A linear-time optimal-message distributed algorithm for minimum spanning trees

Michalis Faloutsos , Mart Molle
Distributed Computing 17 ( 2) 151 -170

14
2004
Assessing link quality in IEEE 802.11 Wireless Networks: Which is the right metric?

Angelos Vlavianos , Lap Kong Law , Ioannis Broustis , Srikanth V. Krishnamurthy
personal, indoor and mobile radio communications 1 -6

222
2008
Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?

Xuetao Wei , Lorenzo Gomez , Iulian Neamtiu , Michalis Faloutsos
international conference on data engineering 251 -254

60
2012
FRAppE: detecting malicious facebook applications

Md Sazzadur Rahman , Ting-Kai Huang , Harsha V. Madhyastha , Michalis Faloutsos
conference on emerging network experiment and technology 313 -324

35
2012
Permission evolution in the Android ecosystem

Xuetao Wei , Lorenzo Gomez , Iulian Neamtiu , Michalis Faloutsos
Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12 31 -40

141
2012
The socio-monetary incentives of online social network malware campaigns

Michalis Faloutsos , Ting-Kai Huang , Bruno Ribeiro , Harsha V. Madhyastha
conference on online social networks 259 -270

7
2014
On the usage patterns of multimodal communication: Countries and evolution

Yi Wang , Michalis Faloutsos , Hui Zang
2013 Proceedings IEEE INFOCOM 3135 -3140

5
2013
Inferring cellular user demographic information using homophily on call graphs

Yi Wang , Hui Zang , Michalis Faloutsos
2013 Proceedings IEEE INFOCOM 3363 -3368

17
2013
Graph-Based P2P Traffic Classification at the Internet Backbone

Marios Iliofotou , Hyun-chul Kim , Michalis Faloutsos , Michael Mitzenmacher
IEEE INFOCOM Workshops 2009 37 -42

52
2009
A First Step Towards Understanding Popularity in YouTube

Gloria Chatzopoulou , Cheng Sheng , Michalis Faloutsos
conference on computer communications workshops 1 -6

278
2010
Non-binary information propagation: Modeling BGP routing churn

Nicholas C. Valler , Michael Butkiewicz , B. Aditya Prakash , Michalis Faloutsos
conference on computer communications workshops 900 -905

5
2011
Profiling the end host

Thomas Karagiannis , Konstantina Papagiannaki , Nina Taft , Michalis Faloutsos
passive and active network measurement 186 -196

62
2007
Implications of power control in wireless networks: a quantitative study

Ioannis Broustis , Jakob Eriksson , Srikanth V. Krishnamurthy , Michalis Faloutsos
passive and active network measurement 83 -93

27
2007
A user-friendly self-similarity analysis tool

Thomas Karagiannis , Michalis Faloutsos , Mart Molle
ACM SIGCOMM Computer Communication Review 33 ( 3) 81 -93

70
2003
Facebook wall posts: a model of user behaviors

Pravallika Devineni , Danai Koutra , Michalis Faloutsos , Christos Faloutsos
Social Network Analysis and Mining 7 ( 1) 6

12
2017
Comment-Profiler: Detecting Trends and Parasitic Behaviors in Online Comments

Tai-Ching Li , Abdullah Mueen , Michalis Faloutsos , Huy Hang
social informatics 75 -91

2016
Impact of IT monoculture on behavioral end host intrusion detection

Dhiman Barman , Jaideep Chandrashekar , Nina Taft , Michalis Faloutsos
Proceedings of the 1st ACM workshop on Research on enterprise networking - WREN '09 27 -36

5
2009
On the Uplink Capacity of Hybrid Cellular Ad Hoc Networks

Serdar Vural , Lap Kong Law , Srikanth V. Krishnamurthy , Michalis Faloutsos
sensor mesh and ad hoc communications and networks 1 -9

3
2010
Optimal distributed algorithm for minimum spanning trees revisited

Michalis Faloutsos , Mart Molle
principles of distributed computing 231 -237

36
1995
On power-law relationships of the Internet topology

Michalis Faloutsos , Petros Faloutsos , Christos Faloutsos
acm special interest group on data communication 29 ( 4) 251 -262

7,597
1999