


Остановите войну!
for scientists:


default search action
Michalis Faloutsos
Person information

- affiliation: University of California, Riverside, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j60]Risul Islam
, Ben Treves, Md Omar Faruk Rokon
, Michalis Faloutsos
:
HyperMan: detecting misbehavior in online forums based on hyperlink posting behavior. Soc. Netw. Anal. Min. 12(1): 111 (2022) - [c136]Md Omar Faruk Rokon, Risul Islam, Md Rayhanul Masud, Michalis Faloutsos:
PIMan: A Comprehensive Approach for Establishing Plausible Influence among Software Repositories. ASONAM 2022: 436-441 - [c135]Joobin Gharibshah, Jakapun Tachaiya, Arman Irani, Evangelos E. Papalexakis, Michalis Faloutsos
:
IKEA: Unsupervised domain-specific keyword-expansion. ASONAM 2022: 496-503 - [c134]Ben Treves, Md Rayhanul Masud, Michalis Faloutsos:
URLytics: Profiling Forum Users from their Posted URLs. ASONAM 2022: 510-513 - [c133]Arman Irani, Kevin M. Esterling, Michalis Faloutsos, Deborah Pagliaccia:
Wheats the Deal? Understanding the GMO debate in online forums. ASONAM 2022: 514-517 - [c132]Ali Davanian, Michalis Faloutsos:
MalNet: a binary-centric network-level profiling of IoT malware. IMC 2022: 472-487 - 2021
- [j59]Risul Islam
, Md Omar Faruk Rokon
, Ahmad Darki, Michalis Faloutsos:
HackerScope: the dynamics of a massive hacker online ecosystem. Soc. Netw. Anal. Min. 11(1): 56 (2021) - [c131]Risul Islam, Ben Treves, Md Omar Faruk Rokon
, Michalis Faloutsos:
LinkMan: hyperlink-driven misbehavior detection in online security forums. ASONAM 2021: 270-277 - [c130]Jakapun Tachaiya, Arman Irani, Kevin M. Esterling, Michalis Faloutsos
:
SentiStance: quantifying the intertwined changes of sentiment and stance in response to an event in online forums. ASONAM 2021: 361-368 - [c129]Md Omar Faruk Rokon
, Pei Yan, Risul Islam, Michalis Faloutsos:
Repo2Vec: A Comprehensive Embedding Approach for Determining Repository Similarity. ICSME 2021: 355-365 - [c128]Risul Islam, Md Omar Faruk Rokon
, Evangelos E. Papalexakis, Michalis Faloutsos:
RecTen: A Recursive Hierarchical Low Rank Tensor Factorization Method to Discover Hierarchical Patterns from Multi-modal Data. ICWSM 2021: 230-241 - [c127]Jakapun Tachaiya, Joobin Gharibshah, Kevin E. Esterling, Michalis Faloutsos
:
RAFFMAN: Measuring and Analyzing Sentiment in Online Political Forum Discussions with an Application to the Trump Impeachment. ICWSM 2021: 703-713 - [c126]Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael B. Abu-Ghazaleh, Manu Sridharan:
DisCo: Combining Disassemblers for Improved Performance. RAID 2021: 148-161 - [i13]Md Omar Faruk Rokon, Pei Yan, Risul Islam, Michalis Faloutsos:
Repo2Vec: A Comprehensive Embedding Approach for Determining Repository Similarity. CoRR abs/2107.05112 (2021) - 2020
- [c125]Risul Islam, Md Omar Faruk Rokon
, Ahmad Darki, Michalis Faloutsos:
HackerScope: The Dynamics of a Massive Hacker Online Ecosystem. ASONAM 2020: 361-368 - [c124]Jakapun Tachaiya, Joobin Gharibshah, Evangelos E. Papalexakis, Michalis Faloutsos:
RThread: A thread-centric analysis of security forums. ASONAM 2020: 473-477 - [c123]Risul Islam, Md Omar Faruk Rokon
, Evangelos E. Papalexakis, Michalis Faloutsos:
TenFor: A Tensor-Based Tool to Extract Interesting Events from Security Forums. ASONAM 2020: 515-522 - [c122]Ahmad Darki, Michalis Faloutsos:
RIoTMAN: a systematic analysis of IoT malware behavior. CoNEXT 2020: 169-182 - [c121]Joobin Gharibshah, Evangelos E. Papalexakis, Michalis Faloutsos:
