default search action
John V. Monaco
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j6]Alejandro Acien, Aythami Morales, John V. Monaco, Rubén Vera-Rodríguez, Julian Fiérrez:
TypeNet: Deep Learning Keystroke Biometrics. IEEE Trans. Biom. Behav. Identity Sci. 4(1): 57-70 (2022) - 2018
- [j5]John V. Monaco, Charles C. Tappert:
The partially observable hidden Markov model and its application to keystroke dynamics. Pattern Recognit. 76: 449-462 (2018) - [j4]John V. Monaco, Manuel M. Vindiola:
Factoring Integers With a Brain-Inspired Computer. IEEE Trans. Circuits Syst. I Regul. Pap. 65-I(3): 1051-1062 (2018) - 2017
- [j3]Jenny S. Li, Li-Chiou Chen, John V. Monaco, Pranjal Singh, Charles C. Tappert:
A comparison of classifiers and features for authorship authentication of social networking messages. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j2]Md Liakat Ali, John V. Monaco, Charles C. Tappert, Meikang Qiu:
Keystroke Biometric Systems for User Authentication. J. Signal Process. Syst. 86(2-3): 175-190 (2017) - 2015
- [j1]Jonathan Leet, John Gibbons, Charles C. Tappert, Vinnie Monaco:
Using a predefined passphrase to evaluate a speaker verification system. Artif. Intell. Res. 4(1): 1-11 (2015)
Conference and Workshop Papers
- 2022
- [c29]John V. Monaco:
Device Fingerprinting with Peripheral Timestamps. SP 2022: 1018-1033 - 2021
- [c28]Jihye Kim, John V. Monaco:
User Identification in Dynamic Web Traffic via Deep Temporal Features. SP (Workshops) 2021: 282-290 - 2020
- [c27]John V. Monaco:
Bug or Feature? Covert Impairments to Human Computer Interaction. CHI 2020: 1-15 - [c26]Aythami Morales, Alejandro Acien, Julian Fiérrez, John V. Monaco, Ruben Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia:
Keystroke Biometrics in Response to Fake News Propagation in a Global Pandemic. COMPSAC 2020: 1604-1609 - [c25]Alejandro Acien, Aythami Morales, Rubén Vera-Rodríguez, Julian Fiérrez, John V. Monaco:
TypeNet: Scaling up Keystroke Biometrics. IJCB 2020: 1-7 - [c24]John V. Monaco, Ryad Benosman:
General Purpose Computation with Spiking Neural Networks: Programming, Design Principles, and Patterns. NICE 2020: 24:1-24:9 - [c23]Brett Rajchel, John V. Monaco, Gurminder Singh, Angela Hu, Jarrod Shingleton, Thomas Anderson:
Temporal Behavior in Network Traffic as a Basis for Insider Threat Detection. SSCI 2020: 1427-1434 - 2019
- [c22]John V. Monaco:
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete. IEEE Symposium on Security and Privacy Workshops 2019: 212-217 - [c21]John V. Monaco:
What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete. USENIX Security Symposium 2019: 959-976 - 2018
- [c20]Kevin Corder, John V. Monaco, Manuel M. Vindiola:
Solving Vertex Cover via Ising Model on a Neuromorphic Processor. ISCAS 2018: 1-5 - [c19]John V. Monaco:
SoK: Keylogging Side Channels. IEEE Symposium on Security and Privacy 2018: 211-228 - 2017
- [c18]Bryan P. Dawson, Jamie K. Infantolino, Manuel M. Vindiola, John V. Monaco:
Tightly integrated deep learning and symbolic programming on a single neuromorphic chip. ISCAS 2017: 1-4 - [c17]John V. Monaco, Manuel M. Vindiola:
Integer factorization with a neuromorphic sieve. ISCAS 2017: 1-4 - [c16]Md Liakat Ali, John V. Monaco, Charles C. Tappert:
Biometric studies with hidden Markov model and its extension on short fixed-text input. UEMCON 2017: 258-264 - 2016
- [c15]Michael J. Coakley, John V. Monaco, Charles C. Tappert:
Keystroke biometric studies with short numeric input on smartphones. BTAS 2016: 1-6 - [c14]John V. Monaco, Manuel M. Vindiola:
Crossing domains with the inductive transfer encoder: Case study in keystroke biometrics. BTAS 2016: 1-8 - [c13]Aythami Morales, Julian Fiérrez, Marta Gomez-Barrero, Javier Ortega-Garcia, Roberto Daza, John V. Monaco, Jugurta Montalvão, Jânio Coutinho Canuto, Anjith George:
KBOC: Keystroke biometrics OnGoing competition. BTAS 2016: 1-6 - 2015
- [c12]John V. Monaco, Md Liakat Ali, Charles C. Tappert:
Spoofing key-press latencies with a generative keystroke dynamics model. BTAS 2015: 1-8 - [c11]Md Liakat Ali, Kutub Thakur, John V. Monaco, Meikang Qiu:
An Approach to Minimize Crossings in Phylogenetic Trees. CSCloud 2015: 42-47 - [c10]Md Liakat Ali, Charles C. Tappert, Meikang Qiu, John V. Monaco:
Authentication and Identification Methods Used in Keystroke Biometric Systems. HPCC/CSS/ICESS 2015: 1424-1429 - [c9]John V. Monaco, Gonzalo Perez, Charles C. Tappert, Patrick Bours, Soumik Mondal, Sudalai Rajkumar, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia:
One-handed Keystroke Biometric Identification Competition. ICB 2015: 58-64 - 2014
- [c8]John V. Monaco:
Classification and authentication of one-dimensional behavioral biometrics. IJCB 2014: 1-8 - [c7]Jenny S. Li, John V. Monaco, Li-Chiou Chen, Charles C. Tappert:
Authorship Authentication Using Short Messages from Social Networking Sites. ICEBE 2014: 314-319 - [c6]Steve Kim, Sung-Hyuk Cha, John V. Monaco, Charles C. Tappert:
A correlation method for handling infrequent data in keystroke biometric systems. IWBF 2014: 1-6 - 2013
- [c5]John V. Monaco, John C. Stewart, Sung-Hyuk Cha, Charles C. Tappert:
Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works. BTAS 2013: 1-8 - [c4]John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert:
Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input. EISIC 2013: 60-66 - [c3]Ned Bakelman, John V. Monaco, Sung-Hyuk Cha, Charles C. Tappert:
Keystroke Biometric Studies on Password and Numeric Keypad Input. EISIC 2013: 204-207 - 2012
- [c2]John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert:
Developing a Keystroke Biometric System for Continual Authentication of Computer Users. EISIC 2012: 210-216 - 2011
- [c1]John C. Stewart, John V. Monaco, Sung-Hyuk Cha, Charles C. Tappert:
An investigation of keystroke and stylometry traits for authenticating online test takers. IJCB 2011: 1-7
Informal and Other Publications
- 2021
- [i8]Alejandro Acien, Aythami Morales, John V. Monaco, Rubén Vera-Rodríguez, Julian Fiérrez:
TypeNet: Deep Learning Keystroke Biometrics. CoRR abs/2101.05570 (2021) - 2020
- [i7]Alejandro Acien, John V. Monaco, Aythami Morales, Rubén Vera-Rodríguez, Julian Fiérrez:
TypeNet: Scaling up Keystroke Biometrics. CoRR abs/2004.03627 (2020) - [i6]Aythami Morales, Alejandro Acien, Julian Fiérrez, John V. Monaco, Ruben Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia:
Keystroke Biometrics in Response to Fake News Propagation in a Global Pandemic. CoRR abs/2005.07688 (2020) - 2017
- [i5]John V. Monaco, Malka Gorfine, Li Hsu:
General Semiparametric Shared Frailty Model Estimation and Simulation with frailtySurv. CoRR abs/1702.06407 (2017) - [i4]John V. Monaco, Manuel M. Vindiola:
Integer Factorization with a Neuromorphic Sieve. CoRR abs/1703.03768 (2017) - 2016
- [i3]John V. Monaco:
Robust Keystroke Biometric Anomaly Detection. CoRR abs/1606.09075 (2016) - [i2]John V. Monaco, Charles C. Tappert:
The Partially Observable Hidden Markov Model with Application to Keystroke Biometrics. CoRR abs/1607.03854 (2016) - [i1]John V. Monaco, Charles C. Tappert:
Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation. CoRR abs/1609.07612 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint