privacy (2013)
Cryptographic key generation from voice
F. Monrose;M.K. Reiter;Qi Li;S. Wetzel.
ieee symposium on security and privacy (2001)
Password hardening based on keystroke dynamics
Fabian Monrose;Michael K. Reiter;Susanne Wetzel.
computer and communications security (1999)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Duke University
Stony Brook University
University of North Carolina at Chapel Hill
Google (United States)
Lacework
Johns Hopkins University
Lehigh University
University of Duisburg-Essen
Technical University of Darmstadt
Pennsylvania State University
General Electric (United States)
Paris Dauphine University
University of Lausanne
University of Bath
Collaborative Innovation Center of Chemistry for Energy Materials
American University of Ras Al Khaimah
University of Minnesota
Osaka University
Sandia National Laboratories
Colorado State University
KU Leuven
University of New Hampshire
Texas A&M University
Universidade de São Paulo
Montana State University
University of Wisconsin–Milwaukee