ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1601.05792
  4. Cited By
A Survey on Security Metrics

A Survey on Security Metrics

20 January 2016
Marcus Pendleton
Richard B. Garcia-Lebron
Shouhuai Xu
ArXiv (abs)PDFHTML

Papers citing "A Survey on Security Metrics"

16 / 16 papers shown
Title
Composite Metrics for Network Security Analysis
Composite Metrics for Network Security Analysis
S. Y. Enoch
Jin B. Hong
Mengmeng Ge
Dong Seong Kim
42
35
0
07 Jul 2020
Active Cyber Defense Dynamics Exhibiting Rich Phenomena
Active Cyber Defense Dynamics Exhibiting Rich Phenomena
Ren Zheng
Wenlian Lu
Shouhuai Xu
58
46
0
28 Mar 2016
A Stochastic Model of Active Cyber Defense Dynamics
A Stochastic Model of Active Cyber Defense Dynamics
Shouhuai Xu
Wenlian Lu
Hualun Li
44
69
0
28 Mar 2016
Cyber Epidemic Models with Dependences
Cyber Epidemic Models with Dependences
Maochao Xu
Gaofeng Da
Shouhuai Xu
36
46
0
28 Mar 2016
A New Approach to Modeling and Analyzing Security of Networked Systems
A New Approach to Modeling and Analyzing Security of Networked Systems
Gaofeng Da
Maochao Xu
Shouhuai Xu
AAML
43
26
0
28 Mar 2016
An Extended Stochastic Model for Quantitative Security Analysis of
  Networked Systems
An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems
Maochao Xu
Shouhuai Xu
40
37
0
28 Mar 2016
A Stochastic Model for Quantitative Security Analyses of Networked
  Systems
A Stochastic Model for Quantitative Security Analyses of Networked Systems
Xiaohu Li
Paul Parker
Shouhuai Xu
35
57
0
28 Mar 2016
A Characterization of Cybersecurity Posture from Network Telescope Data
A Characterization of Cybersecurity Posture from Network Telescope Data
Zhenxin Zhan
Maochao Xu
Shouhuai Xu
39
29
0
24 Mar 2016
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework
  and Case Study
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study
Zhenxin Zhan
Maochao Xu
Shouhuai Xu
AAML
50
132
0
24 Mar 2016
Predicting Cyber Attack Rates with Extreme Values
Predicting Cyber Attack Rates with Extreme Values
Zhenxin Zhan
Maochao Xu
Shouhuai Xu
AAML
31
93
0
24 Mar 2016
Emergent Behavior in Cybersecurity
Emergent Behavior in Cybersecurity
Shouhuai Xu
66
21
0
18 Feb 2015
Cybersecurity Dynamics
Cybersecurity Dynamics
Shouhuai Xu
67
58
0
18 Feb 2015
An Evasion and Counter-Evasion Study in Malicious Websites Detection
An Evasion and Counter-Evasion Study in Malicious Websites Detection
Li Xu
Zhenxin Zhan
Shouhuai Xu
Keying Ye
AAML
88
57
0
08 Aug 2014
Characterizing the Power of Moving Target Defense via Cyber Epidemic
  Dynamics
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics
Yujuan Han
Wenlian Lu
Shouhuai Xu
66
53
0
27 Apr 2014
My Software has a Vulnerability, should I worry?
My Software has a Vulnerability, should I worry?
Luca Allodi
Fabio Massacci
55
171
0
07 Jan 2013
Security impact ratings considered harmful
Security impact ratings considered harmful
J. Arnold
Tim Abbott
Waseem Daher
Gregory N. Price
Nelson Elhage
Geoffrey Thomas
Anders Kaseorg
76
29
0
26 Apr 2009
1