BibTeX records: Xinming Ou

download as .bib file

@article{DBLP:journals/corr/abs-2401-17459,
  author       = {Shashwat Kumar and
                  Francis Hahn and
                  Xinming Ou and
                  Dmitry B. Goldgof and
                  Lawrence O. Hall and
                  Jay Ligatti and
                  S. Raj Rajagopalan and
                  Armin Ziaie Tabari},
  title        = {A Preliminary Study on Using Large Language Models in Software Pentesting},
  journal      = {CoRR},
  volume       = {abs/2401.17459},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.17459},
  doi          = {10.48550/ARXIV.2401.17459},
  eprinttype    = {arXiv},
  eprint       = {2401.17459},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-17459.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HoreMSO23,
  author       = {Soumyadeep Hore and
                  Fariha Moomtaheen and
                  Ankit Shah and
                  Xinming Ou},
  title        = {Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1270--1285},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3152164},
  doi          = {10.1109/TDSC.2022.3152164},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HoreMSO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/KumarHOS23,
  author       = {Shashwat Kumar and
                  Francis Hahn and
                  Xinming Ou and
                  Anoop Singhal},
  title        = {Security Analysis of Trust on the Controller in the Matter Protocol
                  Specification},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288747},
  doi          = {10.1109/CNS59707.2023.10288747},
  timestamp    = {Mon, 13 Nov 2023 09:18:17 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/KumarHOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/TabariLOS23,
  author       = {Armin Ziaie Tabari and
                  Guojun Liu and
                  Xinming Ou and
                  Anoop Singhal},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Revealing Human Attacker Behaviors Using an Adaptive Internet of Things
                  Honeypot Ecosystem},
  booktitle    = {Advances in Digital Forensics {XIX} - 19th {IFIP} {WG} 11.9 International
                  Conference, {ICDF} 2023, Arlington, Virginia, USA, January 30-31,
                  2023, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {687},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-42991-0\_5},
  doi          = {10.1007/978-3-031-42991-0\_5},
  timestamp    = {Tue, 30 Jan 2024 09:25:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/TabariLOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/TuladharLLO21,
  author       = {Anwesh Tuladhar and
                  Daniel Lende and
                  Jay Ligatti and
                  Xinming Ou},
  editor       = {Sonia Chiasson},
  title        = {An Analysis of the Role of Situated Learning in Starting a Security
                  Culture in a Software Company},
  booktitle    = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021,
                  August 8-10, 2021},
  pages        = {617--632},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/soups2021/presentation/tuladhar},
  timestamp    = {Wed, 09 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/TuladharLLO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-10974,
  author       = {Armin Ziaie Tabari and
                  Xinming Ou and
                  Anoop Singhal},
  title        = {What are Attackers after on IoT Devices? An approach based on a multi-phased
                  multi-faceted IoT honeypot ecosystem and data clustering},
  journal      = {CoRR},
  volume       = {abs/2112.10974},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.10974},
  eprinttype    = {arXiv},
  eprint       = {2112.10974},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-10974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TabariO20,
  author       = {Armin Ziaie Tabari and
                  Xinming Ou},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {A Multi-phased Multi-faceted IoT Honeypot Ecosystem},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2121--2123},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3420023},
  doi          = {10.1145/3372297.3420023},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TabariO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChaulagainPPRCL20,
  author       = {Dewan Chaulagain and
                  Prabesh Poudel and
                  Prabesh Pathak and
                  Sankardas Roy and
                  Doina Caragea and
                  Guojun Liu and
                  Xinming Ou},
  title        = {Hybrid Analysis of Android Apps for Security Vetting using Deep Learning},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162341},
  doi          = {10.1109/CNS48642.2020.9162341},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChaulagainPPRCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/YuWOBBY20,
  author       = {Xiaodong Yu and
                  Fengguo Wei and
                  Xinming Ou and
                  Michela Becchi and
                  Tekin Bicer and
                  Danfeng Daphne Yao},
  title        = {GPU-Based Static Data-Flow Analysis for Fast and Scalable Android
                  App Vetting},
  booktitle    = {2020 {IEEE} International Parallel and Distributed Processing Symposium
                  (IPDPS), New Orleans, LA, USA, May 18-22, 2020},
  pages        = {274--284},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IPDPS47924.2020.00037},
  doi          = {10.1109/IPDPS47924.2020.00037},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipps/YuWOBBY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/PalomboTLLO20,
  author       = {Hernan M. Palombo and
                  Armin Ziaie Tabari and
                  Daniel Lende and
                  Jay Ligatti and
                  Xinming Ou},
  editor       = {Heather Richter Lipford and
                  Sonia Chiasson},
  title        = {An Ethnographic Understanding of Software (In)Security and a Co-Creation
                  Model to Improve Secure Software Development},
  booktitle    = {Sixteenth Symposium on Usable Privacy and Security, {SOUPS} 2020,
                  August 7-11, 2020},
  pages        = {205--220},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/soups2020/presentation/palombo},
  timestamp    = {Mon, 01 Feb 2021 08:41:55 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/PalomboTLLO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020,
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297},
  doi          = {10.1145/3372297},
  isbn         = {978-1-4503-7089-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020aisec,
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508},
  doi          = {10.1145/3411508},
  isbn         = {978-1-4503-8094-2},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2020,
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Wouter Lueks and
                  Paul Syverson},
  title        = {WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic
                  Society, Virtual Event, USA, November 9, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411497},
  doi          = {10.1145/3411497},
  isbn         = {978-1-4503-8086-7},
  timestamp    = {Wed, 16 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-01218,
  author       = {Armin Ziaie Tabari and
                  Xinming Ou},
  title        = {A First Step Towards Understanding Real-world Attacks on IoT Devices},
  journal      = {CoRR},
  volume       = {abs/2003.01218},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.01218},
  eprinttype    = {arXiv},
  eprint       = {2003.01218},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-01218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-06563,
  author       = {Yuping Li and
                  Jiyong Jang and
                  Xinming Ou},
  title        = {Topology-Aware Hashing for Effective Control Flow Graph Similarity
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/2004.06563},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.06563},
  eprinttype    = {arXiv},
  eprint       = {2004.06563},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-06563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiJO19,
  author       = {Yuping Li and
                  Jiyong Jang and
                  Xinming Ou},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Topology-Aware Hashing for Effective Control Flow Graph Similarity
                  Analysis},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {304},
  pages        = {278--298},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37228-6\_14},
  doi          = {10.1007/978-3-030-37228-6\_14},
  timestamp    = {Sat, 07 Mar 2020 15:32:26 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiJO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WeiROR18,
  author       = {Fengguo Wei and
                  Sankardas Roy and
                  Xinming Ou and
                  Robby},
  title        = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis
                  Framework for Security Vetting of Android Apps},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {14:1--14:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183575},
  doi          = {10.1145/3183575},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WeiROR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WeiLOCZ18,
  author       = {Fengguo Wei and
                  Xingwei Lin and
                  Xinming Ou and
                  Ting Chen and
                  Xiaosong Zhang},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {{JN-SAF:} Precise and Efficient NDK/JNI-aware Inter-language Static
                  Analysis Framework for Security Vetting of Android Applications with
                  Native Code},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1137--1150},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243835},
  doi          = {10.1145/3243734.3243835},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WeiLOCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenLLLVWO18,
  author       = {Yaohui Chen and
                  Yuping Li and
                  Long Lu and
                  Yueh{-}Hsun Lin and
                  Hayawardh Vijayakumar and
                  Zhi Wang and
                  Xinming Ou},
  title        = {InstaGuard: Instantly Deployable Hot-patches for Vulnerable System
                  Programs on Android},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/03/ndss2018\_08-2\_Chen\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenLLLVWO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/PaulsenYFO18,
  author       = {Alexander Paulsen and
                  Anis Yazidi and
                  Boning Feng and
                  Xinming Ou},
  editor       = {Hamido Fujita and
                  Enrique Herrera{-}Viedma},
  title        = {A Population-Based Incremental Learning Approach to Network Hardening},
  booktitle    = {New Trends in Intelligent Software Methodologies, Tools and Techniques
                  - Proceedings of the 17th International Conference SoMeT{\_}18, Granada,
                  Spain, 26-28 September 2018},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {303},
  pages        = {941--953},
  publisher    = {{IOS} Press},
  year         = {2018},
  url          = {https://doi.org/10.3233/978-1-61499-900-3-941},
  doi          = {10.3233/978-1-61499-900-3-941},
  timestamp    = {Thu, 30 Aug 2018 15:33:25 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/PaulsenYFO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/SundaramurthyWO17,
  author       = {Sathya Chandran Sundaramurthy and
                  Michael Wesch and
                  Xinming Ou and
                  John McHugh and
                  S. Raj Rajagopalan and
                  Alexandru G. Bardas},
  title        = {Humans Are Dynamic - Our Tools Should Be Too},
  journal      = {{IEEE} Internet Comput.},
  volume       = {21},
  number       = {3},
  pages        = {40--46},
  year         = {2017},
  url          = {https://doi.org/10.1109/MIC.2017.52},
  doi          = {10.1109/MIC.2017.52},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/SundaramurthyWO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/DeLoachCO17,
  author       = {Jordan DeLoach and
                  Doina Caragea and
                  Xinming Ou},
  editor       = {Satinder Singh and
                  Shaul Markovitch},
  title        = {Android Malware Detection with Weak Ground Truth Data},
  booktitle    = {Proceedings of the Thirty-First {AAAI} Conference on Artificial Intelligence,
                  February 4-9, 2017, San Francisco, California, {USA}},
  pages        = {4915--4916},
  publisher    = {{AAAI} Press},
  year         = {2017},
  url          = {https://doi.org/10.1609/aaai.v31i1.11106},
  doi          = {10.1609/AAAI.V31I1.11106},
  timestamp    = {Mon, 04 Sep 2023 14:40:32 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/DeLoachCO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OkhraviO17,
  author       = {Hamed Okhravi and
                  Xinming Ou},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{MTD} 2017: Fourth {ACM} Workshop on Moving Target Defense {(MTD)}},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2637--2638},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3137044},
  doi          = {10.1145/3133956.3137044},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/OkhraviO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WeiLROZ17,
  author       = {Fengguo Wei and
                  Yuping Li and
                  Sankardas Roy and
                  Xinming Ou and
                  Wu Zhou},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {Deep Ground Truth Analysis of Current Android Malware},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {252--276},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_12},
  doi          = {10.1007/978-3-319-60876-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WeiLROZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BardasSOD17,
  author       = {Alexandru G. Bardas and
                  Sathya Chandran Sundaramurthy and
                  Xinming Ou and
                  Scott A. DeLoach},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {{MTD} {CBITS:} Moving Target Defense for Cloud-Based {IT} Systems},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  pages        = {167--186},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6\_11},
  doi          = {10.1007/978-3-319-66402-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BardasSOD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/WangHOAHMNRV17,
  author       = {Xiaolong Wang and
                  Richard Habeeb and
                  Xinming Ou and
                  Siddharth Amaravadi and
                  John Hatcliff and
                  Masaaki Mizuno and
                  Mitchell L. Neilsen and
                  S. Raj Rajagopalan and
                  Srivatsan Varadarajan},
  editor       = {Aibek Musaev and
                  Jo{\~{a}}o Eduardo Ferreira and
                  Teruo Higashino},
  title        = {Enhanced Security of Building Automation Systems Through Microkernel-Based
                  Controller Platforms},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems
                  Workshops, {ICDCS} Workshops 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCSW.2017.25},
  doi          = {10.1109/ICDCSW.2017.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/WangHOAHMNRV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiJHO17,
  author       = {Yuping Li and
                  Jiyong Jang and
                  Xin Hu and
                  Xinming Ou},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Android Malware Clustering Through Malicious Payload Mining},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {192--214},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_9},
  doi          = {10.1007/978-3-319-66332-6\_9},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiJHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017mtd,
  editor       = {Hamed Okhravi and
                  Xinming Ou},
  title        = {Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS
                  2017, Dallas, TX, USA, October 30, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3140549},
  isbn         = {978-1-4503-5176-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2017mtd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiJHO17,
  author       = {Yuping Li and
                  Jiyong Jang and
                  Xin Hu and
                  Xinming Ou},
  title        = {Android Malware Clustering through Malicious Payload Mining},
  journal      = {CoRR},
  volume       = {abs/1707.04795},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.04795},
  eprinttype    = {arXiv},
  eprint       = {1707.04795},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiJHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriWYO16,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  Danfeng Yao and
                  Xinming Ou},
  title        = {Security Optimization of Dynamic Networks with Probabilistic Graph
                  Modeling and Linear Programming},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {4},
  pages        = {474--487},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2411264},
  doi          = {10.1109/TDSC.2015.2411264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/DeLoachCO16,
  author       = {Jordan DeLoach and
                  Doina Caragea and
                  Xinming Ou},
  editor       = {James Joshi and
                  George Karypis and
                  Ling Liu and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yinglong Xia and
                  Weijia Xu and
                  Aki{-}Hiro Sato and
                  Sudarsan Rachuri and
                  Lyle H. Ungar and
                  Philip S. Yu and
                  Rama Govindaraju and
                  Toyotaro Suzumura},
  title        = {Android malware detection with weak ground truth data},
  booktitle    = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016),
                  Washington DC, USA, December 5-8, 2016},
  pages        = {3457--3464},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigData.2016.7841008},
  doi          = {10.1109/BIGDATA.2016.7841008},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/DeLoachCO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Ou16,
  author       = {Xinming Ou},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {A Bottom-Up Approach to Applying Graphical Models in Security Analysis},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_1},
  doi          = {10.1007/978-3-319-46263-9\_1},
  timestamp    = {Wed, 17 Feb 2021 14:43:58 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Ou16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/SundaramurthyMO16,
  author       = {Sathya Chandran Sundaramurthy and
                  John McHugh and
                  Xinming Ou and
                  Michael Wesch and
                  Alexandru G. Bardas and
                  S. Raj Rajagopalan},
  title        = {Turning Contradictions into Innovations or: How We Learned to Stop
                  Whining and Improve Security Operations},
  booktitle    = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver,
                  CO, USA, June 22-24, 2016},
  pages        = {237--251},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/sundaramurthy},
  timestamp    = {Thu, 05 Sep 2024 15:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/SundaramurthyMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ZhangOC15,
  author       = {Su Zhang and
                  Xinming Ou and
                  Doina Caragea},
  title        = {Predicting Cyber Risks through National Vulnerability Database},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {24},
  number       = {4-6},
  pages        = {194--206},
  year         = {2015},
  url          = {https://doi.org/10.1080/19393555.2015.1111961},
  doi          = {10.1080/19393555.2015.1111961},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ZhangOC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RoyDLHCORLG15,
  author       = {Sankardas Roy and
                  Jordan DeLoach and
                  Yuping Li and
                  Nic Herndon and
                  Doina Caragea and
                  Xinming Ou and
                  Venkatesh Prasad Ranganath and
                  Hongmin Li and
                  Nicolais Guevara},
  title        = {Experimental Study with Real-world Data for Android App Security Analysis
                  using Machine Learning},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818038},
  doi          = {10.1145/2818000.2818038},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RoyDLHCORLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuangBDO15,
  author       = {Rui Zhuang and
                  Alexandru G. Bardas and
                  Scott A. DeLoach and
                  Xinming Ou},
  editor       = {George Cybenko and
                  Dijiang Huang},
  title        = {A Theory of Cyber Attacks: {A} Step Towards Analyzing {MTD} Systems},
  booktitle    = {Proceedings of the Second {ACM} Workshop on Moving Target Defense,
                  {MTD} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808475.2808478},
  doi          = {10.1145/2808475.2808478},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuangBDO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangMNORBP15,
  author       = {Xiaolong Wang and
                  Masaaki Mizuno and
                  Mitchell L. Neilsen and
                  Xinming Ou and
                  S. Raj Rajagopalan and
                  Will G. Boldwin and
                  Bryan Phillips},
  editor       = {Indrajit Ray and
                  Roshan K. Thomas and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Secure {RTOS} Architecture for Building Automation},
  booktitle    = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security
                  and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16,
                  2015},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808705.2808709},
  doi          = {10.1145/2808705.2808709},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangMNORBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/PauporeFPRO15,
  author       = {Justin Paupore and
                  Earlence Fernandes and
                  Atul Prakash and
                  Sankardas Roy and
                  Xinming Ou},
  editor       = {George Candea},
  title        = {Practical Always-on Taint Tracking on Mobile Devices},
  booktitle    = {15th Workshop on Hot Topics in Operating Systems, HotOS XV, Kartause
                  Ittingen, Switzerland, May 18-20, 2015},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/hotos15/workshop-program/presentation/paupore},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/PauporeFPRO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangZOCEJ15,