REST: A Thread Embedding Approach for Identifying and Classifying User-Specified Information in Security Forums. ICWSM 2020: 217-228 - [c120]Md Omar Faruk Rokon, Risul Islam, Ahmad Darki, Evangelos E. Papalexakis, Michalis Faloutsos:
SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub. RAID 2020: 149-163 - [c119]Fatemah Alharbi, Michalis Faloutsos, Nael B. Abu-Ghazaleh:
Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia. FOCI @ USENIX Security Symposium 2020 - [i12]Joobin Gharibshah, Evangelos E. Papalexakis, Michalis Faloutsos:
REST: A thread embedding approach for identifying and classifying user-specified information in security forums. CoRR abs/2001.02660 (2020) - [i11]Md Omar Faruk Rokon, Risul Islam, Ahmad Darki, Vagelis Papalexakis, Michalis Faloutsos:
SourceFinder: Finding Malware Source-Code from Publicly Available Repositories. CoRR abs/2005.14311 (2020) - [i10]Risul Islam, Md Omar Faruk Rokon, Ahmad Darki, Michalis Faloutsos:
HackerScope: The Dynamics of a Massive Hacker Online Ecosystem. CoRR abs/2011.07222 (2020) - [i9]Risul Islam, Md Omar Faruk Rokon, Evangelos E. Papalexakis, Michalis Faloutsos:
TenFor: A Tensor-Based Tool to Extract Interesting Events from Security Forums. CoRR abs/2011.07226 (2020) - [i8]Risul Islam, Md Omar Faruk Rokon, Evangelos E. Papalexakis, Michalis Faloutsos:
RecTen: A Recursive Hierarchical Low Rank Tensor Factorization Method to Discover Hierarchical Patterns in Multi-modal Data. CoRR abs/2011.07363 (2020) - [i7]Risul Islam, Andrey Y. Lokhov, Nathan Lemons, Michalis Faloutsos:
Mobility Map Inference from Thermal Modeling of a Building. CoRR abs/2011.07372 (2020)
2010 – 2019
- 2019
- [c118]Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael B. Abu-Ghazaleh, Manu Sridharan:
IDAPro for IoT Malware analysis? CSET @ USENIX Security Symposium 2019 - [c117]Joobin Gharibshah, Michalis Faloutsos:
Extracting actionable information from Security Forums. WWW (Companion Volume) 2019: 27-32 - [c116]Joobin Gharibshah, Zhabiz Gharibshah, Evangelos E. Papalexakis
, Michalis Faloutsos
:
An Empirical Study of Malicious Threads in Security Forums. WWW (Companion Volume) 2019: 176-182 - 2018
- [c115]Pravallika Devineni, Evangelos E. Papalexakis
, Kalina Michalska, Michalis Faloutsos
:
MIMiS: Minimally Intrusive Mining of Smartphone User Behaviors. ASONAM 2018: 568-569 - [c114]Meisam Navaki Arefi, Geoffrey Alexander, Hooman Rokham
, Aokun Chen, Michalis Faloutsos
, Xuetao Wei, Daniela Seabra Oliveira, Jedidiah R. Crandall:
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking. DSN 2018: 231-242 - [c113]Joobin Gharibshah, Evangelos E. Papalexakis
, Michalis Faloutsos
:
RIPEx: Extracting Malicious IP Addresses from Security Forums Using Cross-Forum Learning. PAKDD (3) 2018: 517-529 - [c112]Ahmad Darki, Chun-Yu Chuang, Michalis Faloutsos
, Zhiyun Qian
, Heng Yin
:
RARE: A Systematic Augmented Router Emulation for Malware Analysis. PAM 2018: 60-72 - [i6]Joobin Gharibshah, Evangelos E. Papalexakis, Michalis Faloutsos:
RIPEx: Extracting malicious IP addresses from security forums using cross-forum learning. CoRR abs/1804.04760 (2018) - [i5]Joobin Gharibshah, Tai-Ching Li, Andre Castro, Konstantinos Pelechrinis, Evangelos E. Papalexakis, Michalis Faloutsos:
Mining actionable information from security forums: the case of malicious IP addresses. CoRR abs/1804.04800 (2018) - [i4]Pravallika Devineni, Evangelos E. Papalexakis, Kalina Michalska, Michalis Faloutsos:
MIMiS: Minimally Intrusive Mining of Smartphone User Behaviors. CoRR abs/1805.05476 (2018) - [i3]Tai-Ching Li, Joobin Gharibshah, Evangelos E. Papalexakis, Michalis Faloutsos:
