Follow
Maochao Xu
Title
Cited by
Cited by
Year
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security, 1175-1789, 2013
1362013
Stochastic comparisons of parallel systems when components have proportional hazard rates
S Kochar, M Xu
Probability in the Engineering and Informational Sciences 21 (4), 597-609, 2007
1132007
Predicting Cyber Attack Rates with Extreme Values
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security, 2015
1062015
Modeling and predicting cyber hacking breaches
M Xu, KM Schweitzer, RM Bateman, S Xu
IEEE Transactions on Information Forensics and Security 13 (11), 2856-2871, 2018
822018
Comparison of pharmacy-based measures of medication adherence
WM Vollmer, M Xu, A Feldstein, D Smith, A Waterbury, C Rand
BMC health services research 12 (1), 1-8, 2012
822012
Cybersecurity insurance: Modeling and pricing
M Xu, L Hua
North American Actuarial Journal 23 (2), 220-249, 2019
712019
Anti-diabetic activity of Vaccinium bracteatum Thunb. leaves’ polysaccharide in STZ-induced diabetic mice
L Wang, Y Zhang, M Xu, Y Wang, S Cheng, A Liebrecht, H Qian, H Zhang, ...
International journal of biological macromolecules 61, 317-321, 2013
702013
Reversed hazard rate order of equilibrium distributions and a related aging notion
X Li, M Xu
Statistical Papers 49 (4), 749-767, 2008
562008
Comparisons of parallel systems according to the convex transform order
S Kochar, M Xu
Journal of Applied Probability 46 (2), 342-352, 2009
522009
A deep learning framework for predicting cyber attacks rates
X Fang, M Xu, S Xu, P Zhao
EURASIP Journal on Information security 2019 (1), 1-11, 2019
512019
A vine copula model for predicting the effectiveness of cyber defense early-warning
M Xu, L Hua, S Xu
Technometrics 59 (4), 508-520, 2017
492017
Cyber Epidemic Models with Dependences
M Xu, G Da, S Xu
Internet Mathematics 11 (1), 62-92, 2015
482015
Some results about MIT order and IMIT class of life distributions
X Li, M Xu
Probability in the Engineering and Informational Sciences 20 (3), 481-496, 2006
482006
Modeling and predicting extreme cyber attack rates via marked point processes
C Peng, M Xu, S Xu, T Hu
Journal of Applied Statistics 44 (14), 2534-2563, 2017
472017
On the right spread order of convolutions of heterogeneous exponential random variables
S Kochar, M Xu
Journal of Multivariate Analysis 101 (1), 165-176, 2010
452010
On the skewness of order statistics in multiple-outlier models
S Kochar, M Xu
Journal of Applied Probability 48 (1), 271-284, 2011
442011
On residual lifetimes of k-out-of-n systems with nonidentical components
S Kochar, M Xu
Probability in the Engineering and Informational Sciences 24 (1), 109-127, 2010
432010
Negative dependence in frailty models
M Xu, X Li
Journal of Statistical Planning and Inference 138 (5), 1433-1441, 2008
432008
An extended stochastic model for quantitative security analysis of networked systems
M Xu, S Xu
Internet Mathematics 8 (3), 288-320, 2012
382012
Modeling multivariate cybersecurity risks
C Peng, M Xu, S Xu, T Hu
Journal of Applied Statistics 45 (15), 2718-2740, 2018
362018
The system can't perform the operation now. Try again later.
Articles 1–20