Följ
Michael Collins
Michael Collins
Senior Computer Scientist, USC ISI
Verifierad e-postadress på isi.edu
Titel
Citeras av
Citeras av
År
Testing metrics for password creation policies by attacking large sets of revealed passwords
M Weir, S Aggarwal, M Collins, H Stern
Proceedings of the 17th ACM conference on Computer and communications …, 2010
5472010
Using uncleanliness to predict future botnet addresses
MP Collins, TJ Shimeall, S Faber, J Janies, R Weaver, M De Shon, ...
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 93-104, 2007
1892007
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1612007
Hit-list worm detection and bot identification in large networks using protocol graphs
MP Collins, MK Reiter
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
1172007
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
1112007
More Netflow Tools for Performance and Security.
C Gates, MP Collins, M Duggan, A Kompanek, M Thomas
LISA 4, 121-132, 2004
992004
Finding peer-to-peer file-sharing using coarse network behaviors
MP Collins, MK Reiter
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
802006
PSI: Precise Security Instrumentation for Enterprise Networks.
T Yu, SK Fayaz, MP Collins, V Sekar, S Seshan
NDSS, 2017
692017
Network security through data analysis: building situational awareness
MS Collins, M Collins
" O'Reilly Media, Inc.", 2014
562014
An empirical analysis of target-resident DoS filters
M Collins, M Reiter
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 103-114, 2004
512004
Fishing for phishes: Applying capture-recapture methods to estimate phishing populations
R Weaver, MP Collins
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
412007
Network security through data analysis: From data to action
M Collins
" O'Reilly Media, Inc.", 2017
262017
A Model for Opportunistic Network Exploits: The Case of P2P Worms.
MP Collins, C Gates, G Kataria
WEIS, 2006
222006
On the limits of payload-oblivious network attack detection
MP Collins, MK Reiter
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
182008
A cost-based mechanism for evaluating the effectiveness of moving target defenses
MP Collins
International Conference on Decision and Game Theory for Security, 221-233, 2012
72012
A protocol graph based anomaly detection system
M Collins
Carnegie Mellon University, 2008
52008
Threat hunting: A guide to proactive network defense
MP Collins
O'Reilly Media, 2018
42018
Payoff Based IDS Evaluation.
M Collins, LLC RedJack
CSET, 2009
42009
Towards an operations-aware experimentation methodology
M Collins, A Hussain, S Schwab
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
32022
Graph-based analysis in network security
MP Collins
2011-MILCOM 2011 Military Communications Conference, 1333-1337, 2011
32011
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20