  author       = {Su Zhang and
                  Xinwen Zhang and
                  Xinming Ou and
                  Liqun Chen and
                  Nigel Edwards and
                  Jing Jin},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {Assessing Attack Surface with Component-Based Package Dependency},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {405--417},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_29},
  doi          = {10.1007/978-3-319-25645-0\_29},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangZOCEJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/SundaramurthyBC15,
  author       = {Sathya Chandran Sundaramurthy and
                  Alexandru G. Bardas and
                  Jacob Case and
                  Xinming Ou and
                  Michael Wesch and
                  John McHugh and
                  S. Raj Rajagopalan},
  editor       = {Lorrie Faith Cranor and
                  Robert Biddle and
                  Sunny Consolvo},
  title        = {A Human Capital Model for Mitigating Security Analyst Burnout},
  booktitle    = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa,
                  Canada, July 22-24, 2015},
  pages        = {347--359},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/soups2015/proceedings/presentation/sundaramurthy},
  timestamp    = {Thu, 05 Sep 2024 15:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/SundaramurthyBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SundaramurthyMORW14,
  author       = {Sathya Chandran Sundaramurthy and
                  John McHugh and
                  Xinming Simon Ou and
                  S. Raj Rajagopalan and
                  Michael Wesch},
  title        = {An Anthropological Approach to Studying CSIRTs},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {5},
  pages        = {52--60},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.84},
  doi          = {10.1109/MSP.2014.84},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SundaramurthyMORW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuangDO14,
  author       = {Rui Zhuang and
                  Scott A. DeLoach and
                  Xinming Ou},
  editor       = {Sushil Jajodia and
                  Kun Sun},
  title        = {Towards a Theory of Moving Target Defense},
  booktitle    = {Proceedings of the First {ACM} Workshop on Moving Target Defense,
                  {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663474.2663479},
  doi          = {10.1145/2663474.2663479},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuangDO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZO14,
  author       = {Su Zhang and
                  Xinwen Zhang and
                  Xinming Ou},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {After we knew it: empirical study and modeling of cost-effectiveness
                  of exploiting prevalent known vulnerabilities across IaaS cloud},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {317--328},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590300},
  doi          = {10.1145/2590296.2590300},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WeiROR14,
  author       = {Fengguo Wei and
                  Sankardas Roy and
                  Xinming Ou and
                  Robby},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis
                  Framework for Security Vetting of Android Apps},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1329--1341},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660357},
  doi          = {10.1145/2660267.2660357},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WeiROR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ZhuangDO14,
  author       = {Rui Zhuang and
                  Scott A. DeLoach and
                  Xinming Ou},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {A model for analyzing the effect of moving target defenses on enterprise
                  networks},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {73--76},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602088},
  doi          = {10.1145/2602087.2602088},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ZhuangDO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/UnruhBZOD14,
  author       = {Ian Unruh and
                  Alexandru G. Bardas and
                  Rui Zhuang and
                  Xinming Ou and
                  Scott A. DeLoach},
  editor       = {Nicole Forsgren Velasquez},
  title        = {Compiling Abstract Specifications into Concrete Systems - Bringing
                  Order to the Cloud},
  booktitle    = {28th Large Installation System Administration Conference, {LISA} '14,
                  Seattle, WA, USA, November 9-14, 2014},
  pages        = {17--34},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/lisa14/conference-program/presentation/unruh},
  timestamp    = {Tue, 02 Feb 2021 08:06:10 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/UnruhBZOD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ChengDLDSO14,
  author       = {Yi Cheng and
                  Julia Deng and
                  Jason H. Li and
                  Scott A. DeLoach and
                  Anoop Singhal and
                  Xinming Ou},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Metrics of Security},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {263--295},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_13},
  doi          = {10.1007/978-3-319-11391-3\_13},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/ChengDLDSO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HomerZOSDRS13,
  author       = {John Homer and
                  Su Zhang and
                  Xinming Ou and
                  David Schmidt and
                  Yanhui Du and
                  S. Raj Rajagopalan and
                  Anoop Singhal},
  title        = {Aggregating vulnerability metrics in enterprise networks using attack
                  graphs},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {561--597},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130475},
  doi          = {10.3233/JCS-130475},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HomerZOSDRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YackoskiLDO13,
  author       = {Justin Yackoski and
                  Jason H. Li and
                  Scott A. DeLoach and
                  Xinming Ou},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Mission-oriented moving target defense based on cryptographically
                  strong network dynamics},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {57},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460040},
  doi          = {10.1145/2459976.2460040},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/YackoskiLDO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/ZomlotSCO13,
  author       = {Loai Zomlot and
                  Sathya Chandran Sundaramurthy and
                  Doina Caragea and
                  Xinming Ou},
  title        = {Aiding Intrusion Analysis Using Machine Learning},
  booktitle    = {12th International Conference on Machine Learning and Applications,
                  {ICMLA} 2013, Miami, FL, USA, December 4-7, 2013, Volume 2},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICMLA.2013.103},
  doi          = {10.1109/ICMLA.2013.103},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/ZomlotSCO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2012,
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-01433-3},
  doi          = {10.1007/978-3-319-01433-3},
  isbn         = {978-3-319-01432-6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MoorRSO12,
  author       = {Dan Moor and
                  Siva Raj Rajagopalan and
                  Sathya Chandran Sundaramurthy and
                  Xinming Ou},
  title        = {Investigative response modeling and predictive data collection},
  booktitle    = {2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA,
                  October 23-24, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/eCrime.2012.6489520},
  doi          = {10.1109/ECRIME.2012.6489520},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MoorRSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/BardasZSORE12,
  author       = {Alexandru G. Bardas and
                  Loai Zomlot and
                  Sathya Chandran Sundaramurthy and
                  Xinming Ou and
                  S. Raj Rajagopalan and
                  Marc R. Eisenbarth},
  editor       = {Engin Kirda},
  title        = {Classification of {UDP} Traffic for DDoS Detection},
  booktitle    = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '12, San Jose, CA, USA, April 24, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/leet12/workshop-program/presentation/bardas},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/BardasZSORE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/AmtoftDZABHOC12,
  author       = {Torben Amtoft and
                  Josiah Dodds and
                  Zhi Zhang and
                  Andrew W. Appel and
                  Lennart Beringer and
                  John Hatcliff and
                  Xinming Ou and
                  Andrew Cousino},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {A Certificate Infrastructure for Machine-Checked Proofs of Conditional
                  Information Flow},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {369--389},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_20},
  doi          = {10.1007/978-3-642-28641-4\_20},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/AmtoftDZABHOC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/OuS11,
  author       = {Xinming Ou and
                  Anoop Singhal},
  title        = {Quantitative Security Risk Assessment of Enterprise Networks},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-1860-3},
  doi          = {10.1007/978-1-4614-1860-3},
  isbn         = {978-1-4614-1859-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/OuS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HuangZOPS11,
  author       = {Heqing Huang and
                  Su Zhang and
                  Xinming Ou and
                  Atul Prakash and
                  Karem A. Sakallah},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Distilling critical attack graph surface iteratively through minimum-cost
                  {SAT} solving},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076738},
  doi          = {10.1145/2076732.2076738},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HuangZOPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZomlotSLOR11,
  author       = {Loai Zomlot and
                  Sathya Chandran Sundaramurthy and
                  Kui Luo and
                  Xinming Ou and
                  Siva Raj Rajagopalan},
  editor       = {Yan Chen and
                  Alvaro A. C{\'{a}}rdenas and
                  Rachel Greenstadt and
                  Benjamin I. P. Rubinstein},
  title        = {Prioritizing intrusion analysis using Dempster-Shafer theory},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages        = {59--70},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046684.2046694},
  doi          = {10.1145/2046684.2046694},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZomlotSLOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DeLoachOZZ11,
  author       = {Scott A. DeLoach and
                  Xinming Ou and
                  Rui Zhuang and
                  Su Zhang},
  editor       = {Nelly Bencomo and
                  Robert B. France and
                  Betty H. C. Cheng and
                  Uwe A{\ss}mann},
  title        = {Model-driven, Moving-Target Defense for Enterprise Network Security},
  booktitle    = {Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl
                  Seminar 11481, November 27 - December 2, 2011]},
  series       = {Lecture Notes in Computer Science},
  volume       = {8378},
  pages        = {137--161},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-319-08915-7\_5},
  doi          = {10.1007/978-3-319-08915-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DeLoachOZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/ZhangCO11,
  author       = {Su Zhang and
                  Doina Caragea and
                  Xinming Ou},
  editor       = {Abdelkader Hameurlain and
                  Stephen W. Liddle and
                  Klaus{-}Dieter Schewe and
                  Xiaofang Zhou},
  title        = {An Empirical Study on Using the National Vulnerability Database to
                  Predict Software Vulnerabilities},
  booktitle    = {Database and Expert Systems Applications - 22nd International Conference,
                  {DEXA} 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6860},
  pages        = {217--231},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23088-2\_15},
  doi          = {10.1007/978-3-642-23088-2\_15},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/ZhangCO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ZhangOH11,
  author       = {Su Zhang and
                  Xinming Ou and
                  John Homer},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {Effective Network Vulnerability Assessment through Model Abstraction},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_2},
  doi          = {10.1007/978-3-642-22424-9\_2},
  timestamp    = {Wed, 25 Sep 2019 18:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ZhangOH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/XieLOLL10,
  author       = {Peng Xie and
                  Jason H. Li and
                  Xinming Ou and
                  Peng Liu and
                  Renato Levy},
  title        = {Using Bayesian networks for cyber security analysis},
  booktitle    = {Proceedings of the 2010 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2010, Chicago, IL, USA, June 28 - July
                  1 2010},
  pages        = {211--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSN.2010.5544924},
  doi          = {10.1109/DSN.2010.5544924},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/XieLOLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10,
  author       = {Paul Barford and
                  Marc Dacier and
                  Thomas G. Dietterich and
                  Matt Fredrikson and
                  Jonathon T. Giffin and
                  Sushil Jajodia and
                  Somesh Jha and
                  Jason H. Li and
                  Peng Liu and
                  Peng Ning and
                  Xinming Ou and
                  Dawn Song and
                  Laura Strater and
                  Vipin Swarup and
                  George P. Tadda and
                  C. Wang and
                  John Yen},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber {SA:} Situational Awareness for Cyber Defense},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_1},
  doi          = {10.1007/978-1-4419-0140-8\_1},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LiOR10,
  author       = {Jason H. Li and
                  Xinming Ou and
                  Siva Raj Rajagopalan},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Uncertainty and Risk Management in Cyber Situational Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_4},
  doi          = {10.1007/978-1-4419-0140-8\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiOR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HomerO09,
  author       = {John Homer and
                  Xinming Ou},
  title        = {SAT-solving approaches to context-aware enterprise network security
                  management},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {27},
  number       = {3},
  pages        = {315--322},
  year         = {2009},
  url          = {https://doi.org/10.1109/JSAC.2009.090407},
  doi          = {10.1109/JSAC.2009.090407},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/HomerO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OuRS09,
  author       = {Xinming Ou and
                  Siva Raj Rajagopalan and
                  Sakthiyuvaraja Sakthivelmurugan},
  title        = {An Empirical Approach to Modeling Uncertainty in Intrusion Analysis},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {494--503},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.53},
  doi          = {10.1109/ACSAC.2009.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OuRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SinghalO09,
  author       = {Anoop Singhal and
                  Xinming Ou},
  editor       = {Frederick T. Sheldon and
                  Greg Peterson and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Techniques for enterprise network security metrics},
  booktitle    = {Fifth Cyber Security and Information Intelligence Research Workshop,
                  {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009},
  pages        = {25},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1558607.1558636},
  doi          = {10.1145/1558607.1558636},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SinghalO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SawillaO08,
  author       = {Reginald E. Sawilla and
