Niels Provos
#13,336
Most Influential Person Now
Cryptographer
Niels Provos's AcademicInfluence.com Rankings
Niels Provoscomputer-science Degrees
Computer Science
#1014
World Rank
#1051
Historical Rank
Database
#4238
World Rank
#4408
Historical Rank
Download Badge
Computer Science
Niels Provos's Degrees
- Bachelors Computer Science University of Groningen
Similar Degrees You Can Earn
Why Is Niels Provos Influential?
(Suggest an Edit or Addition)According to Wikipedia, Niels Provos is a German-American researcher in security engineering, malware, and cryptography. He received a PhD in computer science from the University of Michigan. From 2003 to 2018, he worked at Google as a Distinguished Engineer on security for Google. In 2018, he left Google to join Stripe as its new head of security. In 2022, Provos left Stripe and joined Lacework as head of Security Efficacy.
Niels Provos's Published Works
Published Works
- Hide and Seek: An Introduction to Steganography (2003) (1359)
- A Virtual Honeypot Framework (2004) (744)
- Defending Against Statistical Steganalysis (2001) (714)
- All Your iFRAMEs Point to Us (2008) (595)
- Improving Host Security with System Call Policies (2003) (571)
- The Ghost in the Browser: Analysis of Web-based Malware (2007) (529)
- A framework for detection and measurement of phishing attacks (2007) (485)
- Detecting Steganographic Content on the Internet (2002) (359)
- Preventing Privilege Escalation (2003) (355)
- Manufacturing compromise: the emergence of exploit-as-a-service (2012) (247)
- A Future-Adaptable Password Scheme (1999) (219)
- A future-adaptive password scheme (1999) (164)
- Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority (2008) (117)
- Ad Injection at Scale: Assessing Deceptive Advertisement Modifications (2015) (110)
- Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware (2008) (90)
- Encrypting Virtual Memory (2000) (89)
- CAMP: Content-Agnostic Malware Protection (2013) (74)
- The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution (2010) (71)
- Trends and Lessons from Three Years Fighting Malicious Extensions (2015) (70)
- SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks (2011) (69)
- Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software (2016) (69)
- Cybercrime 2.0: when the cloud turns dark (2009) (69)
- Data reduction for the scalable automated analysis of distributed darknet traffic (2005) (60)
- Scalable Network I/O in Linux (2000) (59)
- A Hybrid Honeypot Architecture for Scalable Network Monitoring (2004) (53)
- Cryptography in OpenBSD: An Overview (1999) (46)
- Search worms (2006) (44)
- Peeking Through the Cloud: DNS-Based Estimation and Its Applications (2008) (37)
- ScanSSH: Scanning the Internet for SSH Servers (2001) (36)
- Cybercrime 2.0: When the Cloud Turns Dark (2009) (30)
- Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks (2006) (29)
- Probabilistic Methods for Improving Information Hiding (2001) (28)
- To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads (2008) (26)
- The Use of HMAC-RIPEMD-160-96 within ESP and AH (2000) (25)
- Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol (2006) (24)
- Analyzing the Overload Behavior of a Simple Web Server (2000) (19)
- Tick Tock: Building Browser Red Pills from Timing Side Channels (2014) (17)
- Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection (2006) (17)
- Proceedings of the 3rd conference on Hot topics in security (2008) (10)
- 03-1 A Virtual Honeypot Framework (2004) (10)
- Honeyd : A Virtual Honeypot Daemon ( Extended Abstract ) (2003) (9)
- Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing (2010) (8)
- Statistical steganalysis (2003) (6)
- Diffie-Hellman Group Exchange for the SSH Transport Layer Protocol (2000) (6)
- Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007) (6)
- The Linux Scalability Project (1999) (5)
- All Your iFRAME s Point to Us (2008) (5)
- To Catch a Predator: A Natural Language Approach for Eliciting Protocol Interaction (2008) (3)
- CITI Technical Report 03-1 A Virtual Honeypot Framework (2003) (3)
- Browser Exploits as a Service: The Monetization of Driveby Downloads (2012) (2)
- File System Permissions (2011) (0)
- Peer Review Process (2020) (0)
- The Ghost in the Browser and Other Frightening Stories About Web Malware (2008) (0)
- Proceedings of the 2nd USENIX workshop on Hot topics in security (2007) (0)
- Firewall Policy Analysis (2011) (0)
- Wavelet Steganography: An approach based on 3-level Haar Wavelet Transform (2019) (0)
This paper list is powered by the following services:
Other Resources About Niels Provos
What Schools Are Affiliated With Niels Provos?
Niels Provos is affiliated with the following schools: