Michalis Faloutsos
#147,399
Most Influential Person Now
Michalis Faloutsos's AcademicInfluence.com Rankings
Michalis Faloutsoscomputer-science Degrees
Computer Science
#7507
World Rank
#7904
Historical Rank
Database
#4555
World Rank
#4734
Historical Rank

Download Badge
Computer Science
Why Is Michalis Faloutsos Influential?
(Suggest an Edit or Addition)Michalis Faloutsos's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- On power-law relationships of the Internet topology (1999) (4998)
- BLINC: multilevel traffic classification in the dark (2005) (1278)
- Transport layer identification of P2P traffic (2004) (819)
- Is P2P dying or just hiding? [P2P traffic measurement] (2004) (577)
- Internet traffic classification demystified: myths, caveats, and the best practices (2008) (572)
- A nonstationary Poisson view of Internet traffic (2004) (423)
- Power laws and the AS-level internet topology (2003) (418)
- BiToS: Enhancing BitTorrent for Supporting Streaming Applications (2006) (374)
- Long-range dependence ten years of Internet traffic modeling (2004) (312)
- The internet AS-level topology: three data sources and one definitive metric (2006) (273)
- Denial of service attacks at the MAC layer in wireless ad hoc networks (2002) (266)
- ProfileDroid: multi-layer profiling of android applications (2012) (232)
- Gelling, and melting, large graphs by edge manipulation (2012) (229)
- Threshold conditions for arbitrary cascade models on arbitrary networks (2011) (219)
- Graph-based analysis and prediction for software evolution (2012) (216)
- Network monitoring using traffic dispersion graphs (tdgs) (2007) (206)
- Split TCP for mobile ad hoc networks (2002) (206)
- TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks (2006) (203)
- PhishDef: URL names say it all (2010) (201)
- Permission evolution in the Android ecosystem (2012) (195)
- QoSMIC: quality of service sensitive multicast Internet protocol (1998) (193)
- Assessing link quality in IEEE 802.11 Wireless Networks: Which is the right metric? (2008) (184)
- A First Step Towards Understanding Popularity in YouTube (2010) (183)
- A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks (2007) (176)
- Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms (2010) (157)
- DART: Dynamic Address RouTing for Scalable Ad Hoc and Mesh Networks (2007) (147)
- File-sharing in the Internet: A characterization of P2P traffic in the backbone (2003) (139)
- A simple conceptual model for the Internet topology (2001) (137)
- Aggregated multicast: an approach to reduce multicast state (2001) (124)
- Analyzing BGP policies: methodology and tool (2004) (122)
- A Framework for Distributed Spatio-Temporal Communications in Mobile Ad Hoc Networks (2006) (121)
- Scalable ad hoc routing: the case for dynamic addressing (2004) (119)
- On routing asymmetry in the Internet (2005) (117)
- Efficient and Scalable Socware Detection in Online Social Networks (2012) (104)
- A Systematic Framework for Unearthing the Missing Links: Measurements and Impact (2007) (101)
- Lord of the Links: A Framework for Discovering Missing Links in the Internet Topology (2009) (100)
- Long-range dependence: now you see it, now you don't! (2002) (99)
- Profiling the End Host (2007) (93)
- MDG: measurement-driven guidelines for 802.11 WLAN design (2007) (90)
- Competing Memes Propagation on Networks: A Network Science Perspective (2013) (90)
- Jellyfish: A conceptual model for the as Internet topology (2006) (87)
- On broadcasting with cooperative diversity in multi-hop wireless networks (2007) (87)
- A user-friendly self-similarity analysis tool (2003) (87)
- Reducing Large Internet Topologies for Faster Simulations (2005) (85)
- PeerNet: Pushing Peer-to-Peer Down the Stack (2003) (82)
- Information Survival Threshold in Sensor and P2P Networks (2007) (75)
- Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point (2011) (73)
- Measurement-Driven Guidelines for 802.11 WLAN Design (2010) (72)
- Graption: A graph-based P2P traffic classification framework for the internet backbone (2011) (71)
- ReSurf: Reconstructing web-surfing activity from network traffic (2013) (71)
- Exploiting dynamicity in graph-based traffic analysis: techniques and applications (2009) (71)
- The Connectivity and Fault-Tolerance of the Internet Topology (2001) (68)
- Graph-Based P2P Traffic Classification at the Internet Backbone (2009) (67)
- Sampling large Internet topologies for simulation purposes (2007) (64)
- Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol (2006) (63)
- QoS-aware multicast routing for the internet: the design and evaluation of QoSMIC (2002) (62)
- SELFIS: A Tool For Self-Similarity and Long-Range Dependence Analysis (2002) (61)
- Online social networks (2010) (59)
- Routing amid Colluding Attackers (2007) (57)
- TrueView: Harnessing the Power of Multiple Review Sites (2015) (56)
- Power adaptive broadcasting with local information in ad hoc networks (2003) (54)
- Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Networks (2012) (53)
- Entelecheia: Detecting P2P botnets in their waiting stage (2013) (52)
- Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Network (2008) (52)
- Routing in Vehicular Networks: Feasibility, Modeling, and Security (2008) (51)
- Capacity of Hybrid Cellular-Ad Hoc Data Networks (2008) (49)
- Competing memes propagation on networks: a case study of composite networks (2012) (48)
- An architecture for scalable, efficient, and fast fault-tolerant multicast provisioning (2004) (47)
- TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers (2015) (47)
- SubFlow: Towards practical flow-level traffic classification (2012) (47)
- Optimal distributed algorithm for minimum spanning trees revisited (1995) (46)
- TCP-friendly medium access control for ad-hoc wireless networks: alleviating self-contention (2004) (45)
- Profiling-By-Association: a resilient traffic profiling solution for the internet backbone (2010) (45)
- Eigen-Optimization on Large Graphs by Edge Manipulation (2016) (43)
- Quantifying routing asymmetry in the Internet at the AS level (2004) (42)
- Aggregated Multicast with Inter-Group Tree Sharing (2001) (42)
- FRAppE: detecting malicious facebook applications (2012) (42)
- An analysis of socware cascades in online social networks (2013) (40)
- Clustering by common friends finds locally significant proteins mediating modules (2007) (40)
- Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It? (2012) (40)
- Downlink Capacity of Hybrid Cellular Ad Hoc Networks (2010) (39)
- BGP-lens: patterns and anomalies in internet routing updates (2009) (39)
- Power-Laws and the AS-level Internet (2003) (39)
- Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today? (2007) (38)
- Overlay Multicasting for Ad Hoc Networks (2005) (36)
- Scalable QoS multicast provisioning in Diff-Serv-supported MPLS networks (2002) (36)
- AQoSM: Scalable QoS multicast provisioning in Diff-Serv networks (2006) (35)
- Implications of Power Control in Wireless Networks: A Quantitative Study (2007) (34)
- Cyber-Fraud is One Typo Away (2008) (33)
- Understanding the effects of hotspots in wireless cellular networks (2004) (32)
- Got the Flu (or Mumps)? Check the Eigenvalue! (2010) (31)
- Behavioral anomaly detection of malware on home routers (2017) (31)
- If walls could talk: Patterns and anomalies in Facebook wallposts (2015) (30)
- SourceFinder: Finding Malware Source-Code from Publicly Available Repositories (2020) (29)
- Coping with packet replay attacks in wireless networks (2011) (28)
- SUT: Quantifying and mitigating URL typosquatting (2011) (27)
- Characterizing the behavior of handheld devices and its implications (2017) (25)
- Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks (2007) (25)
- Link Homophily in the Application Layer and its Usage in Traffic Classification (2010) (24)
- Detecting Malicious Facebook Applications (2016) (24)
- A Blueprint for a Manageable and Affordable Wireless Testbed: Design, Pitfalls and Lessons Learned (2007) (24)
- Distance ADaptive (DAD) broadcasting for ad hoc networks (2002) (23)
- Understanding the Limitations of Estimation Methods for Long-Range Dependence (2006) (21)
- A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks (2007) (20)
- The eBay graph: How do online auction users interact? (2008) (20)
- Sampling Internet Topologies: How Small Can We Go? (2003) (20)
- Challenges in Network Application Identification (2012) (19)
- BIVTECI: a bibliographic visualization tool (1996) (19)
- Comparison of Internet Traffic Classification Tools (2007) (19)
- Determining Developers' Expertise and Role: A Graph Hierarchy-Based Approach (2014) (19)
- Improving the Performance of TCP in the Presence of Interacting UDP Flows in Ad Hoc Networks (2004) (18)