TrollSpot: Detecting misbehavior in commenting platforms. CoRR abs/1806.01997 (2018) - 2017
- [j58]Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos
:
Characterizing the behavior of handheld devices and its implications. Comput. Networks 114: 1-12 (2017) - [j57]Iulian Neamtiu, Xuetao Wei, Michalis Faloutsos
, Lorenzo Gomez, Tanzirul Azim, Yongjian Hu, Zhiyong Shan:
Improving Smartphone Security and Reliability. J. Interconnect. Networks 17(1): 1740002:1-1740002:67 (2017) - [j56]Pravallika Devineni
, Danai Koutra, Michalis Faloutsos
, Christos Faloutsos:
Facebook wall posts: a model of user behaviors. Soc. Netw. Anal. Min. 7(1): 6:1-6:15 (2017) - [c111]Tai-Ching Li, Joobin Gharibshah, Evangelos E. Papalexakis
, Michalis Faloutsos
:
TrollSpot: Detecting misbehavior in commenting platforms. ASONAM 2017: 171-175 - [c110]Joobin Gharibshah, Tai-Ching Li, Maria Solanas Vanrell, Andre Castro, Konstantinos Pelechrinis, Evangelos E. Papalexakis
, Michalis Faloutsos
:
InferIP: Extracting actionable information from security discussion forums. ASONAM 2017: 301-304 - [c109]Pravallika Devineni, Evangelos E. Papalexakis
, Danai Koutra, A. Seza Dogruöz, Michalis Faloutsos
:
One Size Does Not Fit All: Profiling Personalized Time-Evolving User Behaviors. ASONAM 2017: 331-340 - [c108]Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos
, Steven Weber, Spiros Mancoridis:
Behavioral anomaly detection of malware on home routers. MALWARE 2017: 47-54 - 2016
- [j55]Chen Chen
, Hanghang Tong
, B. Aditya Prakash, Tina Eliassi-Rad, Michalis Faloutsos
, Christos Faloutsos:
Eigen-Optimization on Large Graphs by Edge Manipulation. ACM Trans. Knowl. Discov. Data 10(4): 49:1-49:30 (2016) - [j54]Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos
:
Detecting Malicious Facebook Applications. IEEE/ACM Trans. Netw. 24(2): 773-787 (2016) - [c107]Huy Hang, Adnan Bashir, Michalis Faloutsos
, Christos Faloutsos, Tudor Dumitras:
"Infect-me-not": A user-centric and site-centric study of web-based malware. Networking 2016: 234-242 - [c106]Aokun Chen, Pratik Prabhanjan Brahma, Dapeng Oliver Wu
, Natalie C. Ebner
, Brandon Matthews, Jedidiah R. Crandall, Xuetao Wei, Michalis Faloutsos
, Daniela Oliveira:
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security. NSPW 2016: 23-35 - [c105]Tai-Ching Li, Abdullah Mueen, Michalis Faloutsos
, Huy Hang:
Comment-Profiler: Detecting Trends and Parasitic Behaviors in Online Comments. SocInfo (1) 2016: 75-91 - [e2]Athina Markopoulou, Michalis Faloutsos, Vyas Sekar, Dejan Kostic:
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016. ACM 2016, ISBN 978-1-4503-4292-6 [contents] - 2015
- [c104]Pravallika Devineni, Danai Koutra, Michalis Faloutsos
, Christos Faloutsos:
If walls could talk: Patterns and anomalies in Facebook wallposts. ASONAM 2015: 367-374 - [c103]Xuetao Wei, Iulian Neamtiu, Michalis Faloutsos
:
Whom Does Your Android App Talk To? GLOBECOM 2015: 1-6 - [c102]Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos
:
A behavior-aware profiling of handheld devices. INFOCOM 2015: 846-854 - [c101]Tai-Ching Li, Huy Hang, Michalis Faloutsos
, Petros Efstathopoulos:
TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers. PAM 2015: 277-289 - [c100]Amanda J. Minnich, Nikan Chavoshi, Abdullah Mueen, Shuang Luan, Michalis Faloutsos
:
TrueView: Harnessing the Power of Multiple Review Sites. WWW 2015: 787-797 - 2014
- [c99]Guowu Xie, Huy Hang, Michalis Faloutsos
:
Scanner hunter: understanding HTTP scanning traffic. AsiaCCS 2014: 27-38 - [c98]Ting-Kai Huang, Bruno Ribeiro
