Michael Collins
Michael Collins
Senior Computer Scientist, USC ISI
Verified email at isi.edu
Title
Cited by
Cited by
Year
Testing metrics for password creation policies by attacking large sets of revealed passwords
M Weir, S Aggarwal, M Collins, H Stern
Proceedings of the 17th ACM conference on Computer and communications …, 2010
4712010
Using uncleanliness to predict future botnet addresses
MP Collins, TJ Shimeall, S Faber, J Janies, R Weaver, M De Shon, ...
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 93-104, 2007
1752007
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1522007
Hit-list worm detection and bot identification in large networks using protocol graphs
MP Collins, MK Reiter
International Workshop on Recent Advances in Intrusion Detection, 276-295, 2007
1062007
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
1022007
More Netflow Tools for Performance and Security.
C Gates, MP Collins, M Duggan, A Kompanek, M Thomas
LISA 4, 121-132, 2004
952004
Finding peer-to-peer file-sharing using coarse network behaviors
MP Collins, MK Reiter
European Symposium on Research in Computer Security, 1-17, 2006
792006
An empirical analysis of target-resident DoS filters
M Collins, M Reiter
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 103-114, 2004
512004
PSI: Precise Security Instrumentation for Enterprise Networks.
T Yu, SK Fayaz, MP Collins, V Sekar, S Seshan
NDSS, 2017
472017
Fishing for phishes: Applying capture-recapture methods to estimate phishing populations
R Weaver, MP Collins
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
402007
Network security through data analysis: building situational awareness
M Collins, MS Collins
" O'Reilly Media, Inc.", 2014
382014
A Model for Opportunistic Network Exploits: The Case of P2P Worms.
MP Collins, C Gates, G Kataria
WEIS, 2006
222006
Network Security Through Data Analysis: From Data to Action
M Collins
" O'Reilly Media, Inc.", 2017
162017
On the limits of payload-oblivious network attack detection
MP Collins, MK Reiter
International Workshop on Recent Advances in Intrusion Detection, 251-270, 2008
162008
A cost-based mechanism for evaluating the effectiveness of moving target defenses
MP Collins
International Conference on Decision and Game Theory for Security, 221-233, 2012
82012
A protocol graph based anomaly detection system
M Collins
Carnegie Mellon University, 2008
52008
Payoff Based IDS Evaluation.
M Collins, LLC RedJack
CSET, 2009
42009
Anomaly detection amidst constant anomalies: Training IDS on constantly attacked data
MP Collins, MK Reiter
Technical Report CMU-CYLAB-08–006, 2008
32008
Graph-based analysis in network security
MP Collins
2011-MILCOM 2011 Military Communications Conference, 1333-1337, 2011
22011
Chappie swarm: persona-driven web corpus generation
N Kaufman, M Collins, K Ladny, J Wiley, A Plattner, M Sanders, E Thaler, ...
9th Workshop on Cyber Security Experimentation and Test ({CSET} 16), 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20