default search action
Maochao Xu
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c4]Jiahui Shao, Maochao Xu, Rui Fang, Xiaoxiao Hu, Weidong Shi, Dana Alsagheer:
Reconstitution of NFTs Based on a Game Theory Model. FC Workshops 2024: 313-334 - [i11]Xiaoyu Zhang, Maochao Xu, Shouhuai Xu:
Smart Home Cyber Insurance Pricing. CoRR abs/2408.13681 (2024) - [i10]Zhengming Li, Jianxi Su, Maochao Xu, Jimmy Yuen:
A Framework for Digital Asset Risks with Insurance Applications. CoRR abs/2408.17227 (2024) - 2023
- [j24]Xiaoyu Zhang, Maochao Xu, Jianxi Su, Peng Zhao:
Structural models for fog computing based internet of things architectures with insurance and risk management applications. Eur. J. Oper. Res. 305(3): 1273-1291 (2023) - [c3]Zheyuan Sun, Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Alexander Kott, Shouhuai Xu:
Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting. SciSec 2023: 60-81 - 2022
- [j23]Rui Fang, Maochao Xu, Peng Zhao:
Determination of ransomware payment based on Bayesian game models. Comput. Secur. 116: 102685 (2022) - [i9]Maochao Xu, Quynh Nhu Nguyen:
Statistical Modeling of Data Breach Risks: Time to Identification and Notification. CoRR abs/2209.07306 (2022) - 2021
- [j22]Weiyong Ding, Maochao Xu, Yu Huang, Peng Zhao, Fengyi Song:
Cyber attacks on PMU placement in a smart grid: Characterization and optimization. Reliab. Eng. Syst. Saf. 212: 107586 (2021) - [j21]Xiaoyu Zhang, Maochao Xu, Gaofeng Da, Peng Zhao:
Ensuring confidentiality and availability of sensitive data over a network system under cyber threats. Reliab. Eng. Syst. Saf. 214: 107697 (2021) - [j20]Zijian Fang, Maochao Xu, Shouhuai Xu, Taizhong Hu:
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity. IEEE Trans. Inf. Forensics Secur. 16: 2186-2201 (2021) - 2020
- [j19]Weiyong Ding, Maochao Xu, Yu Huang, Peng Zhao:
Cyber risks of PMU networks with observation errors: Assessment and mitigation. Reliab. Eng. Syst. Saf. 198: 106873 (2020) - [j18]Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, Yusheng Feng:
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. EAI Endorsed Trans. Security Safety 7(25): e4 (2020) - [i8]Gaofeng Da, Maochao Xu, Jingshi Zhang, Peng Zhao:
Joint Cyber Risk Assessment of Network Systems with Heterogeneous Components. CoRR abs/2006.16092 (2020) - [i7]Lei Hua, Maochao Xu:
Pricing cyber insurance for a large-scale network. CoRR abs/2007.00454 (2020)
2010 – 2019
- 2019
- [j17]Xing Fang, Maochao Xu, Shouhuai Xu, Peng Zhao:
A deep learning framework for predicting cyber attacks rates. EURASIP J. Inf. Secur. 2019: 5 (2019) - [j16]Gaofeng Da, Maochao Xu, Peng Zhao:
Modeling Network Systems Under Simultaneous Cyber-Attacks. IEEE Trans. Reliab. 68(3): 971-984 (2019) - 2018
- [j15]Gaofeng Da, Ping Shing Chan, Maochao Xu:
On the signature of complex system: A decomposed approach. Eur. J. Oper. Res. 265(3): 1115-1123 (2018) - [j14]Die Chen, Maochao Xu, Weidong Shi:
Defending a cyber system with early warning mechanism. Reliab. Eng. Syst. Saf. 169: 224-234 (2018) - [j13]Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Modeling and Predicting Cyber Hacking Breaches. IEEE Trans. Inf. Forensics Secur. 13(11): 2856-2871 (2018) - 2017
- [j12]Xiaoxiao Hu, Maochao Xu, Shouhuai Xu, Peng Zhao:
Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization. Reliab. Eng. Syst. Saf. 159: 119-133 (2017) - [j11]Maochao Xu, Lei Hua, Shouhuai Xu:
A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning. Technometrics 59(4): 508-520 (2017) - 2016
- [i6]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Predicting Cyber Attack Rates with Extreme Values. CoRR abs/1603.07432 (2016) - [i5]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study. CoRR abs/1603.07433 (2016) - [i4]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
A Characterization of Cybersecurity Posture from Network Telescope Data. CoRR abs/1603.07438 (2016) - [i3]Maochao Xu, Shouhuai Xu:
An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems. CoRR abs/1603.08304 (2016) - [i2]Gaofeng Da, Maochao Xu, Shouhuai Xu:
A New Approach to Modeling and Analyzing Security of Networked Systems. CoRR abs/1603.08305 (2016) - [i1]Maochao Xu, Gaofeng Da, Shouhuai Xu:
Cyber Epidemic Models with Dependences. CoRR abs/1603.08307 (2016) - 2015
- [j10]Maochao Xu, Gaofeng Da, Shouhuai Xu:
Cyber Epidemic Models with Dependences. Internet Math. 11(1): 62-92 (2015) - [j9]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Predicting Cyber Attack Rates With Extreme Values. IEEE Trans. Inf. Forensics Secur. 10(8): 1666-1677 (2015) - 2014
- [j8]Subhash C. Kochar, Maochao Xu:
On the skewness of order statistics with applications. Ann. Oper. Res. 212(1): 127-138 (2014) - [j7]Gaofeng Da, Maochao Xu, N. Balakrishnan:
On the Lorenz ordering of order statistics from exponential populations and some applications. J. Multivar. Anal. 127: 88-97 (2014) - [c2]Gaofeng Da, Maochao Xu, Shouhuai Xu:
A new approach to modeling and analyzing security of networked systems. HotSoS 2014: 6 - [c1]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
A Characterization of Cybersecurity Posture from Network Telescope Data. INTRUST 2014: 105-126 - 2013
- [j6]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study. IEEE Trans. Inf. Forensics Secur. 8(11): 1775-1789 (2013) - 2012
- [j5]Maochao Xu, Shouhuai Xu:
An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems. Internet Math. 8(3): 288-320 (2012) - [j4]Xuanhe Wang, Maochao Xu, Shengwang Meng:
Dependence analysis of regression models in time series. J. Syst. Sci. Complex. 25(6): 1136-1142 (2012) - [j3]Maochao Xu, N. Balakrishnan:
On the sample ranges from heterogeneous exponential variables. J. Multivar. Anal. 109: 1-9 (2012) - 2010
- [j2]Subhash C. Kochar, Maochao Xu:
On the right spread order of convolutions of heterogeneous exponential random variables. J. Multivar. Anal. 101(1): 165-176 (2010)
2000 – 2009
- 2009
- [j1]Christian Genest, Subhash C. Kochar, Maochao Xu:
On the range of heterogeneous samples. J. Multivar. Anal. 100(8): 1587-1592 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint