Jing Zhang
Jing Zhang
Verified email at - Homepage
Cited by
Cited by
Cloudy with a chance of breach: Forecasting cyber security incidents
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
24th USENIX Security Symposium (USENIX Security 15), 1009-1024, 2015
Measuring ipv6 adoption
J Czyz, M Allman, J Zhang, S Iekel-Johnson, E Osterweil, M Bailey
ACM SIGCOMM Computer Communication Review 44 (4), 87-98, 2015
Rating network security posture and comparing network maliciousness
M Liu, M Bailey, M Karir, Y Liu, J Zhang
US Patent App. 14/801,016, 2015
On the Mismanagement and Maliciousness of Networks
J Zhang, Z Durumeric, M Bailey, M Liu, M Karir
In Proceedings of the 21st Annual Network & Distributed System Security …, 2014
Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities
Y Liu, J Zhang, A Sarabi, M Liu, M Karir, M Bailey
Proceedings of the 2015 ACM International Workshop on International Workshop …, 2015
Network maliciousness susceptibility analysis and rating
M Liu, M Bailey, M Karir, J Zhang, Z Durumeric
US Patent App. 14/627,736, 2015
Characterization of blacklists and tainted network traffic
J Zhang, A Chivukula, M Bailey, M Karir, M Liu
International Conference on Passive and Active Network Measurement, 218-228, 2013
Safeguarding academic accounts and resources with the university credential abuse auditing system
J Zhang, R Berthier, W Rhee, M Bailey, P Pal, F Jahanian, WH Sanders
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
Assessing IPv6 adoption
J Czyz, M Allman, S Iekel-Johnson, E Osterweil, M Bailey
International Computer Science Institute, Tec. Report TR-13-004, 2013
Learning from early attempts to measure information security performance
J Zhang, R Berthier, W Rhee, M Bailey, P Pal, F Jahanian, WH Sanders
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test …, 2012
The system can't perform the operation now. Try again later.
Articles 1–10