Xinming (Simon) Ou
Xinming (Simon) Ou
Professor of Computer Science and Engineering, University of South Florida
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
MulVAL: A Logic-based Network Security Analyzer.
X Ou, S Govindavajhala, AW Appel
USENIX Security Symposium, 8-8, 2005
A scalable approach to attack graph generation
X Ou, WF Boyer, MA McQueen
Proceedings of the 13th ACM conference on Computer and communications …, 2006
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
F Wei, S Roy, X Ou
ACM Transactions on Privacy and Security (TOPS) 21 (3), 14, 2018
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
F Wei, S Roy, X Ou
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Deep ground truth analysis of current android malware
F Wei, Y Li, S Roy, X Ou, W Zhou
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
Towards a Theory of Moving Target Defense
R Zhuang, SA DeLoach, X Ou
Proceedings of the First ACM Workshop on Moving Target Defense, 31-40, 2014
Identifying critical attack assets in dependency attack graphs
RE Sawilla, X Ou
European Symposium on Research in Computer Security, 18-34, 2008
An empirical study on using the national vulnerability database to predict software vulnerabilities
S Zhang, D Caragea, X Ou
International Conference on Database and Expert Systems Applications, 217-231, 2011
Security risk analysis of enterprise networks using probabilistic attack graphs
A Singhal, X Ou
US Department of Commerce, National Institute of Standards and Technology, 2011
Cyber SA: Situational Awareness for Cyber Defense.
P Barford, M Dacier, TG Dietterich, M Fredrikson, JT Giffin, S Jajodia, ...
Cyber Situational Awareness 46 (1), 3-13, 2010
Theorem proving using lazy proof explication
C Flanagan, R Joshi, X Ou, JB Saxe
International Conference on Computer Aided Verification, 355-367, 2003
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
Simulation-based approaches to studying effectiveness of moving-target network defense
R Zhuang, S Zhang, SA DeLoach, X Ou, A Singhal
National Symposium on Moving Target Research, 2012
Dynamic typing with dependent types
X Ou, G Tan, Y Mandelbaum, D Walker
Exploring New Frontiers of Theoretical Informatics: IFIP 18th World Computer …, 2004
Improving attack graph visualization through data reduction and attack grouping
J Homer, A Varikuti, X Ou, MA McQueen
Visualization for Computer Security: 5th International Workshop, VizSec 2008 …, 2008
A Human Capital Model for Mitigating Security Analyst Burnout
SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ...
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 347-359, 2015
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud
S Zhang, X Zhang, X Ou
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Cyber-physical-social interdependencies and organizational resilience: A review of water, transportation, and cyber infrastructure systems and processes
S Mohebbi, Q Zhang, EC Wells, T Zhao, H Nguyen, M Li, ...
Sustainable Cities and Society 62, 102327, 2020
Android malware clustering through malicious payload mining
Y Li, J Jang, X Hu, X Ou
Technical Report 2017–1, Argus Cybersecurity Lab, University of South Florida, 2017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20