, Harsha V. Madhyastha, Michalis Faloutsos
:
The socio-monetary incentives of online social network malware campaigns. COSN 2014: 259-270 - [c97]Pamela Bhattacharya, Iulian Neamtiu, Michalis Faloutsos
:
Determining Developers' Expertise and Role: A Graph Hierarchy-Based Approach. ICSME 2014: 11-20 - [c96]Yi Wang, Hui Zang, Pravallika Devineni, Michalis Faloutsos
, Krishna Janakiraman, Sara Motahari:
Which phone will you get next: Observing trends and predicting the choice. NOMS 2014: 1-7 - [e1]Michalis Faloutsos, Aleksandar Kuzmanovic:
Passive and Active Measurement - 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings. Lecture Notes in Computer Science 8362, Springer 2014, ISBN 978-3-319-04917-5 [contents] - 2013
- [j53]Yi Wang, Marios Iliofotou, Michalis Faloutsos
, Bin Wu:
Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies. Comput. Networks 57(10): 2147-2158 (2013) - [j52]Xuetao Wei, Nicholas Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos
, Christos Faloutsos
:
Competing Memes Propagation on Networks: A Network Science Perspective. IEEE J. Sel. Areas Commun. 31(6): 1049-1060 (2013) - [j51]Md. Sazzadur Rahman, Guanhua Yan, Harsha V. Madhyastha, Michalis Faloutsos
, Stephan J. Eidenbenz
, Mike Fisk
:
iDispatcher: A unified platform for secure planet-scale information dissemination. Peer-to-Peer Netw. Appl. 6(1): 46-60 (2013) - [j50]Tae-Suk Kim, Gentian Jakllari
, Srikanth V. Krishnamurthy
, Michalis Faloutsos
:
An integrated routing and rate adaptation framework for multi-rate multi-hop wireless networks. Wirel. Networks 19(5): 985-1003 (2013) - [c95]Yi Wang, Michalis Faloutsos
, Hui Zang:
On the usage patterns of multi-modal communication: Countries and evolution. INFOCOM Workshops 2013: 97-102 - [c94]Yi Wang, Hui Zang, Michalis Faloutsos
:
Inferring cellular user demographic information using homophily on call graphs. INFOCOM Workshops 2013: 211-216 - [c93]Yi Wang, Michalis Faloutsos
, Hui Zang:
On the usage patterns of multimodal communication: Countries and evolution. INFOCOM 2013: 3135-3140 - [c92]Yi Wang, Hui Zang, Michalis Faloutsos
:
Inferring cellular user demographic information using homophily on call graphs. INFOCOM 2013: 3363-3368 - [c91]Huy Hang, Xuetao Wei, Michalis Faloutsos, Tina Eliassi-Rad:
Entelecheia: Detecting P2P botnets in their waiting stage. Networking 2013: 1-9 - [c90]Guowu Xie, Marios Iliofotou, Thomas Karagiannis, Michalis Faloutsos, Yaohui Jin:
ReSurf: Reconstructing web-surfing activity from network traffic. Networking 2013: 1-9 - [c89]Xuetao Wei, Nicholas Valler, Michalis Faloutsos
, Iulian Neamtiu, B. Aditya Prakash, Christos Faloutsos
:
Smartphone viruses propagation on heterogeneous composite networks. NSW 2013: 106-109 - [c88]Michalis Faloutsos:
Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams. WWW (Companion Volume) 2013: 495-496 - [c87]Ting-Kai Huang, Md. Sazzadur Rahman, Harsha V. Madhyastha, Michalis Faloutsos:
An analysis of socware cascades in online social networks. WWW 2013: 619-630 - 2012
- [j49]Xuetao Wei, Nicholas Valler, B. Aditya Prakash, Iulian Neamtiu, Michalis Faloutsos
, Christos Faloutsos
:
Competing memes propagation on networks: a case study of composite networks. Comput. Commun. Rev. 42(5): 5-12 (2012) - [j48]B. Aditya Prakash, Deepayan Chakrabarti
, Nicholas Valler, Michalis Faloutsos
, Christos Faloutsos
:
Threshold conditions for arbitrary cascade models on arbitrary networks. Knowl. Inf. Syst. 33(3): 549-575 (2012) - [j47]Gentian Jakllari