- A linear-time optimal-message distributed algorithm for minimum spanning trees (2004) (18)
- Measuring and modelling the group mmbership in the internet (2003) (18)
- Multiband Media Access Control in Impulse-Based UWB Ad Hoc Networks (2007) (17)
- Designing Qosmic: a Quality of Service Sensitive Multicast Internet Protocol (1998) (16)
- The Effect of Asymmetry on the On-Line Multicast Routing Problem (2002) (16)
- Characterizing and Modelling Clustering Features in AS-Level Internet Topology (2008) (16)
- Facebook wall posts: a model of user behaviors (2017) (16)
- The P2P War: Someone Is Monitoring Your Activities! (2007) (15)
- Alleviating MAC Layer Self-Contention in Ad-hoc Networks (2003) (15)
- Evolution versus "intelligent design": comparing the topology of protein-protein interaction networks to the Internet. (2006) (15)
- A multiband mac protocol for impulse-based UWB ad hoc networks (2005) (15)
- Internet Topology (2009) (15)
- Policy-Aware Topologies for Efficient Inter-Domain Routing Evaluations (2008) (15)
- Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies (2013) (15)
- TrollSpot: Detecting misbehavior in commenting platforms (2017) (14)
- Routing in Vehicular Networks : Feasibility , Security and Modeling Issues (2006) (14)
- Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams (2013) (14)
- On evaluating the trade-offs between broadcasting and multicasting in ad hoc networks (2004) (13)
- InferIP: Extracting actionable information from security discussion forums (2017) (13)
- Aggregated Multicast for Scalable QoS Multicast Provisioning (2001) (13)
- REST: A thread embedding approach for identifying and classifying user-specified information in security forums (2020) (13)
- Fireworks: An Adaptive Group Communications Protocol for Mobile Ad Hoc Networks (2005) (12)
- Scanner hunter: understanding HTTP scanning traffic (2014) (12)
- Spamming Botnets : Are we losing the war ? (2009) (11)
- An integrated routing and rate adaptation framework for multi-rate multi-hop wireless networks (2013) (11)
- The greedy, the naive, and the optimal multicast routing : from theory to internet protocols (1999) (10)
- A behavior-aware profiling of handheld devices (2015) (10)
- Creating Optimal Distributed Algorithms for Minimum Spanning Trees (1995) (10)
- FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking (2018) (9)
- Inferring cellular user demographic information using homophily on call graphs (2013) (9)
- RIPEx: Extracting malicious IP addresses from security forums using cross-forum learning (2018) (9)
- Inferring cellular user demographic information using homophily on call graphs (2013) (9)
- HackerScope: the dynamics of a massive hacker online ecosystem (2020) (9)
- The socio-monetary incentives of online social network malware campaigns (2014) (8)
- What features really make distributed minimum spanning tree algorithms efficient? (1996) (8)
- Overcoming the challenge of security in a mobile environment (2006) (8)
- On the usage patterns of multimodal communication: Countries and evolution (2013) (8)
- A Unified Metric for Routing and Rate Adaptation in Multi-Rate Wireless Mesh Networks (2011) (8)
- Local versus global power adaptive broadcasting in ad hoc networks (2005) (8)
- IDAPro for IoT Malware analysis? (2019) (7)
- “Infect-me-not”: A user-centric and site-centric study of web-based malware (2016) (7)
- Analyzing interaction communication networks in enterprises and identifying hierarchies (2011) (7)
- Justice: Flexible and Enforceable Per-Source Bandwidth Allocation (2005) (7)
- TenFor: A Tensor-Based Tool to Extract Interesting Events from Security Forums (2020) (7)
- Repo2Vec: A Comprehensive Embedding Approach for Determining Repository Similarity (2021) (7)
- BLINC: Multilevel Traffic Classification in the Dark (2005) (7)
- A new binary conflict resolution-based MAC protocol for impulse-based UWB ad hoc networks (2006) (7)
- One Size Does Not Fit All: Profiling Personalized Time-Evolving User Behaviors (2017) (6)
- RARE: A Systematic Augmented Router Emulation for Malware Analysis (2018) (6)
- Revisiting minimum cost reliable routing in wireless mesh networks (2007) (6)
- Which phone will you get next: Observing trends and predicting the choice (2014) (6)
- Obtaining Provably Legitimate Internet Topologies (2012) (6)
