default search action
BibTeX records: Maochao Xu
@article{DBLP:journals/eor/ZhangXSZ23, author = {Xiaoyu Zhang and Maochao Xu and Jianxi Su and Peng Zhao}, title = {Structural models for fog computing based internet of things architectures with insurance and risk management applications}, journal = {Eur. J. Oper. Res.}, volume = {305}, number = {3}, pages = {1273--1291}, year = {2023}, url = {https://doi.org/10.1016/j.ejor.2022.07.033}, doi = {10.1016/J.EJOR.2022.07.033}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/ZhangXSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/SunXSBKX23, author = {Zheyuan Sun and Maochao Xu and Kristin M. Schweitzer and Raymond M. Bateman and Alexander Kott and Shouhuai Xu}, editor = {Moti Yung and Chao Chen and Weizhi Meng}, title = {Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting}, booktitle = {Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14299}, pages = {60--81}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45933-7\_4}, doi = {10.1007/978-3-031-45933-7\_4}, timestamp = {Wed, 06 Dec 2023 13:43:04 +0100}, biburl = {https://dblp.org/rec/conf/scisec/SunXSBKX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FangXZ22, author = {Rui Fang and Maochao Xu and Peng Zhao}, title = {Determination of ransomware payment based on Bayesian game models}, journal = {Comput. Secur.}, volume = {116}, pages = {102685}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102685}, doi = {10.1016/J.COSE.2022.102685}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FangXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-07306, author = {Maochao Xu and Quynh Nhu Nguyen}, title = {Statistical Modeling of Data Breach Risks: Time to Identification and Notification}, journal = {CoRR}, volume = {abs/2209.07306}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.07306}, doi = {10.48550/ARXIV.2209.07306}, eprinttype = {arXiv}, eprint = {2209.07306}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-07306.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/DingXHZS21, author = {Weiyong Ding and Maochao Xu and Yu Huang and Peng Zhao and Fengyi Song}, title = {Cyber attacks on {PMU} placement in a smart grid: Characterization and optimization}, journal = {Reliab. Eng. Syst. Saf.}, volume = {212}, pages = {107586}, year = {2021}, url = {https://doi.org/10.1016/j.ress.2021.107586}, doi = {10.1016/J.RESS.2021.107586}, timestamp = {Thu, 27 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ress/DingXHZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/ZhangXDZ21, author = {Xiaoyu Zhang and Maochao Xu and Gaofeng Da and Peng Zhao}, title = {Ensuring confidentiality and availability of sensitive data over a network system under cyber threats}, journal = {Reliab. Eng. Syst. Saf.}, volume = {214}, pages = {107697}, year = {2021}, url = {https://doi.org/10.1016/j.ress.2021.107697}, doi = {10.1016/J.RESS.2021.107697}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/ZhangXDZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FangXXH21, author = {Zijian Fang and Maochao Xu and Shouhuai Xu and Taizhong Hu}, title = {A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {2186--2201}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3051804}, doi = {10.1109/TIFS.2021.3051804}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FangXXH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/DingXHZ20, author = {Weiyong Ding and Maochao Xu and Yu Huang and Peng Zhao}, title = {Cyber risks of {PMU} networks with observation errors: Assessment and mitigation}, journal = {Reliab. Eng. Syst. Saf.}, volume = {198}, pages = {106873}, year = {2020}, url = {https://doi.org/10.1016/j.ress.2020.106873}, doi = {10.1016/J.RESS.2020.106873}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ress/DingXHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Trieu-DoGXXF20, author = {Van Trieu{-}Do and Richard Garcia{-}Lebron and Maochao Xu and Shouhuai Xu and Yusheng Feng}, title = {Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {25}, pages = {e4}, year = {2020}, url = {https://doi.org/10.4108/eai.11-5-2021.169912}, doi = {10.4108/EAI.11-5-2021.169912}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Trieu-DoGXXF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-16092, author = {Gaofeng Da and Maochao Xu and Jingshi Zhang and Peng Zhao}, title = {Joint Cyber Risk Assessment of Network Systems with Heterogeneous Components}, journal = {CoRR}, volume = {abs/2006.16092}, year = {2020}, url = {https://arxiv.org/abs/2006.16092}, eprinttype = {arXiv}, eprint = {2006.16092}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-16092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-00454, author = {Lei Hua and Maochao Xu}, title = {Pricing cyber insurance for a large-scale network}, journal = {CoRR}, volume = {abs/2007.00454}, year = {2020}, url = {https://arxiv.org/abs/2007.00454}, eprinttype = {arXiv}, eprint = {2007.00454}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-00454.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FangXXZ19, author = {Xing Fang and Maochao Xu and Shouhuai Xu and Peng Zhao}, title = {A deep learning framework for predicting cyber attacks rates}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {5}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0090-6}, doi = {10.1186/S13635-019-0090-6}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/FangXXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/DaXZ19, author = {Gaofeng Da and Maochao Xu and Peng Zhao}, title = {Modeling Network Systems Under Simultaneous Cyber-Attacks}, journal = {{IEEE} Trans. Reliab.}, volume = {68}, number = {3}, pages = {971--984}, year = {2019}, url = {https://doi.org/10.1109/TR.2019.2911106}, doi = {10.1109/TR.2019.2911106}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/DaXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/DaCX18, author = {Gaofeng Da and Ping Shing Chan and Maochao Xu}, title = {On the signature of complex system: {A} decomposed approach}, journal = {Eur. J. Oper. Res.}, volume = {265}, number = {3}, pages = {1115--1123}, year = {2018}, url = {https://doi.org/10.1016/j.ejor.2017.08.052}, doi = {10.1016/J.EJOR.2017.08.052}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/DaCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/ChenXS18, author = {Die Chen and Maochao Xu and Weidong Shi}, title = {Defending a cyber system with early warning mechanism}, journal = {Reliab. Eng. Syst. Saf.}, volume = {169}, pages = {224--234}, year = {2018}, url = {https://doi.org/10.1016/j.ress.2017.08.021}, doi = {10.1016/J.RESS.2017.08.021}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/ChenXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuSBX18, author = {Maochao Xu and Kristin M. Schweitzer and Raymond M. Bateman and Shouhuai Xu}, title = {Modeling and Predicting Cyber Hacking Breaches}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {11}, pages = {2856--2871}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2834227}, doi = {10.1109/TIFS.2018.2834227}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuSBX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/HuXXZ17, author = {Xiaoxiao Hu and Maochao Xu and Shouhuai Xu and Peng Zhao}, title = {Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization}, journal = {Reliab. Eng. Syst. Saf.}, volume = {159}, pages = {119--133}, year = {2017}, url = {https://doi.org/10.1016/j.ress.2016.10.025}, doi = {10.1016/J.RESS.2016.10.025}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/HuXXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/technometrics/XuHX17, author = {Maochao Xu and Lei Hua and Shouhuai Xu}, title = {A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning}, journal = {Technometrics}, volume = {59}, number = {4}, pages = {508--520}, year = {2017}, url = {https://doi.org/10.1080/00401706.2016.1256841}, doi = {10.1080/00401706.2016.1256841}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/technometrics/XuHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhanXX16, author = {Zhenxin Zhan and Maochao Xu and Shouhuai Xu}, title = {Predicting Cyber Attack Rates with Extreme Values}, journal = {CoRR}, volume = {abs/1603.07432}, year = {2016}, url = {http://arxiv.org/abs/1603.07432}, eprinttype = {arXiv}, eprint = {1603.07432}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhanXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhanXX16a, author = {Zhenxin Zhan and Maochao Xu and Shouhuai Xu}, title = {Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study}, journal = {CoRR}, volume = {abs/1603.07433}, year = {2016}, url = {http://arxiv.org/abs/1603.07433}, eprinttype = {arXiv}, eprint = {1603.07433}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhanXX16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhanXX16b, author = {Zhenxin Zhan and Maochao Xu and Shouhuai Xu}, title = {A Characterization of Cybersecurity Posture from Network Telescope Data}, journal = {CoRR}, volume = {abs/1603.07438}, year = {2016}, url = {http://arxiv.org/abs/1603.07438}, eprinttype = {arXiv}, eprint = {1603.07438}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhanXX16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XuX16, author = {Maochao Xu and Shouhuai Xu}, title = {An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems}, journal = {CoRR}, volume = {abs/1603.08304}, year = {2016}, url = {http://arxiv.org/abs/1603.08304}, eprinttype = {arXiv}, eprint = {1603.08304}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/XuX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DaXX16, author = {Gaofeng Da and Maochao Xu and Shouhuai Xu}, title = {A New Approach to Modeling and Analyzing Security of Networked Systems}, journal = {CoRR}, volume = {abs/1603.08305}, year = {2016}, url = {http://arxiv.org/abs/1603.08305}, eprinttype = {arXiv}, eprint = {1603.08305}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DaXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XuDX16, author = {Maochao Xu and Gaofeng Da and Shouhuai Xu}, title = {Cyber Epidemic Models with Dependences}, journal = {CoRR}, volume = {abs/1603.08307}, year = {2016}, url = {http://arxiv.org/abs/1603.08307}, eprinttype = {arXiv}, eprint = {1603.08307}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/XuDX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/XuDX15, author = {Maochao Xu and Gaofeng Da and Shouhuai Xu}, title = {Cyber Epidemic Models with Dependences}, journal = {Internet Math.}, volume = {11}, number = {1}, pages = {62--92}, year = {2015}, url = {https://doi.org/10.1080/15427951.2014.902407}, doi = {10.1080/15427951.2014.902407}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/XuDX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhanXX15, author = {Zhenxin Zhan and Maochao Xu and Shouhuai Xu}, title = {Predicting Cyber Attack Rates With Extreme Values}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1666--1677}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2422261}, doi = {10.1109/TIFS.2015.2422261}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhanXX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/anor/KocharX14, author = {Subhash C. Kochar and Maochao Xu}, title = {On the skewness of order statistics with applications}, journal = {Ann. Oper. Res.}, volume = {212}, number = {1}, pages = {127--138}, year = {2014}, url = {https://doi.org/10.1007/s10479-012-1212-4}, doi = {10.1007/S10479-012-1212-4}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/anor/KocharX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ma/DaXB14, author = {Gaofeng Da and Maochao Xu and N. Balakrishnan}, title = {On the Lorenz ordering of order statistics from exponential populations and some applications}, journal = {J. Multivar. Anal.}, volume = {127}, pages = {88--97}, year = {2014}, url = {https://doi.org/10.1016/j.jmva.2014.02.005}, doi = {10.1016/J.JMVA.2014.02.005}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ma/DaXB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/DaXX14, author = {Gaofeng Da and Maochao Xu and Shouhuai Xu}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {A new approach to modeling and analyzing security of networked systems}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600184}, doi = {10.1145/2600176.2600184}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/DaXX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/ZhanXX14, author = {Zhenxin Zhan and Maochao Xu and Shouhuai Xu}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {A Characterization of Cybersecurity Posture from Network Telescope Data}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {105--126}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_7}, doi = {10.1007/978-3-319-27998-5\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/ZhanXX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhanXX13, author = {Zhenxin Zhan and Maochao Xu and Shouhuai Xu}, title = {Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {11}, pages = {1775--1789}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2279800}, doi = {10.1109/TIFS.2013.2279800}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhanXX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/im/XuX12, author = {Maochao Xu and Shouhuai Xu}, title = {An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems}, journal = {Internet Math.}, volume = {8}, number = {3}, pages = {288--320}, year = {2012}, url = {https://doi.org/10.1080/15427951.2012.654480}, doi = {10.1080/15427951.2012.654480}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/im/XuX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/WangXM12, author = {Xuanhe Wang and Maochao Xu and Shengwang Meng}, title = {Dependence analysis of regression models in time series}, journal = {J. Syst. Sci. Complex.}, volume = {25}, number = {6}, pages = {1136--1142}, year = {2012}, url = {https://doi.org/10.1007/s11424-012-1091-4}, doi = {10.1007/S11424-012-1091-4}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/WangXM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ma/XuB12, author = {Maochao Xu and N. Balakrishnan}, title = {On the sample ranges from heterogeneous exponential variables}, journal = {J. Multivar. Anal.}, volume = {109}, pages = {1--9}, year = {2012}, url = {https://doi.org/10.1016/j.jmva.2012.02.009}, doi = {10.1016/J.JMVA.2012.02.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ma/XuB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ma/KocharX10, author = {Subhash C. Kochar and Maochao Xu}, title = {On the right spread order of convolutions of heterogeneous exponential random variables}, journal = {J. Multivar. Anal.}, volume = {101}, number = {1}, pages = {165--176}, year = {2010}, url = {https://doi.org/10.1016/j.jmva.2009.07.001}, doi = {10.1016/J.JMVA.2009.07.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ma/KocharX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ma/GenestKX09, author = {Christian Genest and Subhash C. Kochar and Maochao Xu}, title = {On the range of heterogeneous samples}, journal = {J. Multivar. Anal.}, volume = {100}, number = {8}, pages = {1587--1592}, year = {2009}, url = {https://doi.org/10.1016/j.jmva.2009.01.001}, doi = {10.1016/J.JMVA.2009.01.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ma/GenestKX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.