Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study Z Zhan, M Xu, S Xu IEEE Transactions on Information Forensics and Security, 1175-1789, 2013 | 110 | 2013 |
Stochastic comparisons of parallel systems when component have proportional hazard rates SC Kochar, M Xu Probability in the Engineering & Informational Sciences, 2007 | 103 | 2007 |
Predicting Cyber Attack Rates with Extreme Values Z Zhan, M Xu, S Xu IEEE Transactions on Information Forensics and Security, 2015 | 75 | 2015 |
Comparison of pharmacy-based measures of medication adherence WM Vollmer, M Xu, A Feldstein, D Smith, A Waterbury, C Rand BMC health services research 12 (1), 1-8, 2012 | 72 | 2012 |
Anti-diabetic activity of Vaccinium bracteatum Thunb. leaves’ polysaccharide in STZ-induced diabetic mice L Wang, Y Zhang, M Xu, Y Wang, S Cheng, A Liebrecht, H Qian, H Zhang, ... International journal of biological macromolecules 61, 317-321, 2013 | 53 | 2013 |
Reversed hazard rate order of equilibrium distributions and a related aging notion X Li, M Xu Statistical Papers 49 (4), 749-767, 2008 | 50 | 2008 |
Comparisons of parallel systems according to the convex transform order S Kochar, M Xu Journal of Applied Probability 46 (2), 342-352, 2009 | 47 | 2009 |
Some results about MIT order and IMIT class of life distributions X Li, M Xu Probability in the Engineering and Informational Sciences 20 (3), 481, 2006 | 46 | 2006 |
Modeling and predicting cyber hacking breaches M Xu, KM Schweitzer, RM Bateman, S Xu IEEE Transactions on Information Forensics and Security 13 (11), 2856-2871, 2018 | 45 | 2018 |
On the right spread order of convolutions of heterogeneous exponential random variables S Kochar, M Xu Journal of Multivariate Analysis 101 (1), 165-176, 2010 | 44 | 2010 |
On residual lifetimes of k-out-of-n systems with nonidentical components SC Kochar, M Xu Probability in the Engineering & Informational Sciences, 2010 | 41 | 2010 |
On the skewness of order statistics in multiple-outlier models S Kochar, M Xu Journal of Applied Probability 48 (1), 271-284, 2011 | 37 | 2011 |
Negative dependence in frailty models M Xu, X Li Journal of statistical planning and inference 138 (5), 1433-1441, 2008 | 37 | 2008 |
Cybersecurity insurance: Modeling and pricing M Xu, L Hua North American Actuarial Journal 23 (2), 220-249, 2019 | 31 | 2019 |
Cyber Epidemic Models with Dependences M Xu, G Da, S Xu Internet Mathematics 11 (1), 62-92, 2015 | 30 | 2015 |
Modeling and predicting extreme cyber attack rates via marked point processes C Peng, M Xu, S Xu, T Hu Journal of Applied Statistics 44 (14), 2534-2563, 2017 | 29 | 2017 |
An extended stochastic model for quantitative security analysis of networked systems M Xu, S Xu Internet Mathematics 8 (3), 288-320, 2012 | 28 | 2012 |
Some recent results on stochastic comparisons and dependence among order statistics in the case of PHR model SC Kochar, M Xu Journal of Reliability and Statistical Studies, 2007 | 28 | 2007 |
Stochastic comparisons of capital allocations with applications M Xu, T Hu Insurance: Mathematics and Economics 50 (3), 293-298, 2012 | 26 | 2012 |
A vine copula model for predicting the effectiveness of cyber defense early-warning M Xu, L Hua, S Xu Technometrics 59 (4), 508-520, 2017 | 25 | 2017 |