default search action
BibTeX records: Xinming Ou
@article{DBLP:journals/corr/abs-2401-17459, author = {Shashwat Kumar and Francis Hahn and Xinming Ou and Dmitry B. Goldgof and Lawrence O. Hall and Jay Ligatti and S. Raj Rajagopalan and Armin Ziaie Tabari}, title = {A Preliminary Study on Using Large Language Models in Software Pentesting}, journal = {CoRR}, volume = {abs/2401.17459}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.17459}, doi = {10.48550/ARXIV.2401.17459}, eprinttype = {arXiv}, eprint = {2401.17459}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-17459.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HoreMSO23, author = {Soumyadeep Hore and Fariha Moomtaheen and Ankit Shah and Xinming Ou}, title = {Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1270--1285}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3152164}, doi = {10.1109/TDSC.2022.3152164}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HoreMSO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/KumarHOS23, author = {Shashwat Kumar and Francis Hahn and Xinming Ou and Anoop Singhal}, title = {Security Analysis of Trust on the Controller in the Matter Protocol Specification}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288747}, doi = {10.1109/CNS59707.2023.10288747}, timestamp = {Mon, 13 Nov 2023 09:18:17 +0100}, biburl = {https://dblp.org/rec/conf/cns/KumarHOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/TabariLOS23, author = {Armin Ziaie Tabari and Guojun Liu and Xinming Ou and Anoop Singhal}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot Ecosystem}, booktitle = {Advances in Digital Forensics {XIX} - 19th {IFIP} {WG} 11.9 International Conference, {ICDF} 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {687}, pages = {73--90}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-42991-0\_5}, doi = {10.1007/978-3-031-42991-0\_5}, timestamp = {Tue, 30 Jan 2024 09:25:25 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/TabariLOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/TuladharLLO21, author = {Anwesh Tuladhar and Daniel Lende and Jay Ligatti and Xinming Ou}, editor = {Sonia Chiasson}, title = {An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company}, booktitle = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021, August 8-10, 2021}, pages = {617--632}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/soups2021/presentation/tuladhar}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/TuladharLLO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-10974, author = {Armin Ziaie Tabari and Xinming Ou and Anoop Singhal}, title = {What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering}, journal = {CoRR}, volume = {abs/2112.10974}, year = {2021}, url = {https://arxiv.org/abs/2112.10974}, eprinttype = {arXiv}, eprint = {2112.10974}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-10974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TabariO20, author = {Armin Ziaie Tabari and Xinming Ou}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {A Multi-phased Multi-faceted IoT Honeypot Ecosystem}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2121--2123}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3420023}, doi = {10.1145/3372297.3420023}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TabariO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChaulagainPPRCL20, author = {Dewan Chaulagain and Prabesh Poudel and Prabesh Pathak and Sankardas Roy and Doina Caragea and Guojun Liu and Xinming Ou}, title = {Hybrid Analysis of Android Apps for Security Vetting using Deep Learning}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162341}, doi = {10.1109/CNS48642.2020.9162341}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChaulagainPPRCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/YuWOBBY20, author = {Xiaodong Yu and Fengguo Wei and Xinming Ou and Michela Becchi and Tekin Bicer and Danfeng Daphne Yao}, title = {GPU-Based Static Data-Flow Analysis for Fast and Scalable Android App Vetting}, booktitle = {2020 {IEEE} International Parallel and Distributed Processing Symposium (IPDPS), New Orleans, LA, USA, May 18-22, 2020}, pages = {274--284}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IPDPS47924.2020.00037}, doi = {10.1109/IPDPS47924.2020.00037}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipps/YuWOBBY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/PalomboTLLO20, author = {Hernan M. Palombo and Armin Ziaie Tabari and Daniel Lende and Jay Ligatti and Xinming Ou}, editor = {Heather Richter Lipford and Sonia Chiasson}, title = {An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development}, booktitle = {Sixteenth Symposium on Usable Privacy and Security, {SOUPS} 2020, August 7-11, 2020}, pages = {205--220}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/soups2020/presentation/palombo}, timestamp = {Mon, 01 Feb 2021 08:41:55 +0100}, biburl = {https://dblp.org/rec/conf/soups/PalomboTLLO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297}, doi = {10.1145/3372297}, isbn = {978-1-4503-7089-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020aisec, editor = {Jay Ligatti and Xinming