, Stephan J. Eidenbenz
, Nicolas W. Hengartner
, Srikanth V. Krishnamurthy
, Michalis Faloutsos
:
Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Networks. IEEE Trans. Mob. Comput. 11(1): 61-72 (2012) - [j46]Yihua He, Michalis Faloutsos
, Srikanth V. Krishnamurthy
, Marek Chrobak:
Obtaining Provably Legitimate Internet Topologies. IEEE/ACM Trans. Netw. 20(1): 271-284 (2012) - [c86]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos
:
Permission evolution in the Android ecosystem. ACSAC 2012: 31-40 - [c85]Hanghang Tong
, B. Aditya Prakash, Tina Eliassi-Rad, Michalis Faloutsos
, Christos Faloutsos
:
Gelling, and melting, large graphs by edge manipulation. CIKM 2012: 245-254 - [c84]Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos
:
FRAppE: detecting malicious facebook applications. CoNEXT 2012: 313-324 - [c83]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos
:
Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? ICDE Workshops 2012: 251-254 - [c82]Pamela Bhattacharya, Marios Iliofotou, Iulian Neamtiu, Michalis Faloutsos
:
Graph-based analysis and prediction for software evolution. ICSE 2012: 419-429 - [c81]Guowu Xie, Marios Iliofotou, Ram Keralapura, Michalis Faloutsos
, Antonio Nucci:
SubFlow: Towards practical flow-level traffic classification. INFOCOM 2012: 2541-2545 - [c80]Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos
:
ProfileDroid: multi-layer profiling of android applications. MobiCom 2012: 137-148 - [c79]Yordanos Beyene, Michalis Faloutsos
, Harsha V. Madhyastha:
SyFi: A Systematic Approach for Estimating Stateful Firewall Performance. PAM 2012: 74-84 - [c78]Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos:
Efficient and Scalable Socware Detection in Online Social Networks. USENIX Security Symposium 2012: 663-678 - 2011
- [j45]Marios Iliofotou, Hyunchul Kim, Michalis Faloutsos
, Michael Mitzenmacher, Prashanth Pappu, George Varghese:
Graption: A graph-based P2P traffic classification framework for the internet backbone. Comput. Networks 55(8): 1909-1920 (2011) - [j44]Anirban Banerjee, Md. Sazzadur Rahman, Michalis Faloutsos
:
SUT: Quantifying and mitigating URL typosquatting. Comput. Networks 55(13): 3001-3014 (2011) - [c77]Xuetao Wei, Nicholas Valler, Michalis Faloutsos
, Harsha V. Madhyastha, Ting-Kai Huang:
XLR: Tackling the Inefficiency of Landmark-Based Routing in Large Wireless Sensor Networks. GLOBECOM 2011: 1-6 - [c76]B. Aditya Prakash, Deepayan Chakrabarti
, Michalis Faloutsos
, Nicholas Valler, Christos Faloutsos
:
Threshold Conditions for Arbitrary Cascade Models on Arbitrary Networks. ICDM 2011: 537-546 - [c75]Marios Kokkodis, Michalis Faloutsos
, Athina Markopoulou
:
Network-level characteristics of spamming: An empirical analysis. ICNP 2011: 25-30 - [c74]Anh Le, Athina Markopoulou
, Michalis Faloutsos
:
PhishDef: URL names say it all. INFOCOM 2011: 191-195 - [c73]Tae-Seok Kim, Gentian Jakllari
, Srikanth V. Krishnamurthy
, Michalis Faloutsos
:
A Unified Metric for Routing and Rate Adaptation in Multi-Rate Wireless Mesh Networks. MASS 2011: 242-251 - [c72]Nicholas Valler, B. Aditya Prakash, Hanghang Tong
, Michalis Faloutsos
, Christos Faloutsos
:
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point. Networking (1) 2011: 266-280 - [c71]Zi Feng, Jianxia Ning, Ioannis Broustis, Konstantinos Pelechrinis, Srikanth V. Krishnamurthy
, Michalis Faloutsos
:
Coping with packet replay attacks in wireless networks. SECON 2011: 368-376 - 2010
- [j43]Michalis Faloutsos
, Thomas Karagiannis, S. Moon:
Online social networks. IEEE Netw. 24(5): 4-5 (2010) - [j42]Lap Kong Law, Konstantinos Pelechrinis, Srikanth V. Krishnamurthy, Michalis Faloutsos:
Downlink capacity of hybrid cellular ad hoc networks. IEEE/ACM Trans. Netw. 18(1): 243-256 (2010) - [j41]Ioannis Broustis, Konstantina Papagiannaki, Srikanth V. Krishnamurthy
, Michalis Faloutsos
, Vivek P. Mhatre:
Measurement-Driven Guidelines for 802.11 WLAN Design. IEEE/ACM Trans. Netw. 18(3): 722-735 (2010) - [c70]Marios Iliofotou, Brian Gallagher
, Tina Eliassi-Rad, Guowu Xie, Michalis Faloutsos
:
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone. CoNEXT 2010: 2 - [c69]Ting-Kai Huang, Nicholas Valler, Michalis Faloutsos
:
Characterizing the Scam Hosting Infrastructure. GLOBECOM 2010: 1-5 - [c68]Brian Gallagher
, Marios Iliofotou, Tina Eliassi-Rad, Michalis Faloutsos
:
Link Homophily in the Application Layer and its Usage in Traffic Classification. INFOCOM 2010: 221-225 - [c67]Theodoros Lappas
, Konstantinos Pelechrinis, Michalis Faloutsos
, Srikanth V. Krishnamurthy
:
A simple conceptual generator for the Internet graph. LANMAN 2010: 1-6 - [c66]B. Aditya Prakash, Hanghang Tong
, Nicholas Valler, Michalis Faloutsos
, Christos Faloutsos
:
Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms. ECML/PKDD (3) 2010: 99-114 - [c65]Serdar Vural, Lap Kong Law, Srikanth V. Krishnamurthy
, Michalis Faloutsos
:
On the Uplink Capacity of Hybrid Cellular Ad Hoc Networks. SECON 2010: 314-322 - [i2]Anh Le, Athina Markopoulou, Michalis Faloutsos:
PhishDef: URL Names Say It All. CoRR abs/1009.2275 (2010)
2000 – 2009
- 2009
- [j40]Michalis Faloutsos:
You must be joking...: is change. Comput. Commun. Rev. 39(1): 77-78 (2009) - [j39]Michalis Faloutsos
:
You must be joking...: the poetry of science. Comput. Commun. Rev. 39(2): 60-61 (2009) - [j38]Michalis Faloutsos
:
You must be joking...: is only getting started. Comput. Commun. Rev. 39(3): 49-50 (2009) - [j37]Yihua He, Georgos Siganos, Michalis Faloutsos, Srikanth V. Krishnamurthy:
Lord of the links: a framework for discovering missing links in the internet topology. IEEE/ACM Trans. Netw. 17(2): 391-404 (2009) - [c64]Marios Iliofotou, Michalis Faloutsos
, Michael Mitzenmacher:
Exploiting dynamicity in graph-based traffic analysis: techniques and applications. CoNEXT 2009: 241-252 - [c63]B. Aditya Prakash, Nicholas Valler, David G. Andersen, Michalis Faloutsos
, Christos Faloutsos
:
BGP-lens: patterns and anomalies in internet routing updates. KDD 2009: 1315-1324 - [c62]Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos
, Ling Huang, Frédéric Giroire:
Impact of IT monoculture on behavioral end host intrusion detection. WREN 2009: 27-36 - [r1]Yihua He, Georgos Siganos, Michalis Faloutsos:
Internet Topology. Encyclopedia of Complexity and Systems Science 2009: 4930-4947 - [i1]Theodoros Lappas, Konstantinos Pelechrinis, Michalis Faloutsos:
A Simple Conceptual Generator for the Internet Graph. CoRR abs/0911.0465 (2009) - 2008
- [j36]Michalis Faloutsos
:
You must be joking...: interview this. Comput. Commun. Rev. 38(1): 49-50 (2008) - [j35]Michalis Faloutsos:
You must be joking...: cares about the endangered species. Comput. Commun. Rev. 38(2): 75-77 (2008) - [j34]Michalis Faloutsos:
You must be joking...: interview this. Comput. Commun. Rev. 38(3): 91-92 (2008) - [j33]Michalis Faloutsos:
You must be joking...: believes. Comput. Commun. Rev. 38(5): 73-74 (2008) - [j32]Anirban Banerjee, Michalis Faloutsos
, Laxmi N. Bhuyan:
The P2P war: Someone is monitoring your activities. Comput. Networks 52(6): 1272-1280 (2008) - [c61]