(How) Can We Manage the Trustworthiness of Security Infrastructures and Services? S Xu 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 6-6, 2008 | 2 | 2008 |
{Near-Ultrasound} Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone Q Xia, Q Chen, S Xu 32nd USENIX Security Symposium (USENIX Security 23), 4589-4606, 2023 | 5 | 2023 |
VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection D Zou, S Wang, S Xu, Z Li, H Jin IEEE Transactions on Dependable and Secure Computing 18 (5), 2224-2236, 2019 | 295 | 2019 |
A case study on using deep learning for network intrusion detection GC Fernández, S Xu MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 1-6, 2019 | 57 | 2019 |
A Characterization of Complex Network Attack Resilience A Tyra University of Texas at San Antonio, 2012 | 2 | 2012 |
A characterization of cybersecurity posture from network telescope data Z Zhan, M Xu, S Xu Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015 | 32 | 2015 |
A characterization of the problem of secure provenance management S Xu, Q Ni, E Bertino, R Sandhu 2009 IEEE International Conference on Intelligence and Security Informatics …, 2009 | 29 | 2009 |
A control flow graph-based signature for packer identification M Saleh, EP Ratazzi, S Xu MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 683-688, 2017 | 13 | 2017 |
A Coupling Approach to Analyzing Games with Dynamic Environments BC Collins, S Xu, PN Brown arXiv preprint arXiv:2207.06504, 2022 | | 2022 |
A dataset generator for next generation system call host intrusion detection systems M Pendleton, S Xu MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 231-236, 2017 | 22 | 2017 |
A deep learning framework for predicting cyber attacks rates X Fang, M Xu, S Xu, P Zhao EURASIP Journal on Information security 2019, 1-11, 2019 | 106 | 2019 |
A first step towards characterizing stealthy botnets J Leonard, S Xu, R Sandhu 2009 International Conference on Availability, Reliability and Security, 106-113, 2009 | 10 | 2009 |
A Flexible Framework for Secret Handshakes: Multi-party Anonymous and Un-observable Authentication G Tsudik, S Xu Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006 | 83 | 2006 |
A Framework for Characterizing Cyber Attack Reconnaissance Behaviors R Garcia-Lebron University of Texas at San Antonio, 2019 | | 2019 |
A framework for characterizing the evolution of cyber attacker-victim relation graphs RB Garcia-Lebron, KM Schweitzer, RM Bateman, S Xu MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 70-75, 2018 | 10 | 2018 |
A framework for enhancing deep neural networks against adversarial malware D Li, Q Li, Y Ye, S Xu IEEE Transactions on Network Science and Engineering 8 (1), 736-750, 2021 | 72* | 2021 |
A framework for predicting data breach risk: Leveraging dependence to cope with sparsity Z Fang, M Xu, S Xu, T Hu IEEE Transactions on Information Forensics and Security 16, 2186-2201, 2021 | 41 | 2021 |
A Framework for Quantifying Security Effectiveness of Cyber Defenses H Chen, S Xu University of Texas at San Antonio, 2021 | | 2021 |
A framework for understanding botnets J Leonard, S Xu, R Sandhu 2009 International Conference on Availability, Reliability and Security, 917-922, 2009 | 61 | 2009 |
A method for safekeeping cryptographic keys from memory disclosure attacks TP Parker, S Xu Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010 | 35 | 2010 |