Search

Your search keyword '"Maochao Xu"' showing total 46 results

Search Constraints

Start Over You searched for: "Maochao Xu" Remove constraint "Maochao Xu" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
46 results on '"Maochao Xu"'

Search Results

1. A deep learning framework for predicting cyber attacks rates

3. Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study

4. Statistical modeling of computer malware propagation dynamics in cyberspace

5. Modeling Network Systems Under Simultaneous Cyber-Attacks

7. Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory

8. On the signature of complex system: A decomposed approach

9. A deep learning framework for predicting cyber attacks rates

10. Predicting Cyber Attack Rates with Extreme Values

11. On the skewness of order statistics with applications

12. On the sample ranges from heterogeneous exponential variables

13. SOME UNIFIED RESULTS ON COMPARING LINEAR COMBINATIONS OF INDEPENDENT GAMMA RANDOM VARIABLES

14. Some Inequalities of Linear Combinations of Independent Random Variables. I

15. On the right spread order of convolutions of heterogeneous exponential random variables

16. ON RESIDUAL LIFETIMES OF k-OUT-OF-n SYSTEMS WITH NONIDENTICAL COMPONENTS

17. On the range of heterogeneous samples

18. Comparisons of Parallel Systems According to the Convex Transform Order

19. Comparisons of Parallel Systems According to the Convex Transform Order

20. A new dependence ordering with applications

21. A Characterization of Cybersecurity Posture from Network Telescope Data

22. A new approach to modeling and analyzing security of networked systems

23. Some inequalities of linear combinations of independent random variables: II

24. Comparison of pharmacy-based measures of medication adherence

25. An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems

26. On the convolution of heterogeneous Bernoulli random variables

27. On the skewness of order statistics in multiple-outlier models

28. Stochastic Orders in Heterogeneous Samples with Applications

29. CORRECTION TO 'STOCHASTIC COMPARISONS OF PARALLEL SYSTEMS WHEN COMPONENTS HAVE PROPORTIONAL HAZARD RATES'

30. SOME INEQUALITIES OF LINEAR COMBINATIONS OF INDEPENDENT RANDOM VARIABLES. I.

31. ON THE CONVOLUTION OF HETEROGENEOUS BERNOULLI RANDOM VARIABLES.

32. COMPARISONS OF PARALLEL SYSTEMS ACCORDING TO THE CONVEX TRANSFORM ORDER.

33. Comparison of pharmacy-based measures of medication adherence.

34. Cyber Insurance Premium Setting for Multi-Site Companies under Risk Correlation.

35. Modeling multivariate cyber risks: deep learning dating extreme value theory.

36. Statistical modeling of computer malware propagation dynamics in cyberspace.

37. Modeling Network Systems Under Simultaneous Cyber-Attacks.

38. INTEGRATING INTEGRITY: CONFRONTING DATA HARMS IN THE ADMINISTRATIVE AGE.

39. On the skewness of order statistics with applications.

41. Cyber Insurance Ratemaking: A Graph Mining Approach.

42. A Systematic Mapping Study on Cyber Security Indicator Data.

44. A deep learning framework for predicting cyber attacks rates.

46. Researchers' Work from University of Texas San Antonio Focuses on Information and Data Security (A Framework for Predicting Data Breach Risk: Leveraging Dependence To Cope With Sparsity)

Catalog

Books, media, physical & digital resources