- A Blueprint for Improving the Robustness of Internet Routing (2005) (6)
- "Dude, where's my Peer?" (2006) (6)
- Performance evaluation of mobile wireless networks: a new perspective (2001) (6)
- Impact of IT monoculture on behavioral end host intrusion detection (2009) (6)
- Detection of BGP routing misbehavior against cyber-terrorism (2005) (6)
- An Architecture for Scalable QoS Multicast Provisioning UCLA CSD TR # 010030 (2001) (6)
- Routing Scalability in MANETs (2005) (6)
- Smartphone viruses propagation on heterogeneous composite networks (2013) (5)
- Non-binary information propagation: Modeling BGP routing churn (2011) (5)
- RIoTMAN: a systematic analysis of IoT malware behavior (2020) (5)
- Bounds for the On-line Multicast Problem in Directed Graphs (1997) (5)
- SyFi: A Systematic Approach for Estimating Stateful Firewall Performance (2012) (5)
- BGP routing: a study at large time scale (2002) (5)
- Using statistical data for reliable mobile communications (2002) (4)
- You must be joking: a historic open reviewing at global internet '07 (2007) (4)
- A simple conceptual generator for the Internet graph (2009) (4)
- iDispatcher: A unified platform for secure planet-scale information dissemination (2013) (4)
- Public real data repositories and measurement tools (2006) (4)
- Multiple Identities in BitTorrent Networks (2007) (4)
- Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks (2004) (4)
- On the Uplink Capacity of Hybrid Cellular Ad Hoc Networks (2010) (4)
- Whom Does Your Android App Talk To (2014) (4)
- Corrections, Improvements, Simulations and optiMSTic Algorithms for the Distributed Minimum Spanning (1995) (4)
- Mining actionable information from security forums: the case of malicious IP addresses (2017) (4)
- RecTen: A Recursive Hierarchical Low Rank Tensor Factorization Method to Discover Hierarchical Patterns in Multi-modal Data (2020) (4)
- Passive and Active Measurement (2014) (3)
- XLR: Tackling the Inefficiency of Landmark-Based Routing in Large Wireless Sensor Networks (2011) (3)
- An Empirical Study of Malicious Threads in Security Forums (2019) (3)
- The P2P war: Someone is monitoring your activities (2008) (3)
- Whom Does Your Android App Talk To? (2014) (3)
- RAFFMAN: Measuring and Analyzing Sentiment in Online Political Forum Discussions with an Application to the Trump Impeachment (2021) (3)
- Network-level characteristics of spamming: An empirical analysis (2011) (3)
- Profiling podcast-based content distribution (2008) (3)
- Extended Abstract: Revisiting Minimum Cost Reliable Routing in Wireless Mesh Networks (2007) (2)
- Innovative Routes for Enhancing Adolescent Marijuana Treatment: Interplay of Peer Influence Across Social Media and Geolocation (2016) (2)
- The effects of heterogeneity in parameters in wireless cellular network modeling (2004) (2)
- P 2 P : Is Big Brother Watching You ? (2)
- Multicast routing with heterogeneous quality (1997) (2)
- DisCo: Combining Disassemblers for Improved Performance (2021) (2)
- NETp1-04: "Dude, where' my Peer?" (2006) (2)
- LinkMan: hyperlink-driven misbehavior detection in online security forums (2021) (2)
- Characterizing the Scam Hosting Infrastructure (2010) (2)
- Power Efficient Broadcasting with Cooperative Diversity in Ad hoc Networks (2005) (2)
- Novel techniques and models for network traffic profiling: characterizing the unknown (2006) (2)
- Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia (2020) (1)
- SentiStance: quantifying the intertwined changes of sentiment and stance in response to an event in online forums (2021) (1)
- HackerScope: the dynamics of a massive hacker online ecosystem (2021) (1)
- Author ' s personal copy The P 2 P war : Someone is monitoring your activities (2008) (1)
- Modelling the Spatial Properties of Group Members in the Internet UCLA CSD TR # 030011 (2004) (1)
- How Does Topology Affect Security in Wireless Ad Hoc Networks ? (2006) (1)
- Toward Collusion-Robust Link-State Routing in Open Networks (2005) (1)
- Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security (2016) (1)
- Protocols for routing scalability and security in open networks (2006) (1)
- Extracting actionable information from Security Forums (2019) (1)
- Improving the Security and Robustness of Internet Routing : What Can We Do Today ? (2005) (1)
- You must be joking...: should the internet have an ON/OFF switch? (2006) (1)
