Xinming (Simon) Ou
Xinming (Simon) Ou
Professor of Computer Science and Engineering, University of South Florida
Verified email at - Homepage
Cited by
Cited by
A scalable approach to attack graph generation
X Ou, WF Boyer, MA McQueen
Proceedings of the 13th ACM conference on Computer and communications …, 2006
MulVAL: A Logic-based Network Security Analyzer.
X Ou, S Govindavajhala, AW Appel
USENIX Security Symposium, 8-8, 2005
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
F Wei, S Roy, X Ou
ACM Transactions on Privacy and Security (TOPS) 21 (3), 14, 2018
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps
F Wei, S Roy, X Ou
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Deep Ground Truth Analysis of Current Android Malware
F Wei, Y Li, S Roy, X Ou, W Zhou
International Conference on Detection of Intrusions and Malware, and …, 2017
Using Bayesian networks for cyber security analysis
P Xie, JH Li, X Ou, P Liu, R Levy
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
Towards a Theory of Moving Target Defense
R Zhuang, SA DeLoach, X Ou
Proceedings of the First ACM Workshop on Moving Target Defense, 31-40, 2014
Identifying critical attack assets in dependency attack graphs
RE Sawilla, X Ou
European Symposium on Research in Computer Security, 18-34, 2008
An empirical study on using the national vulnerability database to predict software vulnerabilities
S Zhang, D Caragea, X Ou
International Conference on Database and Expert Systems Applications, 217-231, 2011
Security risk analysis of enterprise networks using probabilistic attack graphs
A Singhal, X Ou
US Department of Commerce, National Institute of Standards and Technology, 2011
Cyber SA: Situational Awareness for Cyber Defense.
P Barford, M Dacier, TG Dietterich, M Fredrikson, JT Giffin, S Jajodia, ...
Cyber Situational Awareness 46 (1), 3-13, 2010
Theorem proving using lazy proof explication
C Flanagan, R Joshi, X Ou, JB Saxe
International Conference on Computer Aided Verification, 355-367, 2003
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
Dynamic typing with dependent types
X Ou, G Tan, Y Mandelbaum, D Walker
Exploring new frontiers of theoretical informatics, 437-450, 2004
Improving attack graph visualization through data reduction and attack grouping
J Homer, A Varikuti, X Ou, MA McQueen
International Workshop on Visualization for Computer Security, 68-79, 2008
Simulation-based approaches to studying effectiveness of moving-target network defense
R Zhuang, S Zhang, SA DeLoach, X Ou, A Singhal
National Symposium on Moving Target Research, 2012
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud
S Zhang, X Zhang, X Ou
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Investigating the application of moving target defenses to network security
R Zhuang, S Zhang, A Bardas, SA DeLoach, X Ou, A Singhal
2013 6th International Symposium on Resilient Control Systems (ISRCS), 162-169, 2013
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning
S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015
A Human Capital Model for Mitigating Security Analyst Burnout
S Chandran, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ...
SOUPS 2015, 347, 2015
The system can't perform the operation now. Try again later.
Articles 1–20