171 results on '"Maochao Xu"'
Search Results
2. Structural models for fog computing based internet of things architectures with insurance and risk management applications.
3. A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity.
4. Statistical Modeling of Data Breach Risks: Time to Identification and Notification.
5. Modeling Network Systems Under Simultaneous Cyber-Attacks.
6. A deep learning framework for predicting cyber attacks rates
7. Determination of ransomware payment based on Bayesian game models.
8. Joint Cyber Risk Assessment of Network Systems with Heterogeneous Components.
9. Pricing cyber insurance for a large-scale network.
10. Modeling and Predicting Cyber Hacking Breaches.
11. On the signature of complex system: A decomposed approach.
12. Defending a cyber system with early warning mechanism.
13. Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study
14. A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning.
15. Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization.
16. A multivariate frequency-severity framework for healthcare data breaches
17. Cyber attacks on PMU placement in a smart grid: Characterization and optimization.
18. Ensuring confidentiality and availability of sensitive data over a network system under cyber threats.
19. A Characterization of Cybersecurity Posture from Network Telescope Data.
20. Multivariate dependence among cyber risks based on L-hop propagation
21. Cyber risks of PMU networks with observation errors: Assessment and mitigation.
22. Predicting Cyber Attack Rates With Extreme Values.
23. Cyber Epidemic Models with Dependences.
24. Data Breach CAT Bonds: Modeling and Pricing
25. Statistical modeling of computer malware propagation dynamics in cyberspace
26. On the skewness of order statistics with applications.
27. On the Lorenz ordering of order statistics from exponential populations and some applications.
28. Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study.
29. A New Approach to Modeling and Analyzing Security of Networked Systems.
30. Cyber Epidemic Models with Dependences.
31. Predicting Cyber Attack Rates with Extreme Values.
32. A Characterization of Cybersecurity Posture from Network Telescope Data.
33. An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems.
34. Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study.
35. Dependence analysis of regression models in time series.
36. On the sample ranges from heterogeneous exponential variables.
37. An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems.
38. On the right spread order of convolutions of heterogeneous exponential random variables.
39. On the range of heterogeneous samples.
40. Modeling Malicious Hacking Data Breach Risks
41. Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory
42. Cybersecurity Insurance: Modeling and Pricing
43. Modeling and Predicting Cyber Hacking Breaches
44. A new approach to modeling and analyzing security of networked systems.
45. An efficient algorithm for computing the signatures of systems with exchangeable components and applications
46. On the signature of complex system: A decomposed approach
47. Modeling multivariate cybersecurity risks
48. Defending a cyber system with early warning mechanism
49. Ensuring confidentiality and availability of sensitive data over a network system under cyber threats
50. Cyber attacks on PMU placement in a smart grid: Characterization and optimization
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.