Search

Your search keyword '"Maochao Xu"' showing total 50 results

Search Constraints

Start Over You searched for: "Maochao Xu" Remove constraint "Maochao Xu" Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals
50 results on '"Maochao Xu"'

Search Results

1. A deep learning framework for predicting cyber attacks rates

2. Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study

4. SOME INEQUALITIES OF LINEAR COMBINATIONS OF INDEPENDENT RANDOM VARIABLES. I.

5. ON THE CONVOLUTION OF HETEROGENEOUS BERNOULLI RANDOM VARIABLES.

6. COMPARISONS OF PARALLEL SYSTEMS ACCORDING TO THE CONVEX TRANSFORM ORDER.

7. Reversed hazard rate order of equilibrium distributions and a related aging notion.

8. Comparison of pharmacy-based measures of medication adherence.

9. A New Aging Notion Based Upon the Revered Hazard Rate Order.

11. Statistical risk quantification of two-directional internet traffic flows.

12. The Economics of Ransomware Attacks on Integrated Supply Chain Networks.

13. Cyber Insurance Premium Setting for Multi-Site Companies under Risk Correlation.

14. Modelling and predicting enterprise-level cyber risks in the context of sparse data availability.

15. Modeling multivariate cyber risks: deep learning dating extreme value theory.

16. Statistical modeling of computer malware propagation dynamics in cyberspace.

17. Dependence analysis of regression models in time series.

18. Modeling Network Systems Under Simultaneous Cyber-Attacks.

19. INTEGRATING INTEGRITY: CONFRONTING DATA HARMS IN THE ADMINISTRATIVE AGE.

20. Modeling multivariate cybersecurity risks.

21. A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning.

22. Modeling and predicting extreme cyber attack rates via marked point processes.

24. ON THE QUASI-STATIONARY DISTRIBUTION OF SIS MODELS.

25. Discrete Truncated Power-Law Distributions.

26. Schur properties of convolutions of gamma random variables.

27. Asymmetry and revenue in second-price auctions: a majorization approach.

28. Analysis of Order Statistics from Distributions with Regularly Varying Tails.

29. On the skewness of order statistics with applications.

30. Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study.

31. COMMENTS ON “ORDERING PROPERTIES OF ORDER STATISTICS FROM HETEROGENEOUS POPULATIONS: A REVIEW WITH AN EMPHASIS ON SOME RECENT DEVELOPMENTS”.

32. Sustainability analysis of the urban ecosystem in Guangzhou City based on information entropy between 2004 and 2010.

34. SOME UNIFIED RESULTS ON COMPARING LINEAR COMBINATIONS OF INDEPENDENT GAMMA RANDOM VARIABLES.

35. ORDER STATISTICS FROM HETEROGENOUS NEGATIVE BINOMIAL RANDOM VARIABLES.

37. ON RESIDUAL LIFETIMES OF k-OUT-OF-n SYSTEMS WITH NONIDENTICAL COMPONEN.

38. Cyber Insurance Ratemaking: A Graph Mining Approach.

39. Stochastic comparisons of spacings of record values from one or two sample sequences.

40. STOCHASTIC COMPARISONS OF PARALLEL SYSTEMS WHEN COMPONENTS HAVE PROPORTIONAL HAZARD RATES.

41. Likelihood Ratio Order of m-Spacings in Multiple-Outlier Models.

42. A Systematic Mapping Study on Cyber Security Indicator Data.

44. AUTHORS' REJOINDER.

45. A deep learning framework for predicting cyber attacks rates.

48. CORRECTION TO ?STOCHASTIC COMPARISONS OF PARALLEL SYSTEMS WHEN COMPONENTS HAVE PROPORTIONAL HAZARD RATES?

49. 2013 Reviewers List.

Catalog

Books, media, physical & digital resources