Ou}, title = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508}, doi = {10.1145/3411508}, isbn = {978-1-4503-8094-2}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2020, editor = {Jay Ligatti and Xinming Ou and Wouter Lueks and Paul Syverson}, title = {WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, Virtual Event, USA, November 9, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411497}, doi = {10.1145/3411497}, isbn = {978-1-4503-8086-7}, timestamp = {Wed, 16 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-01218, author = {Armin Ziaie Tabari and Xinming Ou}, title = {A First Step Towards Understanding Real-world Attacks on IoT Devices}, journal = {CoRR}, volume = {abs/2003.01218}, year = {2020}, url = {https://arxiv.org/abs/2003.01218}, eprinttype = {arXiv}, eprint = {2003.01218}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-01218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-06563, author = {Yuping Li and Jiyong Jang and Xinming Ou}, title = {Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis}, journal = {CoRR}, volume = {abs/2004.06563}, year = {2020}, url = {https://arxiv.org/abs/2004.06563}, eprinttype = {arXiv}, eprint = {2004.06563}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-06563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiJO19, author = {Yuping Li and Jiyong Jang and Xinming Ou}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {304}, pages = {278--298}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37228-6\_14}, doi = {10.1007/978-3-030-37228-6\_14}, timestamp = {Sat, 07 Mar 2020 15:32:26 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/LiJO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WeiROR18, author = {Fengguo Wei and Sankardas Roy and Xinming Ou and Robby}, title = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {14:1--14:32}, year = {2018}, url = {https://doi.org/10.1145/3183575}, doi = {10.1145/3183575}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WeiROR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeiLOCZ18, author = {Fengguo Wei and Xingwei Lin and Xinming Ou and Ting Chen and Xiaosong Zhang}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {{JN-SAF:} Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1137--1150}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243835}, doi = {10.1145/3243734.3243835}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WeiLOCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenLLLVWO18, author = {Yaohui Chen and Yuping Li and Long Lu and Yueh{-}Hsun Lin and Hayawardh Vijayakumar and Zhi Wang and Xinming Ou}, title = {InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/03/ndss2018\_08-2\_Chen\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ChenLLLVWO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/PaulsenYFO18, author = {Alexander Paulsen and Anis Yazidi and Boning Feng and Xinming Ou}, editor = {Hamido Fujita and Enrique Herrera{-}Viedma}, title = {A Population-Based Incremental Learning Approach to Network Hardening}, booktitle = {New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 17th International Conference SoMeT{\_}18, Granada, Spain, 26-28 September 2018}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {303}, pages = {941--953}, publisher = {{IOS} Press}, year = {2018}, url = {https://doi.org/10.3233/978-1-61499-900-3-941}, doi = {10.3233/978-1-61499-900-3-941}, timestamp = {Thu, 30 Aug 2018 15:33:25 +0200}, biburl = {https://dblp.org/rec/conf/somet/PaulsenYFO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/SundaramurthyWO17, author = {Sathya Chandran Sundaramurthy and Michael Wesch and Xinming Ou and John McHugh and S. Raj Rajagopalan and Alexandru G. Bardas}, title = {Humans Are Dynamic - Our Tools Should Be Too}, journal = {{IEEE} Internet Comput.}, volume = {21}, number = {3}, pages = {40--46}, year = {2017}, url = {https://doi.org/10.1109/MIC.2017.52}, doi = {10.1109/MIC.2017.52}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/SundaramurthyWO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/DeLoachCO17, author = {Jordan DeLoach and Doina Caragea and Xinming Ou}, editor = {Satinder Singh and Shaul Markovitch}, title = {Android Malware Detection with Weak Ground Truth Data}, booktitle = {Proceedings of the Thirty-First {AAAI} Conference on Artificial Intelligence, February 4-9, 2017, San Francisco, California, {USA}}, pages = {4915--4916}, publisher = {{AAAI} Press}, year = {2017}, url = {https://doi.org/10.1609/aaai.v31i1.11106}, doi = {10.1609/AAAI.V31I1.11106}, timestamp = {Mon, 04 Sep 2023 14:40:32 +0200}, biburl = {https://dblp.org/rec/conf/aaai/DeLoachCO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OkhraviO17, author = {Hamed Okhravi and Xinming Ou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{MTD} 2017: Fourth {ACM} Workshop on Moving Target Defense {(MTD)}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2637--2638}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137044}, doi = {10.1145/3133956.3137044}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/OkhraviO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WeiLROZ17, author = {Fengguo Wei and Yuping Li and Sankardas Roy and Xinming Ou and Wu Zhou}, editor = {Michalis Polychronakis and Michael Meier}, title = {Deep Ground Truth Analysis of Current Android Malware}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {252--276}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_12}, doi = {10.1007/978-3-319-60876-1\_12}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WeiLROZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BardasSOD17, author = {Alexandru G. Bardas and Sathya Chandran Sundaramurthy and Xinming Ou and Scott A. DeLoach}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {{MTD} {CBITS:} Moving Target Defense for Cloud-Based {IT} Systems}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10492}, pages = {167--186}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66402-6\_11}, doi = {10.1007/978-3-319-66402-6\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BardasSOD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/WangHOAHMNRV17, author = {Xiaolong Wang and Richard Habeeb and Xinming Ou and Siddharth Amaravadi and John Hatcliff and Masaaki Mizuno and Mitchell L. Neilsen and S. Raj Rajagopalan and Srivatsan Varadarajan}, editor = {Aibek Musaev and Jo{\~{a}}o Eduardo Ferreira and Teruo Higashino}, title = {Enhanced Security of Building Automation Systems Through Microkernel-Based Controller Platforms}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems Workshops, {ICDCS} Workshops 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCSW.2017.25}, doi = {10.1109/ICDCSW.2017.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/WangHOAHMNRV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LiJHO17, author = {Yuping Li and Jiyong Jang and Xin Hu and Xinming Ou}, editor = {Marc Dacier and Michael D. Bailey and Michalis Polychronakis and Manos Antonakakis}, title = {Android Malware Clustering Through Malicious Payload Mining}, booktitle = {Research in Attacks, Intrusions, and Defenses - 20th International Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10453}, pages = {192--214}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66332-6\_9}, doi = {10.1007/978-3-319-66332-6\_9}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/LiJHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017mtd, editor = {Hamed Okhravi and Xinming Ou}, title = {Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS 2017, Dallas, TX, USA, October 30, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3140549}, isbn = {978-1-4503-5176-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2017mtd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiJHO17, author = {Yuping Li and Jiyong Jang and Xin Hu and Xinming Ou}, title = {Android Malware Clustering through Malicious Payload Mining}, journal = {CoRR}, volume = {abs/1707.04795}, year = {2017}, url = {http://arxiv.org/abs/1707.04795}, eprinttype = {arXiv}, eprint = {1707.04795}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiJHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlmohriWYO16, author = {Hussain M. J. Almohri and Layne T. Watson and Danfeng Yao and Xinming Ou}, title = {Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {474--487}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2411264}, doi = {10.1109/TDSC.2015.2411264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/DeLoachCO16, author = {Jordan DeLoach and Doina Caragea and Xinming Ou}, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {Android malware detection with weak ground truth data}, booktitle = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, pages = {3457--3464}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BigData.2016.7841008}, doi = {10.1109/BIGDATA.2016.7841008}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/DeLoachCO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Ou16, author = {Xinming Ou}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {A Bottom-Up Approach to Applying Graphical Models in Security Analysis}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {1--24}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_1}, doi = {10.1007/978-3-319-46263-9\_1}, timestamp = {Wed, 17 Feb 2021 14:43:58 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Ou16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SundaramurthyMO16, author = {Sathya Chandran Sundaramurthy and John McHugh and Xinming Ou and Michael Wesch and Alexandru G. Bardas and S. Raj Rajagopalan}, title = {Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations}, booktitle = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {237--251}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/sundaramurthy}, timestamp = {Thu, 05 Sep 2024 15:37:23 +0200}, biburl = {https://dblp.org/rec/conf/soups/SundaramurthyMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ZhangOC15, author = {Su Zhang and Xinming Ou and Doina Caragea}, title = {Predicting Cyber Risks through National Vulnerability Database}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {24}, number = {4-6}, pages = {194--206}, year = {2015}, url = {https://doi.org/10.1080/19393555.2015.1111961}, doi = {10.1080/19393555.2015.1111961}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ZhangOC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RoyDLHCORLG15, author = {Sankardas Roy and Jordan DeLoach and Yuping Li and Nic Herndon and Doina Caragea and Xinming Ou and Venkatesh Prasad Ranganath and Hongmin Li and Nicolais Guevara}, title = {Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {81--90}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818038}, doi = {10.1145/2818000.2818038}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RoyDLHCORLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuangBDO15, author = {Rui Zhuang and Alexandru G. Bardas and Scott A. DeLoach and Xinming Ou}, editor = {George Cybenko and Dijiang Huang}, title = {A Theory of Cyber Attacks: {A} Step Towards Analyzing {MTD} Systems}, booktitle = {Proceedings of the Second {ACM} Workshop on Moving Target Defense, {MTD} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {11--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808475.2808478}, doi = {10.1145/2808475.2808478}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuangBDO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangMNORBP15, author = {Xiaolong Wang and Masaaki Mizuno and Mitchell L. Neilsen and Xinming Ou and S. Raj Rajagopalan and Will G. Boldwin and Bryan Phillips}, editor = {Indrajit Ray and Roshan K. Thomas and Alvaro A. C{\'{a}}rdenas}, title = {Secure {RTOS} Architecture for Building Automation}, booktitle = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {79--90}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808705.2808709}, doi = {10.1145/2808705.2808709}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangMNORBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/PauporeFPRO15, author = {Justin Paupore and Earlence Fernandes and Atul Prakash and Sankardas Roy and Xinming Ou}, editor = {George Candea}, title = {Practical Always-on Taint Tracking on Mobile Devices}, booktitle = {15th Workshop on Hot Topics in Operating Systems, HotOS XV, Kartause Ittingen, Switzerland, May 18-20, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/hotos15/workshop-program/presentation/paupore}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotos/PauporeFPRO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangZOCEJ15, author = {Su Zhang and Xinwen Zhang and Xinming Ou and Liqun Chen and Nigel Edwards and Jing Jin}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Assessing Attack Surface with Component-Based Package Dependency}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {405--417}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_29}, doi = {10.1007/978-3-319-25645-0\_29}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhangZOCEJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SundaramurthyBC15, author = {Sathya Chandran Sundaramurthy and Alexandru G. Bardas and Jacob Case and Xinming Ou and Michael Wesch and John McHugh and S. Raj Rajagopalan}, editor = {Lorrie Faith Cranor and Robert Biddle and Sunny Consolvo}, title = {A Human Capital Model for Mitigating Security Analyst Burnout}, booktitle = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa, Canada, July 22-24, 2015}, pages = {347--359}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/soups2015/proceedings/presentation/sundaramurthy}, timestamp = {Thu, 05 Sep 2024 15:37:23 +0200}, biburl = {https://dblp.org/rec/conf/soups/SundaramurthyBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SundaramurthyMORW14, author = {Sathya Chandran Sundaramurthy and John McHugh and Xinming Simon Ou and S. Raj Rajagopalan and Michael Wesch}, title = {An Anthropological Approach to Studying CSIRTs}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {5}, pages = {52--60}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.84}, doi = {10.1109/MSP.2014.84}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SundaramurthyMORW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuangDO14, author = {Rui Zhuang and Scott A. DeLoach and Xinming Ou}, editor = {Sushil Jajodia and Kun Sun}, title = {Towards a Theory of Moving Target Defense}, booktitle = {Proceedings of the First {ACM} Workshop on Moving Target Defense, {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014}, pages = {31--40}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663474.2663479}, doi = {10.1145/2663474.2663479}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuangDO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangZO14, author = {Su Zhang and Xinwen Zhang and Xinming Ou}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {317--328}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590300}, doi = {10.1145/2590296.2590300}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangZO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeiROR14, author = {Fengguo Wei and Sankardas Roy and Xinming Ou and Robby}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1329--1341}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660357}, doi = {10.1145/2660267.2660357}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WeiROR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ZhuangDO14, author = {Rui Zhuang and Scott A. DeLoach and Xinming Ou}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {A model for analyzing the effect of moving target defenses on enterprise networks}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {73--76}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602088}, doi = {10.1145/2602087.2602088}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ZhuangDO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/UnruhBZOD14, author = {Ian Unruh and Alexandru G. Bardas and Rui Zhuang and Xinming Ou and Scott A. DeLoach}, editor = {Nicole Forsgren Velasquez}, title = {Compiling Abstract Specifications into Concrete Systems - Bringing Order to the Cloud}, booktitle = {28th Large Installation System Administration Conference, {LISA} '14, Seattle, WA, USA, November 9-14, 2014}, pages = {17--34}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/lisa14/conference-program/presentation/unruh}, timestamp = {Tue, 02 Feb 2021 08:06:10 +0100}, biburl = {https://dblp.org/rec/conf/lisa/UnruhBZOD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ChengDLDSO14, author = {Yi Cheng and Julia Deng and Jason H. Li and Scott A. DeLoach and Anoop Singhal and Xinming Ou}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Metrics of Security}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {263--295}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_13}, doi = {10.1007/978-3-319-11391-3\_13}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/ChengDLDSO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HomerZOSDRS13, author = {John Homer and Su Zhang and Xinming Ou and David Schmidt and Yanhui Du and S. Raj Rajagopalan and Anoop Singhal}, title = {Aggregating vulnerability metrics in enterprise networks using attack graphs}, journal = {J. Comput. Secur.}, volume = {21}, number = {4}, pages = {561--597}, year = {2013}, url = {https://doi.org/10.3233/JCS-130475}, doi = {10.3233/JCS-130475}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HomerZOSDRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YackoskiLDO13, author = {Justin Yackoski and Jason H. Li and Scott A. DeLoach and Xinming Ou}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Mission-oriented moving target defense based on cryptographically strong network dynamics}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {57}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2460040}, doi = {10.1145/2459976.2460040}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/YackoskiLDO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/ZomlotSCO13, author = {Loai Zomlot and Sathya Chandran Sundaramurthy and Doina Caragea and Xinming Ou}, title = {Aiding Intrusion Analysis Using Machine Learning}, booktitle = {12th International Conference on Machine Learning and Applications, {ICMLA} 2013, Miami, FL, USA, December 4-7, 2013, Volume 2}, pages = {40--47}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICMLA.2013.103}, doi = {10.1109/ICMLA.2013.103}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmla/ZomlotSCO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2012, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-01433-3}, doi = {10.1007/978-3-319-01433-3}, isbn = {978-3-319-01432-6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MoorRSO12, author = {Dan Moor and Siva Raj Rajagopalan and Sathya Chandran Sundaramurthy and Xinming Ou}, title = {Investigative response modeling and predictive data collection}, booktitle = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/eCrime.2012.6489520}, doi = {10.1109/ECRIME.2012.6489520}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MoorRSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/BardasZSORE12, author = {Alexandru G. Bardas and Loai Zomlot and Sathya Chandran Sundaramurthy and Xinming Ou and S. Raj Rajagopalan and Marc R. Eisenbarth}, editor = {Engin Kirda}, title = {Classification of {UDP} Traffic for DDoS Detection}, booktitle = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '12, San Jose, CA, USA, April 24, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/leet12/workshop-program/presentation/bardas}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/BardasZSORE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/AmtoftDZABHOC12, author = {Torben Amtoft and Josiah Dodds and Zhi Zhang and Andrew W. Appel and Lennart Beringer and John Hatcliff and Xinming Ou and Andrew Cousino}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {369--389}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_20}, doi = {10.1007/978-3-642-28641-4\_20}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/AmtoftDZABHOC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/OuS11, author = {Xinming Ou and Anoop Singhal}, title = {Quantitative Security Risk Assessment of Enterprise Networks}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-1860-3}, doi = {10.1007/978-1-4614-1860-3}, isbn = {978-1-4614-1859-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/OuS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HuangZOPS11, author = {Heqing Huang and Su Zhang and Xinming Ou and Atul Prakash and Karem A. Sakallah}, editor = {Robert H'obbes' Zakon and John P. McDermott and Michael