Niels Provos

6.8k total citations · 3 hit papers
44 papers, 4.4k citations indexed

About

Niels Provos is a scholar working on Computer Networks and Communications, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Niels Provos has authored 44 papers receiving a total of 4.4k indexed citations (citations by other indexed papers that have themselves been cited), including 27 papers in Computer Networks and Communications, 23 papers in Signal Processing and 20 papers in Artificial Intelligence. Recurrent topics in Niels Provos's work include Advanced Malware Detection Techniques (23 papers), Network Security and Intrusion Detection (21 papers) and Internet Traffic Analysis and Secure E-voting (13 papers). Niels Provos is often cited by papers focused on Advanced Malware Detection Techniques (23 papers), Network Security and Intrusion Detection (21 papers) and Internet Traffic Analysis and Secure E-voting (13 papers). Niels Provos collaborates with scholars based in United States, Spain and Germany. Niels Provos's co-authors include Peter Honeyman, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose, Thorsten Holz, Monica Chew, Sujata Garera, Aviel D. Rubin, M. Friedl and Nagendra Modadugu and has published in prestigious journals such as Communications of the ACM, IEEE Security & Privacy and ACM Transactions on Internet Technology.

In The Last Decade

Niels Provos

43 papers receiving 3.8k citations

Hit Papers

Hide and seek: an introduction to steganography 2003 2026 2010 2018 2003 2008 2007 250 500 750

Peers

Niels Provos
Nikita Borisov United States
Helen J. Wang United States
Vanja Josifovski United States
Yingjiu Li Singapore
John McHugh United States
Mark Stamp United States
Aggelos Kiayias United States
Seungyeop Han United States
Nikita Borisov United States
Niels Provos
Citations per year, relative to Niels Provos Niels Provos (= 1×) peers Nikita Borisov

Countries citing papers authored by Niels Provos

Since Specialization
Citations

This map shows the geographic impact of Niels Provos's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Niels Provos with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Niels Provos more than expected).

Fields of papers citing papers by Niels Provos

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Niels Provos. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Niels Provos. The network helps show where Niels Provos may publish in the future.

Co-authorship network of co-authors of Niels Provos

This figure shows the co-authorship network connecting the top 25 collaborators of Niels Provos. A scholar is included among the top collaborators of Niels Provos based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Niels Provos. Niels Provos is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Thomas, Kurt, Juan A. Crespo, Ali Asghar Tofigh, et al.. (2016). Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software. USENIX Security Symposium. 721–739. 27 indexed citations
2.
Mavrommatis, Panayiotis, et al.. (2015). Trends and lessons from three years fighting malicious extensions. USENIX Security Symposium. 579–593. 37 indexed citations
3.
Thomas, Kurt, Elie Bursztein, Chris Grier, et al.. (2015). Ad Injection at Scale: Assessing Deceptive Advertisement Modifications. 151–167. 68 indexed citations
4.
Rajab, Moheeb Abu, et al.. (2013). CAMP: Content-Agnostic Malware Protection. Network and Distributed System Security Symposium. 45 indexed citations
5.
Snow, Kevin Z., Srinivas Krishnan, Fabian Monrose, & Niels Provos. (2011). SHELLOS: enabling fast detection and forensic analysis of code injection attacks. USENIX Security Symposium. 9–9. 35 indexed citations
6.
Rajab, Moheeb Abu, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, & Xin Zhao. (2010). The nocebo effec on the Web: an analysis of fake anti-virus distribution. 35(6). 18–25. 1 indexed citations
7.
Rajab, Moheeb Abu, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, & Xin Zhao. (2010). The nocebo effect on the web: an analysis of fake anti-virus distribution. 3–3. 40 indexed citations
8.
Dagon, David, Chris Lee, Wenke Lee, & Niels Provos. (2008). Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. Network and Distributed System Security Symposium. 69 indexed citations
9.
Provos, Niels, et al.. (2007). The ghost in the browser analysis of web-based malware. 4–4. 267 indexed citations
10.
Bailey, Michael, et al.. (2005). Data reduction for the scalable automated analysis of distributed darknet traffic. 21–21. 34 indexed citations
11.
Provos, Niels. (2004). A virtual honeypot framework. Deep Blue (University of Michigan). 1–1. 378 indexed citations
12.
Provos, Niels. (2003). Improving host security with system call policies. Deep Blue (University of Michigan). 18–18. 311 indexed citations
13.
Provos, Niels, M. Friedl, & Peter Honeyman. (2003). Preventing privilege escalation. USENIX Security Symposium. 24(4). 16–16. 199 indexed citations
14.
Provos, Niels & Peter Honeyman. (2002). Detecting Steganographic Content on the Internet. Deep Blue (University of Michigan). 160 indexed citations
15.
Provos, Niels. (2001). Defending against statistical steganalysis. Deep Blue (University of Michigan). 10. 24–24. 386 indexed citations
16.
Provos, Niels & Peter Honeyman. (2001). ScanSSH - Scanning the Internet for SSH Servers. Deep Blue (University of Michigan). 25–30. 22 indexed citations
17.
Provos, Niels, et al.. (2000). Scalable network I/O in Linux. Deep Blue (University of Michigan). 38–38. 30 indexed citations
18.
Provos, Niels. (2000). Encrypting virtual memory. Deep Blue (University of Michigan). 3–3. 58 indexed citations
19.
Provos, Niels & David Mazières. (1999). A future-adaptive password scheme. USENIX Annual Technical Conference. 32–32. 86 indexed citations
20.
Keromytis, Angelos D., et al.. (1999). Cryptography in OpenBSD: an overview. USENIX Annual Technical Conference. 33–33. 17 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026