forked from ericwhyne/darpa_open_catalog
-
Notifications
You must be signed in to change notification settings - Fork 0
/
AA-pubs.json
352 lines (352 loc) · 11.7 KB
/
AA-pubs.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
[
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"Bait and Snitch: Defending Computer Systems with Decoys",
"Link":"http://ids.cs.columbia.edu/sites/default/files/ssi.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"Decoy Document Deployment for Effective Masquerade Attack Detection",
"Link":"http://ids.cs.columbia.edu/sites/default/files/Dimva_2011_final.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud",
"Link":"http://ids.cs.columbia.edu/sites/default/files/Fog_Computing_Position_Paper_WRIT_2012.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"Lost in Translation: Improving Decoy Documents via Automated Translation",
"Link":"http://ids.cs.columbia.edu/sites/default/files/writ_12_0.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"Measuring the Human Factor of Cyber Security",
"Link":"http://ids.cs.columbia.edu/sites/default/files/metrics_hst.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"Modeling User Search Behavior for Masquerade Detection",
"Link":"http://ids.cs.columbia.edu/sites/default/files/RAID_2011_0.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"On the Design and Execution of Cyber-Security User Studies: Methodology",
"Link":"http://academiccommons.columbia.edu/catalog/ac%3A142661",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"Software Decoys for Insider Threat",
"Link":"http://ids.cs.columbia.edu/sites/default/files/softwaredecoy_0.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Allure Security Technology, Inc."
],
"Title":"System level user behavior biometrics using Fisher features and Gaussian mixture models",
"Link":"http://www.ieee-security.org/TC/SPW2013/papers/data/5017a052.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"BAE Systems (developed for our AA phase I proposal)"
],
"Title":"Keystroke dynamics for user authentication",
"Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6239225&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6239225",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"BAE Systems (developed for our AA phase II proposal)"
],
"Title":"Mobile Device Based Gait Biometrics",
"Link":"Not Yet Published",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"BAE Systems (funded by DARPA MUTE)"
],
"Title":"Speech recognition for vocalized and subvocal modes of production using surface EMG signals from the neck and face.",
"Link":"http://www.bu.edu/nmrc/files/2011/01/c_010.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"BAE Systems (funded by DARPA VIRAT)"
],
"Title":"Action recognition in spatiotemporal volume",
"Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5543836&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5543836",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"BAE Systems (used in DARPA URGENT)"
],
"Title":"Intrinsic shape signatures: A shape descriptor for 3d object recognition",
"Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5457637&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5457637",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"BehavioSec"
],
"Title":"Behavioral Biometrics for DARPA's active authentication program",
"Link":"http://www.rsaconference.com/writable/presentations/file_upload/sec-t05_final.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"BehavioSec"
],
"Title":"Continuous Authentication Using Behavioral Biometrics",
"Link":"http://www.computer.org/csdl/mags/it/2013/04/mit2013040012-abs.html",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Coveros, Inc."
],
"Title":"Active Authentication Using System Event Monitoring",
"Link":"Not Yet Published",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Drexel"
],
"Title":"A Dataset for Active Linguistic Authentication",
"Link":"http://www.springer.com/computer/security+and+cryptology/book/978-3-642-41147-2",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Drexel"
],
"Title":"Active Linguistic Authentication Revisited: Real-Time Stylometric Evaluation towards Multi-Modal Decision Fusion",
"Link":"http://www.stolerman.net/papers/active_auth_ifip-wg11.9-2014.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Drexel"
],
"Title":"Classify but Verify: Breaking the Closed-World Assumption in Stylometric Authorship Attribution",
"Link":"http://www.stolerman.net/papers/classify_verify_ifip-wg11.9-2014.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Drexel"
],
"Title":"Decision Fusion for Multi-Modal Active Authentication",
"Link":"http://www.computer.org/csdl/mags/it/2013/04/mit2013040029-abs.html",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Drexel"
],
"Title":"Keyboard Behavior Based Authentication for Security",
"Link":"http://www.computer.org/csdl/mags/it/2013/04/mit2013040008-abs.html",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Drexel"
],
"Title":"User authentication through biometric sensors and decision fusion",
"Link":"http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6552271",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Iowa State University"
],
"Title":"Capturing Cognitive Fingerprints from Keystroke Dynamics for Active Authentication",
"Link":"http://www.computer.org/csdl/mags/it/2013/04/mit2013040024-abs.html",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Louisiana Tech University"
],
"Title":"Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings",
"Link":"http://dl.acm.org/citation.cfm?id=2516960",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Louisiana Tech University"
],
"Title":"When Kids' Toys Breach Mobile Phone Security",
"Link":"http://dl.acm.org/citation.cfm?id=2508859.2516659",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Louisiana Tech University"
],
"Title":"Which Verifiers Work?: A Benchmark Evaluation of Touch based Authentication Algorithms",
"Link":"http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6712758&url=http%3A%2F%2Fieeexplore.ieee.org%2Fstamp%2Fstamp.jsp%3Ftp%3D%26arnumber%3D6712758",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Naval Research Laboratory"
],
"Title":"User Authentication from Web Browsing Behavior",
"Link":"http://cryptome.org/2013/09/user-auth-browser.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"New York Institute of Technology"
],
"Title":"On Controlling Genuine Reject Rate in Multistage Biometric Verification",
"Link":"http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6595874",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"New York Institute of Technology"
],
"Title":"Scan-based Evaluation for Continuous Keystroke Authentication Systems",
"Link":"http://www.computer.org/csdl/mags/it/2013/04/mit2013040020-abs.html",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"New York Institute of Technology"
],
"Title":"Snoop-forge-replay Attacks on Continuous Verification with Keystrokes",
"Link":"http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6425469&tag=1",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"Southwest Research Institute"
],
"Title":"The Role of Covert Cognitive Games and Associated User Response Patterns in Active Authentication",
"Link":"http://www.computer.org/csdl/mags/it/2013/04/mit2013040016-abs.html",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"SRI International"
],
"Title":"Recent Developments in Voice Biometrics: Robustness and High Accuracy",
"Link":"http://www.sri.com/sites/default/files/publications/tech_homeland_security_2013_n_scheffer_paper.pdf",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"University of Maryland"
],
"Title":"Screen Fingerprints: a Novel Modality for Active Authentication",
"Link":"http://www.computer.org/csdl/mags/it/2013/04/mit2013040038-abs.html",
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"AA",
"Program Teams":[
"University of Maryland"
],
"Title":"Screen-based Active User Authentication",
"Link":"http://www.sciencedirect.com/science/article/pii/S0167865514000488",
"New Date":"",
"Update Date":""
}
]