Zhenxin Zhan
Cited by
Cited by
Characterizing honeypot-captured cyber attacks: Statistical framework and case study
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security 8 (11), 1775-1789, 2013
Predicting Cyber Attack Rates with Extreme Values
Z Zhan, M Xu, S Xu
Information Forensics and Security, IEEE Transactions on, 1-1, 2015
Cross-layer detection of malicious websites
L Xu, Z Zhan, S Xu, K Ye
Proceedings of the third ACM conference on Data and application security and …, 2013
A stochastic model of multivirus dynamics
S Xu, W Lu, Z Zhan
IEEE Transactions on Dependable and Secure Computing 9 (1), 30-45, 2011
Adaptive epidemic dynamics in networks: Thresholds and control
S Xu, W Lu, L Xu, Z Zhan
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8 (4), 1-19, 2014
An evasion and counter-evasion study in malicious websites detection
L Xu, Z Zhan, S Xu, K Ye
2014 IEEE Conference on Communications and Network Security, 265-273, 2014
Method and system for resilient and adaptive detection of malicious websites
S XU, L Xu, Z ZHAN, K YE, K HAN, F Born
A characterization of cybersecurity posture from network telescope data
Z Zhan, M Xu, S Xu
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
Federated cloud security architecture for secure and agile clouds
W Luo, L Xu, Z Zhan, Q Zheng, S Xu
High performance cloud auditing and applications, 169-188, 2014
Trustworthy information: Concepts and mechanisms
S Xu, H Qian, F Wang, Z Zhan, E Bertino, R Sandhu
Web-Age Information Management: 11th International Conference, WAIM 2010 …, 2010
Supervised cross-modal factor analysis
J Wang, H Wang, Y Tu, K Duan, Z Zhan, S Chekuri
CoRR, vol. abs/1502.05134, 2015
Adaptive Epidemic Dynamics in Networks: Thresholds and Control
S Xu, W Lu, L Xu, Z Zhan
arXiv preprint arXiv:1311.2180, 2013
The system can't perform the operation now. Try again later.
Articles 1–12