Roy Maxion
#182,891
Most Influential Person Now
American computer scientist
Roy Maxion's AcademicInfluence.com Rankings
Roy Maxioncomputer-science Degrees
Computer Science
#11644
World Rank
#12364
Historical Rank
Database
#9035
World Rank
#9499
Historical Rank

Download Badge
Computer Science
Roy Maxion's Degrees
- PhD Computer Science Carnegie Mellon University
- Masters Computer Science Carnegie Mellon University
- Bachelors Computer Science Carnegie Mellon University
Similar Degrees You Can Earn
Why Is Roy Maxion Influential?
(Suggest an Edit or Addition)According to Wikipedia, Roy A. Maxion is a research professor at School of Computer Science of Carnegie Mellon University. His research interests include biometrics, keystroke dynamics, and software reliability. His h-index is 30.
Roy Maxion's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Comparing anomaly-detection algorithms for keystroke dynamics (2009) (488)
- Generalized feature extraction for structural pattern recognition in time-series data (2001) (262)
- Masquerade detection using truncated command lines (2002) (252)
- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits (2002) (249)
- "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector (2002) (172)
- User Authentication Through Mouse Dynamics (2013) (144)
- Masquerade detection using enriched command lines (2003) (135)
- Markov chains, classifiers, and intrusion detection (2001) (132)
- Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication (2018) (121)
- Fault detection in an Ethernet network using anomaly signature matching (1993) (118)
- Benchmarking anomaly-based detection systems (2000) (118)
- A case study of Ethernet anomalies in a distributed computing environment (1990) (118)
- Improving user-interface dependability through mitigation of human error (2005) (116)
- Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates (2010) (112)
- Anomaly Detection in Embedded Systems (2002) (91)
- Keystroke biometrics with number-pad input (2010) (89)
- A defense-centric taxonomy based on attack manifestations (2004) (87)
- Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication (2016) (79)
- Masquerade detection augmented with error analysis (2004) (66)
- The Effect of Clock Resolution on Keystroke Dynamics (2008) (65)
- An Approach to Measuring a System's Attack Surface (2007) (65)
- Determining the operational limits of an anomaly-based intrusion detector (2003) (65)
- Proper Use of ROC Curves in Intrusion/Anomaly Detection (2004) (58)
- Anomaly detection for diagnosis (1990) (54)
- A scientific understanding of keystroke dynamics (2012) (43)
- Improving software robustness with dependability cases (1998) (40)
- Eliminating Exception Handling Errors with Dependability Cases: A Comparative, Empirical Study (2000) (39)
- Free vs. transcribed text for keystroke-dynamics evaluations (2012) (36)
- Making Experiments Dependable (2011) (34)
- Performance evaluation of anomaly-detection algorithms for mouse dynamics (2014) (33)
- Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System (2020) (30)
- User interface dependability through goal-error prevention (2005) (29)
- Toward diagnosis as an emergent behavior in a network ecosystem (1990) (25)
- Should Security Researchers Experiment More and Draw More Inferences? (2011) (24)
- Why is there no science in cyber science?: a panel discussion at NSPW 2010 (2010) (23)
- User Interface Defect Detection by Hesitation Analysis (2006) (22)
- Comparing Methods for Multivariate Nonparametric Regression (2003) (18)
- Detection and discrimination of injected network faults (1993) (16)
- Comparing classification algorithm for mouse dynamics based user identification (2012) (15)
- The effects of algorithmic diversity on anomaly detector performance (2005) (15)
- MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System (2016) (14)
- Techniques and Architectures for Fault-Tolerant Computing (1987) (14)
- Towards Independent Stress Detection: A Dependent Model Using Facial Action Units (2018) (13)
- Toward Realistic and Artifact-Free Insider-Threat Data (2007) (12)
- Use of diversity as a defense mechanism (2005) (12)
- Dependability at the user interface (1995) (11)
- Visual Programming and Hypermedia Implementation within a Distributed Laboratory Environment (1995) (9)
- Investigating a Possible Flaw in a Masquerade Detection System (2004) (8)
- Toward Fault-Tolerant User Interfaces (1986) (7)
- Unanticipated behavior as a cue for system-level diagnosis (1989) (6)
- Distinction of stress and non-stress tasks using facial action units (2018) (5)
- Artificial Neural Network Based Detection and Diagnosis of Plasma-Etch Faults (1997) (4)
- Mitigating operator-induced unavailability by matching imprecise queries (1996) (4)
- Methodological Foundations: Enabling the Next Generation of Security (2005) (4)
- Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure (2008) (4)
- User Discrimination through Structured Writing on PDAs (2007) (4)
- Application of HAZOP to the Design of Cyber Security Experiments (2016) (4)
- Designing and evaluating usable security and privacy technology (2009) (4)
- Experimental Methods for Computer Science Research (2009) (3)
- Learning from a Flaw in a Naive-Bayes Masquerade Detector (3)
- Real-world IP and network tracking measurement study of malicious websites with HAZOP (2017) (3)
- On User Interaction Behavior as Evidence for Computer Forensic Analysis (2013) (3)
- This Is Your Behavioral Keystroke Biometric on Rubbish Data (2020) (2)
- Expert system design for symptom based diagnosis in local area networks (1989) (2)
- ARTIFICIAL INTELLIGENCE IN MAINTENANCE: SYNTHESIS OF TECHNICAL ISSUES (1985) (2)
- Clusters and Markers for Keystroke Typing Rhythms (2014) (2)
- MetriStation: a tool for user-interface fault detection (1997) (2)
- Anomaly Detector Performance Evaluation Using a Parameterized Environment (2006) (2)
- Performance Evaluation of Anomaly-Based Detection Mechanisms (2004) (2)
- Keynote: Detecting cognitive state for operators of cyber-physical systems: Design of experiments (2013) (1)
- Error Analysis of a Security-Oriented User Interface (2004) (1)
- Experimental research in dependable computing at Carnegie Mellon University - From Faults to Manifestations (2004) (1)
- Automated Discovery of Novel Anomalous Patterns (2014) (1)
- SymposiumonFault-Tolerarv aRs Rs S l Computing (1985) (0)
- Tyne Performance Evaluation of Anomaly-Based Detection Mechanisms (2004) (0)
- AD-A 258 634 DTIC ELECTE Human-Computer Interaction S DEC 1 5 1992113 in the School of Computer Science c D (0)
- Against Attacks and Faults: an Autonomic Approach to Secure and Reliable Data Management (2004) (0)
- Guest Editorial Special Section on Statistical Methods for Network Security and Forensics (2008) (0)
- Dependability in the Time of Forensics (2009) (0)
- Developing a Defense-Centric Attack Taxonomy (2005) (0)
- Profiler-2000: Attacking the Insider Threat (2005) (0)
- Reproducibility: Buy Low, Sell High (2020) (0)
- Deep Focus: Increasing User Depth of Field to Improve Threat Detection (Oxford Workshop Poster) (2014) (0)
- Principles and structures for fault-tolerant computer architectures (1988) (0)
- Making Experiments Dependable | 1. Science and Experimentation (0)
- A Study of the Consistency in Keystroke Dynamics (2013) (0)
- Fault prediction and dynamic error analysis in computer systems (1981) (0)
- The effect of socially evaluated multitasking stress on typing rhythms. (2023) (0)
- Practical implementation of the computer-based medical record in orthopaedic surgery. (1994) (0)
This paper list is powered by the following services:
Other Resources About Roy Maxion
What Schools Are Affiliated With Roy Maxion?
Roy Maxion is affiliated with the following schools: