An empirical study on using the national vulnerability database to predict software vulnerabilities S Zhang, D Caragea, X Ou Database and Expert Systems Applications, 217-231, 2011 | 233 | 2011 |
Aggregating vulnerability metrics in enterprise networks using attack graphs J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal Journal of Computer Security 21 (4), 561-597, 2013 | 174 | 2013 |
Simulation-based approaches to studying effectiveness of moving-target network defense R Zhuang, S Zhang, SA DeLoach, X Ou, A Singhal National Symposium on Moving Target Research, 2012 | 133 | 2012 |
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud S Zhang, X Zhang, X Ou Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 110 | 2014 |
Investigating the application of moving target defenses to network security R Zhuang, S Zhang, A Bardas, SA DeLoach, X Ou, A Singhal 2013 6th International Symposium on Resilient Control Systems (ISRCS), 162-169, 2013 | 104 | 2013 |
Predicting cyber risks through national vulnerability database S Zhang, X Ou, D Caragea Information Security Journal: A Global Perspective 24 (4-6), 194-206, 2015 | 90 | 2015 |
Distilling critical attack graph surface iteratively through minimum-cost sat solving H Huang, S Zhang, X Ou, A Prakash, K Sakallah Proceedings of the 27th Annual Computer Security Applications Conference, 31-40, 2011 | 82 | 2011 |
Model-driven, moving-target defense for enterprise network security SA DeLoach, X Ou, R Zhuang, S Zhang Models@ run. time: Foundations, Applications, and Roadmaps, 137-161, 2014 | 41 | 2014 |
Effective network vulnerability assessment through model abstraction S Zhang, X Ou, J Homer Detection of Intrusions and Malware, and Vulnerability Assessment, 17-34, 2011 | 32 | 2011 |
Assessing attack surface with component-based package dependency S Zhang, X Zhang, X Ou, L Chen, N Edwards, J Jin Network and System Security, 405-417, 2015 | 30 | 2015 |
An empirical study of a vulnerability metric aggregation method S Zhang, X Ou, A Singhal, J Homer International Conference on Security and Management, 2011 | 20 | 2011 |
Deep-diving into an easily-overlooked threat: Inter-VM attacks S Zhang Kansas State University, 2012 | 14 | 2012 |
Quantitative Risk Assessment under Multi-Context Environments S Zhang Kansas State University, 2014 | 9 | 2014 |