Papers


2023


2022


2021


2020


2019


2018


2017


2016

  • Risk analysis with execution-based model generation. Jaime C. Acosta, Edgar Padilla, John Homer, and Xinming Ou. Journal of Cyber Security and Information Systems, Vol 5, No. 1, December, 2016.

  • Android malware detection with weak ground truth data. Jordan DeLoach, Doina Caragea, and Xinming Ou.
    In 3rd International Workshop on Pattern Mining and Application of Big Data (BigPMA), Washington D.C., USA, December 5-8, 2016.

  • A bottom-up approach to applying graphical models in security analysis (invited paper). Xinming Ou. In Third International Workshop on Graphical Models for Security (GramSec’16), Lisbon, Portugal, June 27, 2016. Lecture Notes in Computer Science, Vol 9987, pp 1-24, September, 2016.

  • Turning contradictions into innovations or: How we learned to stop whining and improve security operations. Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, and S. Raj Rajagopalan. In Symposium On Usable Privacy and Security (SOUPS 2016), Denver, CO, USA, June 22-24, 2016. (Acceptance rate: 28%)


2015


2014


2013


2012


2011


2010

  • Using Bayesian Networks for cyber security analysis. Peng Xie, Jason H Li, Xinming Ou, Peng Liu, and Renato Levy. The 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), Chicago, USA, June 2010. (Acceptance rate: 23%)

2009


2008


2007

  • Googling attack graphs. Reginald Sawilla and Xinming Ou. Technical report, Defence R&D Canada – Ottawa TM 2007-205, September 2007.

2006


2005


2004

  • Dynamic typing with dependent types. Xinming Ou, Gang Tan, Yitzhak Mandelbaum, and David Walker. 3rd IFIP International Conference on Theoretical Computer Science (TCS 04), Toulouse, France, August 2004.

2003

The documents contained in these pages are included to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.