Følg
Michael Collins
Michael Collins
Senior Computer Scientist, USC ISI
Verificeret mail på isi.edu
Titel
Citeret af
Citeret af
År
Testing metrics for password creation policies by attacking large sets of revealed passwords
M Weir, S Aggarwal, M Collins, H Stern
Proceedings of the 17th ACM conference on Computer and communications …, 2010
5712010
Using uncleanliness to predict future botnet addresses
MP Collins, TJ Shimeall, S Faber, J Janies, R Weaver, M De Shon, ...
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 93-104, 2007
1862007
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
1612007
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
1132007
Hit-list worm detection and bot identification in large networks using protocol graphs
MP Collins, MK Reiter
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
1132007
More Netflow Tools for Performance and Security.
C Gates, MP Collins, M Duggan, A Kompanek, M Thomas
LISA 4, 121-132, 2004
1012004
Finding peer-to-peer file-sharing using coarse network behaviors
MP Collins, MK Reiter
European Symposium on Research in Computer Security, 1-17, 2006
842006
PSI: Precise Security Instrumentation for Enterprise Networks.
T Yu, SK Fayaz, MP Collins, V Sekar, S Seshan
NDSS, 2017
752017
Network security through data analysis: building situational awareness
MS Collins, M Collins
" O'Reilly Media, Inc.", 2014
582014
An empirical analysis of target-resident DoS filters
M Collins, M Reiter
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 103-114, 2004
522004
Fishing for phishes: Applying capture-recapture methods to estimate phishing populations
R Weaver, MP Collins
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
432007
Network security through data analysis: From data to action
M Collins
" O'Reilly Media, Inc.", 2017
312017
A Model for Opportunistic Network Exploits: The Case of P2P Worms.
MP Collins, C Gates, G Kataria
WEIS, 2006
222006
On the limits of payload-oblivious network attack detection
MP Collins, MK Reiter
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
172008
A cost-based mechanism for evaluating the effectiveness of moving target defenses
MP Collins
International Conference on Decision and Game Theory for Security, 221-233, 2012
72012
Towards an operations-aware experimentation methodology
M Collins, A Hussain, S Schwab
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
62022
A protocol graph based anomaly detection system
M Collins
Carnegie Mellon University, 2008
52008
Threat hunting: A guide to proactive network defense
MP Collins
O'Reilly Media, 2018
42018
Graph-based analysis in network security
MP Collins
2011-MILCOM 2011 military communications conference, 1333-1337, 2011
42011
Payoff Based IDS Evaluation.
M Collins, LLC RedJack
CSET, 2009
42009
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20