E. Locasto}, title = {Distilling critical attack graph surface iteratively through minimum-cost {SAT} solving}, booktitle = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC} 2011, Orlando, FL, USA, 5-9 December 2011}, pages = {31--40}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2076732.2076738}, doi = {10.1145/2076732.2076738}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HuangZOPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZomlotSLOR11, author = {Loai Zomlot and Sathya Chandran Sundaramurthy and Kui Luo and Xinming Ou and Siva Raj Rajagopalan}, editor = {Yan Chen and Alvaro A. C{\'{a}}rdenas and Rachel Greenstadt and Benjamin I. P. Rubinstein}, title = {Prioritizing intrusion analysis using Dempster-Shafer theory}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011}, pages = {59--70}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046684.2046694}, doi = {10.1145/2046684.2046694}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZomlotSLOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DeLoachOZZ11, author = {Scott A. DeLoach and Xinming Ou and Rui Zhuang and Su Zhang}, editor = {Nelly Bencomo and Robert B. France and Betty H. C. Cheng and Uwe A{\ss}mann}, title = {Model-driven, Moving-Target Defense for Enterprise Network Security}, booktitle = {Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27 - December 2, 2011]}, series = {Lecture Notes in Computer Science}, volume = {8378}, pages = {137--161}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-319-08915-7\_5}, doi = {10.1007/978-3-319-08915-7\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DeLoachOZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/ZhangCO11, author = {Su Zhang and Doina Caragea and Xinming Ou}, editor = {Abdelkader Hameurlain and Stephen W. Liddle and Klaus{-}Dieter Schewe and Xiaofang Zhou}, title = {An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities}, booktitle = {Database and Expert Systems Applications - 22nd International Conference, {DEXA} 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6860}, pages = {217--231}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23088-2\_15}, doi = {10.1007/978-3-642-23088-2\_15}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/ZhangCO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ZhangOH11, author = {Su Zhang and Xinming Ou and John Homer}, editor = {Thorsten Holz and Herbert Bos}, title = {Effective Network Vulnerability Assessment through Model Abstraction}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6739}, pages = {17--34}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22424-9\_2}, doi = {10.1007/978-3-642-22424-9\_2}, timestamp = {Wed, 25 Sep 2019 18:15:55 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ZhangOH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/XieLOLL10, author = {Peng Xie and Jason H. Li and Xinming Ou and Peng Liu and Renato Levy}, title = {Using Bayesian networks for cyber security analysis}, booktitle = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July 1 2010}, pages = {211--220}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSN.2010.5544924}, doi = {10.1109/DSN.2010.5544924}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/XieLOLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10, author = {Paul Barford and Marc Dacier and Thomas G. Dietterich and Matt Fredrikson and Jonathon T. Giffin and Sushil Jajodia and Somesh Jha and Jason H. Li and Peng Liu and Peng Ning and Xinming Ou and Dawn Song and Laura Strater and Vipin Swarup and George P. Tadda and C. Wang and John Yen}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber {SA:} Situational Awareness for Cyber Defense}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {3--13}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_1}, doi = {10.1007/978-1-4419-0140-8\_1}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LiOR10, author = {Jason H. Li and Xinming Ou and Siva Raj Rajagopalan}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Uncertainty and Risk Management in Cyber Situational Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {51--68}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_4}, doi = {10.1007/978-1-4419-0140-8\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiOR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HomerO09, author = {John Homer and Xinming Ou}, title = {SAT-solving approaches to context-aware enterprise network security management}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {27}, number = {3}, pages = {315--322}, year = {2009}, url = {https://doi.org/10.1109/JSAC.2009.090407}, doi = {10.1109/JSAC.2009.090407}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/HomerO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OuRS09, author = {Xinming Ou and Siva Raj Rajagopalan and Sakthiyuvaraja Sakthivelmurugan}, title = {An Empirical Approach to Modeling Uncertainty in Intrusion Analysis}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {494--503}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.53}, doi = {10.1109/ACSAC.2009.