Name
Affiliation
Papers
MICHALIS FALOUTSOS
UC Riverside, Riverside, CA
155
Collaborators
Citations 
PageRank 
170
5288
586.88
Referers 
Referees 
References 
10503
2753
1964
Search Limit
1001000
Title
Citations
PageRank
Year
LinkMan: hyperlink-driven misbehavior detection in online security forums00.342021
Repo2Vec: A Comprehensive Embedding Approach for Determining Repository Similarity00.342021
HackerScope: The Dynamics of a Massive Hacker Online Ecosystem00.342020
Opening Digital Borders Cautiously yet Decisively - Digital Filtering in Saudi Arabia.00.342020
TenFor: a tensor-based tool to extract interesting events from security forums00.342020
RThread: a thread-centric analysis of security forums00.342020
IDAPro for IoT Malware analysis?00.342019
Extracting actionable information from Security Forums00.342019
MIMiS: Minimally Intrusive Mining of Smartphone User Behaviors.00.342018
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking00.342018
InferIP: Extracting actionable information from security discussion forums.30.422017
One Size Does Not Fit All: Profiling Personalized Time-Evolving User Behaviors.10.352017
Improving Smartphone Security and Reliability.00.342017
Facebook wall posts: a model of user behaviors.20.362017
Eigen-Optimization on Large Graphs by Edge Manipulation.80.492016
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.00.342016
Comment-Profiler: Detecting Trends and Parasitic Behaviors in Online Comments.00.342016
“Infect-me-not”: A user-centric and site-centric study of web-based malware20.392016
Trackadvisor: Taking Back Browsing Privacy From Third-Party Trackers70.562015
TrueView: Harnessing the Power of Multiple Review Sites130.752015
Whom Does Your Android App Talk To?10.352015
Which phone will you get next: Observing trends and predicting the choice.00.342014
Determining Developers' Expertise and Role: A Graph Hierarchy-Based Approach40.432014
The socio-monetary incentives of online social network malware campaigns40.392014
Scanner hunter: understanding HTTP scanning traffic10.372014
Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams00.342013
Competing Memes Propagation on Networks: A Network Science Perspective241.002013
Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies50.412013
An integrated routing and rate adaptation framework for multi-rate multi-hop wireless networks40.442013
Entelecheia: Detecting P2P botnets in their waiting stage.120.602013
ReSurf: Reconstructing web-surfing activity from network traffic281.122013
iDispatcher: A unified platform for secure planet-scale information dissemination.10.392013
Inferring cellular user demographic information using homophily on call graphs50.432013
Competing memes propagation on networks: a case study of composite networks140.772012
Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?100.692012
FRAppE: detecting malicious facebook applications90.842012
SyFi: a systematic approach for estimating stateful firewall performance10.402012
Gelling, and melting, large graphs by edge manipulation722.072012
ProfileDroid: multi-layer profiling of android applications923.532012
Obtaining Provably Legitimate Internet Topologies20.422012
SUT: Quantifying and mitigating URL typosquatting70.822011
Network-level characteristics of spamming: An empirical analysis00.342011
A Unified Metric for Routing and Rate Adaptation in Multi-Rate Wireless Mesh Networks50.452011
Measurement-driven guidelines for 802.11 WLAN design261.062010
Characterizing the Scam Hosting Infrastructure00.342010
On the Uplink Capacity of Hybrid Cellular Ad Hoc Networks10.362010
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone160.732010
PhishDef: URL names say it all652.462010
You must be joking...: is change00.342009
A Simple Conceptual Generator for the Internet Graph20.372009
  • 1
  • 2