Xinming (Simon) Ou
Xinming (Simon) Ou
Professor of Computer Science and Engineering, University of South Florida
Verified email at usf.edu - Homepage
Title
Cited by
Cited by
Year
A scalable approach to attack graph generation
X Ou, WF Boyer, MA McQueen
Proceedings of the 13th ACM conference on Computer and communications …, 2006
6312006
MulVAL: A Logic-based Network Security Analyzer.
X Ou, S Govindavajhala, AW Appel
USENIX Security Symposium, 8-8, 2005
5842005
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
F Wei, S Roy, X Ou
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3612014
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
2212010
Identifying critical attack assets in dependency attack graphs
RE Sawilla, X Ou
European Symposium on Research in Computer Security, 18-34, 2008
1812008
Towards a Theory of Moving Target Defense
R Zhuang, SA DeLoach, X Ou
Proceedings of the First ACM Workshop on Moving Target Defense, 31-40, 2014
1552014
Theorem proving using lazy proof explication
C Flanagan, R Joshi, X Ou, JB Saxe
International Conference on Computer Aided Verification, 355-367, 2003
1522003
Deep Ground Truth Analysis of Current Android Malware
F Wei, Y Li, S Roy, X Ou, W Zhou
International Conference on Detection of Intrusions and Malware, and …, 2017
1322017
An empirical study on using the national vulnerability database to predict software vulnerabilities
S Zhang, D Caragea, X Ou
International Conference on Database and Expert Systems Applications, 217-231, 2011
1302011
Cyber SA: Situational Awareness for Cyber Defense.
P Barford, M Dacier, TG Dietterich, M Fredrikson, JT Giffin, S Jajodia, ...
Cyber Situational Awareness 46 (1), 3-13, 2010
1242010
Security risk analysis of enterprise networks using probabilistic attack graphs
A Singhal, X Ou
US Department of Commerce, National Institute of Standards and Technology, 2011
111*2011
Dynamic typing with dependent types
X Ou, G Tan, Y Mandelbaum, D Walker
Exploring new frontiers of theoretical informatics, 437-450, 2004
1002004
Improving attack graph visualization through data reduction and attack grouping
J Homer, A Varikuti, X Ou, MA McQueen
International Workshop on Visualization for Computer Security, 68-79, 2008
962008
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
882013
Simulation-based approaches to studying effectiveness of moving-target network defense
R Zhuang, S Zhang, SA DeLoach, X Ou, A Singhal
National Symposium on Moving Target Research, 2012
862012
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud
S Zhang, X Zhang, X Ou
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
762014
Investigating the application of moving target defenses to network security
R Zhuang, S Zhang, A Bardas, SA DeLoach, X Ou, A Singhal
2013 6th International Symposium on Resilient Control Systems (ISRCS), 162-169, 2013
752013
A sound and practical approach to quantifying security risk in enterprise networks
J Homer, X Ou, D Schmidt
Kansas State University Technical Report, 1-15, 2009
672009
Distilling critical attack graph surface iteratively through minimum-cost SAT solving
H Huang, S Zhang, X Ou, A Prakash, K Sakallah
Proceedings of the 27th Annual Computer Security Applications Conference, 31-40, 2011
642011
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning
S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015
592015
The system can't perform the operation now. Try again later.
Articles 1–20