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OuRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SinghalO09, author = {Anoop Singhal and Xinming Ou}, editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Techniques for enterprise network security metrics}, booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, pages = {25}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1558607.1558636}, doi = {10.1145/1558607.1558636}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SinghalO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SawillaO08, author = {Reginald E. Sawilla and Xinming Ou}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Identifying Critical Attack Assets in Dependency Attack Graphs}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {18--34}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_2}, doi = {10.1007/978-3-540-88313-5\_2}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SawillaO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/HomerVOM08, author = {John Homer and Ashok Varikuti and Xinming Ou and Miles A. McQueen}, editor = {John R. Goodall and Gregory J. Conti and Kwan{-}Liu Ma}, title = {Improving Attack Graph Visualization through Data Reduction and Attack Grouping}, booktitle = {5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5210}, pages = {68--79}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85933-8\_7}, doi = {10.1007/978-3-540-85933-8\_7}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/HomerVOM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OuBM06, author = {Xinming Ou and Wayne F. Boyer and Miles A. McQueen}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {A scalable approach to attack graph generation}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {336--345}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180446}, doi = {10.1145/1180405.1180446}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OuBM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/LeinoMO05, author = {K. Rustan M. Leino and Madan Musuvathi and Xinming Ou}, editor = {Nicolas Halbwachs and Lenore D. Zuck}, title = {A Two-Tier Technique for Supporting Quantifiers in a Lazily Proof-Explicating Theorem Prover}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 11th International Conference, {TACAS} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3440}, pages = {334--348}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31980-1\_22}, doi = {10.1007/978-3-540-31980-1\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/LeinoMO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OuGA05, author = {Xinming Ou and Sudhakar Govindavajhala and Andrew W. Appel}, editor = {Patrick D. McDaniel}, title = {MulVAL: {A} Logic-based Network Security Analyzer}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/mulval-logic-based-network-security-analyzer}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/OuGA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipTCS/OuTMW04, author = {Xinming Ou and Gang Tan and Yitzhak Mandelbaum and David Walker}, editor = {Jean{-}Jacques L{\'{e}}vy and Ernst W. Mayr and John C. Mitchell}, title = {Dynamic Typing with Dependent Types}, booktitle = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World Computer Congress, {TC1} 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {155}, pages = {437--450}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8141-3\_34}, doi = {10.1007/1-4020-8141-3\_34}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifipTCS/OuTMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/FlanaganJOS03, author = {Cormac Flanagan and Rajeev Joshi and Xinming Ou and James B. Saxe}, editor = {Warren A. Hunt Jr. and Fabio Somenzi}, title = {Theorem Proving Using Lazy Proof Explication}, booktitle = {Computer Aided Verification, 15th International Conference, {CAV} 2003, Boulder, CO, USA, July 8-12, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2725}, pages = {355--367}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45069-6\_34}, doi = {10.1007/978-3-540-45069-6\_34}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/FlanaganJOS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/LiuWOZS00, author = {Wei Liu and Min Wu and Xinming Ou and Weimin Zheng and Meiming Shen}, title = {Design of an {I/O} Balancing File System on Web Server Clusters}, booktitle = {Proceedings of the 2000 International Workshop on Parallel Processing, {ICPPW} 2000, Toronto, Canada, August 21-24, 2000}, pages = {119--126}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICPPW.2000.869095}, doi = {10.1109/ICPPW.2000.869095}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/LiuWOZS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/LiuZSOW00, author = {Wei Liu and Weimin Zheng and Meiming Shen and Xinming Ou and Min Wu}, title = {An Effective File Migration Algorithm in Cluster File Systems}, booktitle = {Proceedings of the 2000 International Workshop on Parallel Processing, {ICPPW} 2000, Toronto, Canada, August 21-24, 2000}, pages = {329--336}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICPPW.2000.869119}, doi = {10.1109/ICPPW.2000.869119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/LiuZSOW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.