Michael Collins
Michael Collins
Senior Computer Scientist, USC ISI
Verified email at
Cited by
Cited by
Testing metrics for password creation policies by attacking large sets of revealed passwords
M Weir, S Aggarwal, M Collins, H Stern
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Using uncleanliness to predict future botnet addresses
MP Collins, TJ Shimeall, S Faber, J Janies, R Weaver, M De Shon, ...
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 93-104, 2007
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter
Ndss 7, 35-47, 2007
Hit-list worm detection and bot identification in large networks using protocol graphs
MP Collins, MK Reiter
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
On Web Browsing Privacy in Anonymized NetFlows.
SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter
USENIX Security Symposium, 339-352, 2007
More Netflow Tools for Performance and Security.
C Gates, MP Collins, M Duggan, A Kompanek, M Thomas
LISA 4, 121-132, 2004
Finding peer-to-peer file-sharing using coarse network behaviors
MP Collins, MK Reiter
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
PSI: Precise Security Instrumentation for Enterprise Networks.
T Yu, SK Fayaz, MP Collins, V Sekar, S Seshan
NDSS, 2017
Network security through data analysis: building situational awareness
MS Collins, M Collins
" O'Reilly Media, Inc.", 2014
An empirical analysis of target-resident DoS filters
M Collins, M Reiter
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 103-114, 2004
Fishing for phishes: Applying capture-recapture methods to estimate phishing populations
R Weaver, MP Collins
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
Network security through data analysis: From data to action
M Collins
" O'Reilly Media, Inc.", 2017
A Model for Opportunistic Network Exploits: The Case of P2P Worms.
MP Collins, C Gates, G Kataria
WEIS, 2006
On the limits of payload-oblivious network attack detection
MP Collins, MK Reiter
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
A cost-based mechanism for evaluating the effectiveness of moving target defenses
MP Collins
International Conference on Decision and Game Theory for Security, 221-233, 2012
A protocol graph based anomaly detection system
M Collins
Carnegie Mellon University, 2008
Towards an operations-aware experimentation methodology
M Collins, A Hussain, S Schwab
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
Threat hunting: A guide to proactive network defense
MP Collins
O'Reilly Media, 2018
Payoff Based IDS Evaluation.
M Collins, LLC RedJack
CSET, 2009
Graph-based analysis in network security
MP Collins
2011-MILCOM 2011 Military Communications Conference, 1333-1337, 2011
The system can't perform the operation now. Try again later.
Articles 1–20