Testing metrics for password creation policies by attacking large sets of revealed passwords M Weir, S Aggarwal, M Collins, H Stern Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 510 | 2010 |
Using uncleanliness to predict future botnet addresses MP Collins, TJ Shimeall, S Faber, J Janies, R Weaver, M De Shon, ... Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 93-104, 2007 | 176 | 2007 |
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter Ndss 7, 35-47, 2007 | 153 | 2007 |
Hit-list worm detection and bot identification in large networks using protocol graphs MP Collins, MK Reiter International Workshop on Recent Advances in Intrusion Detection, 276-295, 2007 | 108 | 2007 |
On Web Browsing Privacy in Anonymized NetFlows. SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter USENIX Security Symposium, 339-352, 2007 | 107 | 2007 |
More Netflow Tools for Performance and Security. C Gates, MP Collins, M Duggan, A Kompanek, M Thomas LISA 4, 121-132, 2004 | 98 | 2004 |
Finding peer-to-peer file-sharing using coarse network behaviors MP Collins, MK Reiter European Symposium on Research in Computer Security, 1-17, 2006 | 80 | 2006 |
PSI: Precise Security Instrumentation for Enterprise Networks. T Yu, SK Fayaz, MP Collins, V Sekar, S Seshan NDSS, 2017 | 58 | 2017 |
An empirical analysis of target-resident DoS filters M Collins, M Reiter IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 103-114, 2004 | 51 | 2004 |
Network security through data analysis: building situational awareness M Collins, MS Collins " O'Reilly Media, Inc.", 2014 | 45 | 2014 |
Fishing for phishes: Applying capture-recapture methods to estimate phishing populations R Weaver, MP Collins Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007 | 40 | 2007 |
Network Security Through Data Analysis: From Data to Action M Collins " O'Reilly Media, Inc.", 2017 | 19 | 2017 |
A Model for Opportunistic Network Exploits: The Case of P2P Worms. MP Collins, C Gates, G Kataria WEIS, 2006 | 19 | 2006 |
On the limits of payload-oblivious network attack detection MP Collins, MK Reiter International Workshop on Recent Advances in Intrusion Detection, 251-270, 2008 | 16 | 2008 |
A cost-based mechanism for evaluating the effectiveness of moving target defenses MP Collins International Conference on Decision and Game Theory for Security, 221-233, 2012 | 8 | 2012 |
A protocol graph based anomaly detection system M Collins Carnegie Mellon University, 2008 | 5 | 2008 |
Payoff Based IDS Evaluation. M Collins, LLC RedJack CSET, 2009 | 4 | 2009 |
Threat Hunting: A Guide to Proactive Network Defense M Collins O'Reilly Media, 2018 | 3 | 2018 |
Graph-based analysis in network security MP Collins 2011-MILCOM 2011 Military Communications Conference, 1333-1337, 2011 | 3 | 2011 |
Anomaly detection amidst constant anomalies: Training IDS on constantly attacked data MP Collins, MK Reiter Technical Report CMU-CYLAB-08–006, 2008 | 3 | 2008 |