| Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study Z Zhan, M Xu, S Xu IEEE Transactions on Information Forensics and Security, 1175-1789, 2013 | 190 | 2013 |
| Modeling and predicting cyber hacking breaches M Xu, KM Schweitzer, RM Bateman, S Xu IEEE Transactions on Information Forensics and Security 13 (11), 2856-2871, 2018 | 172 | 2018 |
| Predicting Cyber Attack Rates with Extreme Values Z Zhan, M Xu, S Xu IEEE Transactions on Information Forensics and Security, 2015 | 155 | 2015 |
| A deep learning framework for predicting cyber attacks rates X Fang, M Xu, S Xu, P Zhao EURASIP Journal on Information security 2019 (1), 5, 2019 | 153 | 2019 |
| Cybersecurity insurance: Modeling and pricing M Xu, L Hua North American Actuarial Journal 23 (2), 220-249, 2019 | 146 | 2019 |
| Stochastic comparisons of parallel systems when components have proportional hazard rates S Kochar, M Xu Probability in the Engineering and Informational Sciences 21 (4), 597-609, 2007 | 122 | 2007 |
| Comparison of pharmacy-based measures of medication adherence WM Vollmer, M Xu, A Feldstein, D Smith, A Waterbury, C Rand BMC health services research 12 (1), 155, 2012 | 117 | 2012 |
| Modeling multivariate cybersecurity risks C Peng, M Xu, S Xu, T Hu Journal of Applied Statistics 45 (15), 2718-2740, 2018 | 93 | 2018 |
| Anti-diabetic activity of Vaccinium bracteatum Thunb. leaves’ polysaccharide in STZ-induced diabetic mice L Wang, Y Zhang, M Xu, Y Wang, S Cheng, A Liebrecht, H Qian, H Zhang, ... International journal of biological macromolecules 61, 317-321, 2013 | 86 | 2013 |
| Modeling and predicting extreme cyber attack rates via marked point processes C Peng, M Xu, S Xu, T Hu Journal of Applied Statistics 44 (14), 2534-2563, 2017 | 85 | 2017 |
| A framework for predicting data breach risk: Leveraging dependence to cope with sparsity Z Fang, M Xu, S Xu, T Hu IEEE Transactions on Information Forensics and Security 16, 2186-2201, 2021 | 82 | 2021 |
| A vine copula model for predicting the effectiveness of cyber defense early-warning M Xu, L Hua, S Xu Technometrics 59 (4), 508-520, 2017 | 79 | 2017 |
| Cyber Epidemic Models with Dependences M Xu, G Da, S Xu Internet Mathematics 11 (1), 62-92, 2015 | 74 | 2015 |
| Reversed hazard rate order of equilibrium distributions and a related aging notion X Li, M Xu Statistical Papers 49 (4), 749-767, 2008 | 71 | 2008 |
| Modeling malicious hacking data breach risks H Sun, M Xu, P Zhao North American Actuarial Journal 25 (4), 484-502, 2021 | 60 | 2021 |
| Comparisons of parallel systems according to the convex transform order S Kochar, M Xu Journal of Applied Probability 46 (2), 342-352, 2009 | 60 | 2009 |
| An extended stochastic model for quantitative security analysis of networked systems M Xu, S Xu Internet Mathematics 8 (3), 288-320, 2012 | 56 | 2012 |
| Some results about MIT order and IMIT class of life distributions X Li, M Xu Probability in the Engineering and Informational Sciences 20 (3), 481-496, 2006 | 51 | 2006 |
| On the right spread order of convolutions of heterogeneous exponential random variables S Kochar, M Xu Journal of Multivariate Analysis 101 (1), 165-176, 2010 | 50 | 2010 |
| On the skewness of order statistics in multiple-outlier models S Kochar, M Xu Journal of Applied Probability 48 (1), 271-284, 2011 | 48 | 2011 |