Follow
Michael Collins
Michael Collins
Senior Computer Scientist, USC ISI
Verified email at isi.edu
Title
Cited by
Cited by
Year
Testing metrics for password creation policies by attacking large sets of revealed passwords
M Weir, S Aggarwal, M Collins, H Stern
Proceedings of the 17th ACM conference on Computer and communications …, 2010
5492010
Using uncleanliness to predict future botnet addresses
MP Collins, TJ Shimeall, S Faber, J Janies, R Weaver, M De Shon, ...
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 93-104, 2007
1892007
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1622007
Hit-list worm detection and bot identification in large networks using protocol graphs
MP Collins, MK Reiter
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
1172007
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
1112007
More Netflow Tools for Performance and Security.
C Gates, MP Collins, M Duggan, A Kompanek, M Thomas
LISA 4, 121-132, 2004
992004
Finding peer-to-peer file-sharing using coarse network behaviors
MP Collins, MK Reiter
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
802006
PSI: Precise Security Instrumentation for Enterprise Networks.
T Yu, SK Fayaz, MP Collins, V Sekar, S Seshan
NDSS, 2017
692017
Network security through data analysis: building situational awareness
MS Collins, M Collins
" O'Reilly Media, Inc.", 2014
562014
An empirical analysis of target-resident DoS filters
M Collins, M Reiter
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 103-114, 2004
512004
Fishing for phishes: Applying capture-recapture methods to estimate phishing populations
R Weaver, MP Collins
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
412007
Network security through data analysis: From data to action
M Collins
" O'Reilly Media, Inc.", 2017
272017
A Model for Opportunistic Network Exploits: The Case of P2P Worms.
MP Collins, C Gates, G Kataria
WEIS, 2006
222006
On the limits of payload-oblivious network attack detection
MP Collins, MK Reiter
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
182008
A cost-based mechanism for evaluating the effectiveness of moving target defenses
MP Collins
International Conference on Decision and Game Theory for Security, 221-233, 2012
72012
A protocol graph based anomaly detection system
M Collins
Carnegie Mellon University, 2008
52008
Threat hunting: A guide to proactive network defense
MP Collins
O'Reilly Media, 2018
42018
Payoff Based IDS Evaluation.
M Collins, LLC RedJack
CSET, 2009
42009
Towards an operations-aware experimentation methodology
M Collins, A Hussain, S Schwab
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
32022
Graph-based analysis in network security
MP Collins
2011-MILCOM 2011 Military Communications Conference, 1333-1337, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20