Testing metrics for password creation policies by attacking large sets of revealed passwords M Weir, S Aggarwal, M Collins, H Stern Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 562 | 2010 |
Using uncleanliness to predict future botnet addresses MP Collins, TJ Shimeall, S Faber, J Janies, R Weaver, M De Shon, ... Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 93-104, 2007 | 190 | 2007 |
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. SE Coull, CV Wright, F Monrose, MP Collins, MK Reiter Ndss 7, 35-47, 2007 | 164 | 2007 |
Hit-list worm detection and bot identification in large networks using protocol graphs MP Collins, MK Reiter Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 116 | 2007 |
On Web Browsing Privacy in Anonymized NetFlows. SE Coull, MP Collins, CV Wright, F Monrose, MK Reiter USENIX Security Symposium, 339-352, 2007 | 112 | 2007 |
More Netflow Tools for Performance and Security. C Gates, MP Collins, M Duggan, A Kompanek, M Thomas LISA 4, 121-132, 2004 | 100 | 2004 |
Finding peer-to-peer file-sharing using coarse network behaviors MP Collins, MK Reiter Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 82 | 2006 |
PSI: Precise Security Instrumentation for Enterprise Networks. T Yu, SK Fayaz, MP Collins, V Sekar, S Seshan NDSS, 2017 | 72 | 2017 |
Network security through data analysis: building situational awareness MS Collins, M Collins " O'Reilly Media, Inc.", 2014 | 59 | 2014 |
An empirical analysis of target-resident DoS filters M Collins, M Reiter IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 103-114, 2004 | 51 | 2004 |
Fishing for phishes: Applying capture-recapture methods to estimate phishing populations R Weaver, MP Collins Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007 | 41 | 2007 |
Network security through data analysis: From data to action M Collins " O'Reilly Media, Inc.", 2017 | 29 | 2017 |
A Model for Opportunistic Network Exploits: The Case of P2P Worms. MP Collins, C Gates, G Kataria WEIS, 2006 | 22 | 2006 |
On the limits of payload-oblivious network attack detection MP Collins, MK Reiter Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 17 | 2008 |
A cost-based mechanism for evaluating the effectiveness of moving target defenses MP Collins International Conference on Decision and Game Theory for Security, 221-233, 2012 | 7 | 2012 |
A protocol graph based anomaly detection system M Collins Carnegie Mellon University, 2008 | 5 | 2008 |
Towards an operations-aware experimentation methodology M Collins, A Hussain, S Schwab 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022 | 4 | 2022 |
Threat hunting: A guide to proactive network defense MP Collins O'Reilly Media, 2018 | 4 | 2018 |
Payoff Based IDS Evaluation. M Collins, LLC RedJack CSET, 2009 | 4 | 2009 |
Graph-based analysis in network security MP Collins 2011-MILCOM 2011 Military Communications Conference, 1333-1337, 2011 | 3 | 2011 |