Follow
Michalis Faloutsos
Title
Cited by
Cited by
Year
On power-law relationships of the internet topology
M Faloutsos, P Faloutsos, C Faloutsos
ACM SIGCOMM, 1999
77881999
BLINC: multilevel traffic classification in the dark
T Karagiannis, K Papagiannaki, M Faloutsos
Proceedings of the 2005 conference on Applications, technologies …, 2005
16862005
Transport layer identification of P2P traffic
T Karagiannis, A Broido, M Faloutsos, KC Claffy
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 121-134, 2004
12002004
Internet traffic classification demystified: myths, caveats, and the best practices
H Kim, KC Claffy, M Fomenkov, D Barman, M Faloutsos, KY Lee
Proceedings of the 2008 ACM CoNEXT conference, 1-12, 2008
7962008
Is p2p dying or just hiding?
T Karagiannis, A Broido, N Brownlee, KC Claffy, M Faloutsos
IEEE Global Telecommunications Conference, 2004. GLOBECOM'04. 3, 1532-1538, 2004
7792004
A nonstationary Poisson view of Internet traffic
T Karagiannis, M Molle, M Faloutsos, A Broido
IEEE INFOCOM 2004 3, 1558-1569, 2004
5542004
Power laws and the AS-level Internet topology
G Siganos, M Faloutsos, P Faloutsos, C Faloutsos
IEEE/ACM Transactions on networking 11 (4), 514-524, 2003
5432003
BiToS: Enhancing BitTorrent for supporting streaming applications
A Vlavianos, M Iliofotou, M Faloutsos
Proceedings Global Internet Workshop within IEEE INFOCOM 2006, 1-6, 2006
4972006
Long-range dependence ten years of Internet traffic modeling
T Karagiannis, M Molle, M Faloutsos
IEEE internet computing 8 (5), 57-64, 2004
4322004
Denial of service attacks at the MAC layer in wireless ad hoc networks
V Gupta, S Krishnamurthy, M Faloutsos
MILCOM 2002. Proceedings 2, 1118-1123, 2002
3492002
A first step towards understanding popularity in YouTube
G Chatzopoulou, C Sheng, M Faloutsos
2010 INFOCOM IEEE Conference on Computer Communications Workshops, 1-6, 2010
3112010
Automated identification of phishing, phony and malicious web sites
A Banerjee, M Faloutsos
US Patent 8,448,245, 2013
3002013
Profiledroid: Multi-layer profiling of android applications
X Wei, L Gomez, I Neamtiu, M Faloutsos
Proceedings of the 18th annual international conference on Mobile computing …, 2012
3002012
Graph-based analysis and prediction for software evolution
P Bhattacharya, M Iliofotou, I Neamtiu, M Faloutsos
2012 34th International conference on software engineering (ICSE), 419-429, 2012
2912012
Gelling, and melting, large graphs by edge manipulation
H Tong, BA Prakash, T Eliassi-Rad, M Faloutsos, C Faloutsos
Proceedings of the 21st ACM international conference on Information and …, 2012
2882012
Split TCP for mobile ad hoc networks
S Kopparty, SV Krishnamurthy, M Faloutsos, SK Tripathi
Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 1, 138-142, 2002
2852002
Threshold conditions for arbitrary cascade models on arbitrary networks
BA Prakash, D Chakrabarti, NC Valler, M Faloutsos, C Faloutsos
Knowledge and information systems 33, 549-575, 2012
2832012
PhishDef: URL names say it all
A Le, A Markopoulou, M Faloutsos
2011 Proceedings IEEE INFOCOM, 191-195, 2011
2832011
Qosmic: Quality of service sensitive multicast internet protocol
M Faloutsos, A Banerjea, R Pankaj
ACM SIGCOMM Computer Communication Review 28 (4), 144-153, 1998
2641998
Permission evolution in the android ecosystem
X Wei, L Gomez, I Neamtiu, M Faloutsos
Proceedings of the 28th Annual Computer Security Applications Conference, 31-40, 2012
2622012
The system can't perform the operation now. Try again later.
Articles 1–20