• Android malware clustering through malicious payload mining. Yuping Li, Jiyong Jang, Xin Hu, and Xinming Ou. In the 20th International Symposium on Research on Attacks, Intrusions and Defenses (RAID 2017), Atlanta, GA, September 18-20, 2017. (Acceptance rate: 20%)

  • MTD CBITS: Moving target defense for cloud-based IT systems Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott A. Deloach. European Symposium on Research in Computer Security (ESORICS’17), Oslo, Norway, September 11-13, 2017.


  • Risk analysis with execution-based model generation. Jaime C. Acosta, Edgar Padilla, John Homer, and Xinming Ou. Journal of Cyber Security and Information Systems, Vol 5, No. 1, December, 2016.

  • Android malware detection with weak ground truth data. Jordan DeLoach, Doina Caragea, and Xinming Ou. In 3rd International Workshop on Pattern Mining and Application of Big Data (BigPMA), Washington D.C., USA, December 5-8, 2016.

  • A bottom-up approach to applying graphical models in security analysis (invited paper). Xinming Ou. In Third International Workshop on Graphical Models for Security (GramSec’16), Lisbon, Portugal, June 27, 2016. Lecture Notes in Computer Science, Vol 9987, pp 1-24, September, 2016.

  • Turning contradictions into innovations or: How we learned to stop whining and improve security operations. Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, and S. Raj Rajagopalan. In Symposium On Usable Privacy and Security (SOUPS 2016), Denver, CO, USA, June 22-24, 2016. (Acceptance rate: 28%)







  • Using Bayesian Networks for cyber security analysis. Peng Xie, Jason H Li, Xinming Ou, Peng Liu, and Renato Levy. The 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), Chicago, USA, June 2010. (Acceptance rate: 23%)




  • Googling attack graphs. Reginald Sawilla and Xinming Ou. Technical report, Defence R&D Canada – Ottawa TM 2007-205, September 2007.




  • Dynamic typing with dependent types. Xinming Ou, Gang Tan, Yitzhak Mandelbaum, and David Walker. 3rd IFIP International Conference on Theoretical Computer Science (TCS 04), Toulouse, France, August 2004.


The documents contained in these pages are included to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.