- CnCHunter: An MITM-approach to identify live CnC servers (2021) (1)
- Comment-Profiler: Detecting Trends and Parasitic Behaviors in Online Comments (2016) (1)
- RThread: A thread-centric analysis of security forums (2020) (1)
- Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies (2016) (1)
- Understanding Wireless Mobile Systems: A Simplified Simulation Approach (2002) (0)
- PIMan: A Comprehensive Approach for Establishing Plausible Influence among Software Repositories (2022) (0)
- RESEC 2018 welcome (2018) (0)
- Wheats the Deal? Understanding the GMO debate in online forums (2022) (0)
- Threshold conditions for arbitrary cascade models on arbitrary networks (2012) (0)
- You must be joking... warns you: don't drink and type (2007) (0)
- iDispatcher: A unified platform for secure planet-scale information dissemination (2012) (0)
- HyperMan: detecting misbehavior in online forums based on hyperlink posting behavior (2022) (0)
- Number 11 (2017) (0)
- MalNet (2022) (0)
- Putting the Links Together : Measurements and Impact (2006) (0)
- You must be joking...: cares about the endangered species (2008) (0)
- You must be joking...: is only getting started (2009) (0)
- Implications of power control in wireless networks (2007) (0)
- MalNet: a binary-centric network-level profiling of IoT malware (2022) (0)
- Improving Smartphone Security and Reliability (2017) (0)
- IKEA: Unsupervised domain-specific keyword-expansion (2022) (0)
- You must be joking...: why Alice killed Bob (2007) (0)
- Performance Evaluation of a New MAC Protocol for the CDMA Interconnection Network (2005) (0)
- UNIVERSITY OF CALIFORNIA RIVERSIDE A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices A Dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy (2012) (0)
- URLytics: Profiling Forum Users from their Posted URLs (2022) (0)
- You must be joking... dares to ask: hey, internet, who's your daddy? (2006) (0)
- Mobility Map Inference from Thermal Modeling of a Building (2020) (0)
- HyperMan: detecting misbehavior in online forums based on hyperlink posting behavior (2022) (0)
- Research Statement 1 Current and Future Research Thrusts (2010) (0)
- Chapter 1 Routing Scalability in MANETs (2006) (0)
- You must be joking...: the poetry of science (2009) (0)
- Wireless Network Simulation: Towards a Systematic Approach (2006) (0)
- Secure Wireless Fault Tolerant Tunable Networks (SWIFT) (2005) (0)
- Securing Early Software Development (2012) (0)
- Chapter 9. Transport Layer Protocols for Mobile Ad Hoc Networks (2008) (0)
- Analyzing the cooperation of isps in internet routing: security implications and accurate internet models (2005) (0)
- Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362 (2014) (0)
- MIMiS: Minimally Intrusive Mining of Smartphone User Behaviors (2018) (0)
- A Proposal for IP Traffic Classifier for Educational Institutions (2011) (0)
- You must be joking...: is change (2008) (0)
- ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks (2016) (0)
- DistanceADaptive ( DAD ) Broadcastingfor Ad Hoc Networks (2002) (0)
- On the usage patterns of multi-modal communication: Countries and evolution (2013) (0)
- You must be joking: the most serious editorial column ever (2006) (0)
- You must be joking...: interview this (2008) (0)
- An integrated routing and rate adaptation framework for multi-rate multi-hop wireless networks (2012) (0)
- Internet Measurement Long-Range Dependence (2004) (0)
- TITLE : A Framework for Distributed Spatio-Temporal Communications in Mobile Ad hoc Networks (2005) (0)
- The case for a systematic approach to wireless mobile network simulation (2005) (0)
- You must be joking...: believes (2008) (0)
- You must be joking...: the most serious column strikes back (2006) (0)
- You must be joking...: interview this (2008) (0)
- RIoTMAN (2020) (0)
- Measuring and modeling the internet: topology, routing and their interplay (2007) (0)
- QoS-sensitive routing for Real-time Multicasting (1999) (0)
- POS1322 A DATA SCIENCE EVALUATION OF THE JUVENILE ARTHRITIS MULTIDIMENSIONAL ASSESSMENT REPORT (JAMAR) QUESTIONNAIRE FOR IMPROVING MANAGEMENT OF JIA PATIENTS (2021) (0)
- Facebook wall posts: a model of user behaviors (2017) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Michalis Faloutsos?
Michalis Faloutsos is affiliated with the following schools: