Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

Stram: Measuring the trustworthiness of computer-based systems

JH Cho, S Xu, PM Hurley, M Mackay… - ACM Computing …, 2019 - dl.acm.org
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …

Modeling and predicting cyber hacking breaches

M Xu, KM Schweitzer, RM Bateman… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Analyzing cyber incident data sets is an important method for deepening our understanding
of the evolution of the threat situation. This is a relatively new research topic, and many …

Modeling multivariate cybersecurity risks

C Peng, M Xu, S Xu, T Hu - Journal of Applied Statistics, 2018 - Taylor & Francis
Modeling cybersecurity risks is an important, yet challenging, problem. In this paper, we
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …

Cybersecurity dynamics: A foundation for the science of cybersecurity

S Xu - Proactive and dynamic network defense, 2019 - Springer
Cybersecurity Dynamics is new concept that aims to achieve the modeling, analysis,
quantification, and management of cybersecurity from a holistic perspective, rather than from …

A case study on using deep learning for network intrusion detection

GC Fernández, S Xu - MILCOM 2019-2019 IEEE Military …, 2019 - ieeexplore.ieee.org
Deep Learning has been very successful in many application domains. However, its
usefulness in the context of network intrusion detection has not been systematically …

Metrics towards measuring cyber agility

JD Mireles, E Ficke, JH Cho… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In cyberspace, evolutionary strategies are commonly used by both attackers and defenders.
For example, an attacker's strategy often changes over the course of time, as new …

The cybersecurity dynamics way of thinking and landscape

S Xu - Proceedings of the 7th ACM Workshop on Moving …, 2020 - dl.acm.org
The Cybersecurity Dynamics framework offers an approach to systematically understanding,
characterizing, quantifying and managing cybersecurity from a holistic perspective. The …

A vine copula model for predicting the effectiveness of cyber defense early-warning

M Xu, L Hua, S Xu - Technometrics, 2017 - Taylor & Francis
abstract Internet-based computer information systems play critical roles in many aspects of
modern society. However, these systems are constantly under cyber attacks that can cause …

Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning

J Zhao, X Liu, Q Yan, B Li, M Shao, H Peng, L Sun - computers & security, 2021 - Elsevier
Predicting cyber attack preference of intruders is essential for security organizations to
demystify attack intents and proactively handle oncoming cyber threats. In order to …