Follow
Maochao Xu
Title
Cited by
Cited by
Year
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security, 1175-1789, 2013
1712013
Modeling and predicting cyber hacking breaches
M Xu, KM Schweitzer, RM Bateman, S Xu
IEEE Transactions on Information Forensics and Security 13 (11), 2856-2871, 2018
1482018
Predicting Cyber Attack Rates with Extreme Values
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security, 2015
1422015
Cybersecurity insurance: Modeling and pricing
M Xu, L Hua
North American Actuarial Journal 23 (2), 220-249, 2019
1292019
A deep learning framework for predicting cyber attacks rates
X Fang, M Xu, S Xu, P Zhao
EURASIP Journal on Information security 2019, 1-11, 2019
1232019
Stochastic comparisons of parallel systems when components have proportional hazard rates
S Kochar, M Xu
Probability in the Engineering and Informational Sciences 21 (4), 597-609, 2007
1202007
Comparison of pharmacy-based measures of medication adherence
WM Vollmer, M Xu, A Feldstein, D Smith, A Waterbury, C Rand
BMC health services research 12, 1-8, 2012
1032012
Modeling multivariate cybersecurity risks
C Peng, M Xu, S Xu, T Hu
Journal of Applied Statistics 45 (15), 2718-2740, 2018
872018
Anti-diabetic activity of Vaccinium bracteatum Thunb. leaves’ polysaccharide in STZ-induced diabetic mice
L Wang, Y Zhang, M Xu, Y Wang, S Cheng, A Liebrecht, H Qian, H Zhang, ...
International journal of biological macromolecules 61, 317-321, 2013
842013
Modeling and predicting extreme cyber attack rates via marked point processes
C Peng, M Xu, S Xu, T Hu
Journal of Applied Statistics 44 (14), 2534-2563, 2017
732017
A vine copula model for predicting the effectiveness of cyber defense early-warning
M Xu, L Hua, S Xu
Technometrics 59 (4), 508-520, 2017
722017
Reversed hazard rate order of equilibrium distributions and a related aging notion
X Li, M Xu
Statistical Papers 49, 749-767, 2008
652008
Cyber Epidemic Models with Dependences
M Xu, G Da, S Xu
Internet Mathematics 11 (1), 62-92, 2015
632015
A framework for predicting data breach risk: Leveraging dependence to cope with sparsity
Z Fang, M Xu, S Xu, T Hu
IEEE Transactions on Information Forensics and Security 16, 2186-2201, 2021
582021
Comparisons of parallel systems according to the convex transform order
S Kochar, M Xu
Journal of Applied Probability 46 (2), 342-352, 2009
572009
Some results about MIT order and IMIT class of life distributions
X Li, M Xu
Probability in the Engineering and Informational Sciences 20 (3), 481-496, 2006
512006
An extended stochastic model for quantitative security analysis of networked systems
M Xu, S Xu
Internet Mathematics 8 (3), 288-320, 2012
492012
On residual lifetimes of k-out-of-n systems with nonidentical components
S Kochar, M Xu
Probability in the Engineering and Informational Sciences 24 (1), 109-127, 2010
482010
Negative dependence in frailty models
M Xu, X Li
Journal of Statistical Planning and Inference 138 (5), 1433-1441, 2008
482008
On the right spread order of convolutions of heterogeneous exponential random variables
S Kochar, M Xu
Journal of Multivariate Analysis 101 (1), 165-176, 2010
472010
The system can't perform the operation now. Try again later.
Articles 1–20