Characterizing honeypot-captured cyber attacks: Statistical framework and case study Z Zhan, M Xu, S Xu IEEE Transactions on Information Forensics and Security 8 (11), 1775-1789, 2013 | 167 | 2013 |
Predicting Cyber Attack Rates with Extreme Values Z Zhan, M Xu, S Xu Information Forensics and Security, IEEE Transactions on, 1-1, 2015 | 141 | 2015 |
Cross-layer detection of malicious websites L Xu, Z Zhan, S Xu, K Ye Proceedings of the third ACM conference on Data and application security and …, 2013 | 131 | 2013 |
A stochastic model of multivirus dynamics S Xu, W Lu, Z Zhan IEEE Transactions on Dependable and Secure Computing 9 (1), 30-45, 2011 | 120 | 2011 |
Adaptive epidemic dynamics in networks: Thresholds and control S Xu, W Lu, L Xu, Z Zhan ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8 (4), 1-19, 2014 | 116 | 2014 |
An evasion and counter-evasion study in malicious websites detection L Xu, Z Zhan, S Xu, K Ye 2014 IEEE Conference on Communications and Network Security, 265-273, 2014 | 65 | 2014 |
Method and system for resilient and adaptive detection of malicious websites S XU, L Xu, Z ZHAN, K YE, K HAN, F Born | 39 | 2013 |
A characterization of cybersecurity posture from network telescope data Z Zhan, M Xu, S Xu Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015 | 32 | 2015 |
Federated cloud security architecture for secure and agile clouds W Luo, L Xu, Z Zhan, Q Zheng, S Xu High performance cloud auditing and applications, 169-188, 2014 | 17 | 2014 |
Trustworthy information: Concepts and mechanisms S Xu, H Qian, F Wang, Z Zhan, E Bertino, R Sandhu Web-Age Information Management: 11th International Conference, WAIM 2010 …, 2010 | 10 | 2010 |
Supervised cross-modal factor analysis J Wang, H Wang, Y Tu, K Duan, Z Zhan, S Chekuri CoRR, vol. abs/1502.05134, 2015 | 1 | 2015 |
Adaptive Epidemic Dynamics in Networks: Thresholds and Control S Xu, W Lu, L Xu, Z Zhan arXiv preprint arXiv:1311.2180, 2013 | | 2013 |