Follow
Xinming (Simon) Ou
Xinming (Simon) Ou
Professor of Computer Science and Engineering, University of South Florida
Verified email at usf.edu - Homepage
Title
Cited by
Cited by
Year
MulVAL: A Logic-based Network Security Analyzer.
X Ou, S Govindavajhala, AW Appel
USENIX Security Symposium, 8-8, 2005
8952005
A scalable approach to attack graph generation
X Ou, WF Boyer, MA McQueen
Proceedings of the 13th ACM conference on Computer and communications …, 2006
8812006
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
F Wei, S Roy, X Ou
ACM Transactions on Privacy and Security (TOPS) 21 (3), 14, 2018
5552018
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
F Wei, S Roy, X Ou
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
555*2014
Deep ground truth analysis of current android malware
F Wei, Y Li, S Roy, X Ou, W Zhou
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
5042017
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
3622010
Towards a Theory of Moving Target Defense
R Zhuang, SA DeLoach, X Ou
Proceedings of the First ACM Workshop on Moving Target Defense, 31-40, 2014
3002014
Identifying critical attack assets in dependency attack graphs
RE Sawilla, X Ou
European Symposium on Research in Computer Security, 18-34, 2008
2462008
An empirical study on using the national vulnerability database to predict software vulnerabilities
S Zhang, D Caragea, X Ou
International Conference on Database and Expert Systems Applications, 217-231, 2011
2172011
Security risk analysis of enterprise networks using probabilistic attack graphs
A Singhal, X Ou
US Department of Commerce, National Institute of Standards and Technology, 2011
200*2011
Cyber SA: Situational Awareness for Cyber Defense.
P Barford, M Dacier, TG Dietterich, M Fredrikson, JT Giffin, S Jajodia, ...
Cyber Situational Awareness 46 (1), 3-13, 2010
1922010
Theorem proving using lazy proof explication
C Flanagan, R Joshi, X Ou, JB Saxe
International Conference on Computer Aided Verification, 355-367, 2003
1632003
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
1552013
Dynamic typing with dependent types
X Ou, G Tan, Y Mandelbaum, D Walker
Exploring New Frontiers of Theoretical Informatics: IFIP 18th World Computer …, 2004
1322004
Simulation-based approaches to studying effectiveness of moving-target network defense
R Zhuang, S Zhang, SA DeLoach, X Ou, A Singhal
National Symposium on Moving Target Research, 2012
1312012
Improving attack graph visualization through data reduction and attack grouping
J Homer, A Varikuti, X Ou, MA McQueen
Visualization for Computer Security: 5th International Workshop, VizSec 2008 …, 2008
1282008
A Human Capital Model for Mitigating Security Analyst Burnout
SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ...
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 347-359, 2015
1082015
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud
S Zhang, X Zhang, X Ou
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1062014
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning
S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015
1042015
Investigating the application of moving target defenses to network security
R Zhuang, S Zhang, A Bardas, SA DeLoach, X Ou, A Singhal
2013 6th International Symposium on Resilient Control Systems (ISRCS), 162-169, 2013
1042013
The system can't perform the operation now. Try again later.
Articles 1–20