                  Xinming Ou},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Identifying Critical Attack Assets in Dependency Attack Graphs},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_2},
  doi          = {10.1007/978-3-540-88313-5\_2},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SawillaO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/HomerVOM08,
  author       = {John Homer and
                  Ashok Varikuti and
                  Xinming Ou and
                  Miles A. McQueen},
  editor       = {John R. Goodall and
                  Gregory J. Conti and
                  Kwan{-}Liu Ma},
  title        = {Improving Attack Graph Visualization through Data Reduction and Attack
                  Grouping},
  booktitle    = {5th International Workshop on Visualization for Computer Security,
                  VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5210},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85933-8\_7},
  doi          = {10.1007/978-3-540-85933-8\_7},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/HomerVOM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OuBM06,
  author       = {Xinming Ou and
                  Wayne F. Boyer and
                  Miles A. McQueen},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {A scalable approach to attack graph generation},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {336--345},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180446},
  doi          = {10.1145/1180405.1180446},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OuBM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/LeinoMO05,
  author       = {K. Rustan M. Leino and
                  Madan Musuvathi and
                  Xinming Ou},
  editor       = {Nicolas Halbwachs and
                  Lenore D. Zuck},
  title        = {A Two-Tier Technique for Supporting Quantifiers in a Lazily Proof-Explicating
                  Theorem Prover},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  11th International Conference, {TACAS} 2005, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2005,
                  Edinburgh, UK, April 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3440},
  pages        = {334--348},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31980-1\_22},
  doi          = {10.1007/978-3-540-31980-1\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/LeinoMO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OuGA05,
  author       = {Xinming Ou and
                  Sudhakar Govindavajhala and
                  Andrew W. Appel},
  editor       = {Patrick D. McDaniel},
  title        = {MulVAL: {A} Logic-based Network Security Analyzer},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/mulval-logic-based-network-security-analyzer},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OuGA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipTCS/OuTMW04,
  author       = {Xinming Ou and
                  Gang Tan and
                  Yitzhak Mandelbaum and
                  David Walker},
  editor       = {Jean{-}Jacques L{\'{e}}vy and
                  Ernst W. Mayr and
                  John C. Mitchell},
  title        = {Dynamic Typing with Dependent Types},
  booktitle    = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World
                  Computer Congress, {TC1} 3rd International Conference on Theoretical
                  Computer Science (TCS2004), 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {155},
  pages        = {437--450},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8141-3\_34},
  doi          = {10.1007/1-4020-8141-3\_34},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifipTCS/OuTMW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/FlanaganJOS03,
  author       = {Cormac Flanagan and
                  Rajeev Joshi and
                  Xinming Ou and
                  James B. Saxe},
  editor       = {Warren A. Hunt Jr. and
                  Fabio Somenzi},
  title        = {Theorem Proving Using Lazy Proof Explication},
  booktitle    = {Computer Aided Verification, 15th International Conference, {CAV}
                  2003, Boulder, CO, USA, July 8-12, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2725},
  pages        = {355--367},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45069-6\_34},
  doi          = {10.1007/978-3-540-45069-6\_34},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/FlanaganJOS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/LiuWOZS00,
  author       = {Wei Liu and
                  Min Wu and
                  Xinming Ou and
                  Weimin Zheng and
                  Meiming Shen},
  title        = {Design of an {I/O} Balancing File System on Web Server Clusters},
  booktitle    = {Proceedings of the 2000 International Workshop on Parallel Processing,
                  {ICPPW} 2000, Toronto, Canada, August 21-24, 2000},
  pages        = {119--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICPPW.2000.869095},
  doi          = {10.1109/ICPPW.2000.869095},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/LiuWOZS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/LiuZSOW00,
  author       = {Wei Liu and
                  Weimin Zheng and
                  Meiming Shen and
                  Xinming Ou and
                  Min Wu},
  title        = {An Effective File Migration Algorithm in Cluster File Systems},
  booktitle    = {Proceedings of the 2000 International Workshop on Parallel Processing,
                  {ICPPW} 2000, Toronto, Canada, August 21-24, 2000},
  pages        = {329--336},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICPPW.2000.869119},
  doi          = {10.1109/ICPPW.2000.869119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/LiuZSOW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}