Su Zhang
Su Zhang
Security Architect at Pony.ai
Verified email at pony.ai - Homepage
Title
Cited by
Cited by
Year
An empirical study on using the national vulnerability database to predict software vulnerabilities
S Zhang, D Caragea, X Ou
Database and Expert Systems Applications, 217-231, 2011
1772011
Aggregating vulnerability metrics in enterprise networks using attack graphs
J Homer, S Zhang, X Ou, D Schmidt, Y Du, SR Rajagopalan, A Singhal
Journal of Computer Security 21 (4), 561-597, 2013
1252013
Simulation-based approaches to studying effectiveness of moving-target network defense
R Zhuang, S Zhang, SA DeLoach, X Ou, A Singhal
National Symposium on Moving Target Research, 2012
1072012
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud
S Zhang, X Zhang, X Ou
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
962014
Investigating the application of moving target defenses to network security
R Zhuang, S Zhang, A Bardas, SA DeLoach, X Ou, A Singhal
2013 6th International Symposium on Resilient Control Systems (ISRCS), 162-169, 2013
892013
Distilling critical attack graph surface iteratively through minimum-cost sat solving
H Huang, S Zhang, X Ou, A Prakash, K Sakallah
Proceedings of the 27th Annual Computer Security Applications Conference, 31-40, 2011
792011
Predicting cyber risks through national vulnerability database
S Zhang, X Ou, D Caragea
Information Security Journal: A Global Perspective 24 (4-6), 194-206, 2015
482015
Model-driven, moving-target defense for enterprise network security
SA DeLoach, X Ou, R Zhuang, S Zhang
Models@ run. time, 137-161, 2014
362014
Effective network vulnerability assessment through model abstraction
S Zhang, X Ou, J Homer
Detection of Intrusions and Malware, and Vulnerability Assessment, 17-34, 2011
272011
Assessing attack surface with component-based package dependency
S Zhang, X Zhang, X Ou, L Chen, N Edwards, J Jin
Network and System Security, 405-417, 2015
212015
An empirical study of a vulnerability metric aggregation method
S Zhang, X Ou, A Singhal, J Homer
International Conference on Security and Management, 2011
142011
Deep-diving into an easily-overlooked threat: Inter-VM attacks
S Zhang
Kansas State University, 2012
102012
Quantitative Risk Assessment under Multi-Context Environments
S Zhang
Kansas State University, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–13