Su Zhang
Su Zhang
Head and Director of Security at Autox Inc.
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
An empirical study on using the national vulnerability database to predict software vulnerabilities
S Zhang, D Caragea, X Ou
Database and Expert Systems Applications, 217-231, 2011
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
Simulation-based approaches to studying effectiveness of moving-target network defense
R Zhuang, S Zhang, SA DeLoach, X Ou, A Singhal
National Symposium on Moving Target Research, 2012
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud
S Zhang, X Zhang, X Ou
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Investigating the application of moving target defenses to network security
R Zhuang, S Zhang, A Bardas, SA DeLoach, X Ou, A Singhal
2013 6th International Symposium on Resilient Control Systems (ISRCS), 162-169, 2013
Distilling critical attack graph surface iteratively through minimum-cost sat solving
H Huang, S Zhang, X Ou, A Prakash, K Sakallah
Proceedings of the 27th Annual Computer Security Applications Conference, 31-40, 2011
Predicting cyber risks through national vulnerability database
S Zhang, X Ou, D Caragea
Information Security Journal: A Global Perspective 24 (4-6), 194-206, 2015
Model-driven, moving-target defense for enterprise network security
SA DeLoach, X Ou, R Zhuang, S Zhang
Models@ run. time: Foundations, Applications, and Roadmaps, 137-161, 2014
Effective network vulnerability assessment through model abstraction
S Zhang, X Ou, J Homer
Detection of Intrusions and Malware, and Vulnerability Assessment, 17-34, 2011
Assessing attack surface with component-based package dependency
S Zhang, X Zhang, X Ou, L Chen, N Edwards, J Jin
Network and System Security, 405-417, 2015
An empirical study of a vulnerability metric aggregation method
S Zhang, X Ou, A Singhal, J Homer
International Conference on Security and Management, 2011
Deep-diving into an easily-overlooked threat: Inter-VM attacks
S Zhang
Kansas State University, 2012
Quantitative Risk Assessment under Multi-Context Environments
S Zhang
Kansas State University, 2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–13