Research papers by Argus members

  1. Distilling Critical Attack Graph Surface iteratively through Minimum-Cost SAT Solving. Hequing Huang, Su Zhang, Xinming Ou, Atul Prakash, and Karem Sakallah. To appear in 27th Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, USA, Dec 2011.
  2. Quantitative security risk assessment of enterprise networks. Xinming Ou and Anoop Singhal. To appear in SpringerBrief Series, Information Security, 2011.
  3. Prioritizing intrusion analysis using dempster-shafer theory. Loai Zomlot, Sathya Chandran Sundaramurthy, Kui Luo, Xinming Ou, and S. Raj Rajagopalan. In 4th ACM Workshop on Artificial Intelligence and Security (AISec),, Chicago, USA, Oct 2011.
  4. An empirical study of using the national vulnerability database to predict software vulnerabilities. Su Zhang, Doina Caragea, and Xinming Ou. In 22nd International Conference on Database and Expert Systems Applications (DEXA), Toulouse, France, August 2011.
  5. Practical IDS alert correlation in the face of dynamic threats. Sathya Chandran Sundaramurthy, Loai Zomlot, and Xinming Ou. In The 2011 International Conference on Security and Management (SAM'11), Las Vegas, USA, July 2011.
  6. An empirical study of a vulnerability metric aggregation method. Su Zhang, Xinming Ou, Anoop Singhal and John Homer. In The 2011 International Conference on Security and Management (SAM'11), special track on Mission Assurance and Critical Infrastructure Protection (STMACIP'11), Las Vegas, USA, July 2011.
  7. Effective network vulnerability assessment through model abstraction. Su Zhang, Xinming Ou, and John Homer. In the Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Amsterdam, The Netherlands, July 2011.
  8. An empirical approach to modeling uncertainty in intrusion analysis , Sakthiyuvaraja Sakthivelmurugan, MS Thesis, Kansas State University, 2009.
  9. An empirical approach to modeling uncertainty in intrusion analysis. Xinming Ou, S. Raj Rajagopalan, and Sakthiyuvaraja Sakthivelmurugan. Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA, Dec 2009.
  10. Uncertainty and risk management in cyber situational awareness. Jason Li, Xinming Ou, and Raj Rajagopalan. In Sushil Jajodia, editor, Cyber Situational Awareness , chapter 3. Springer, to appear.
  11. A sound and practical approach to quantifying security risk in enterprise networks. John Homer, Xinming Ou, and David Schmidt. Technical report, Kansas State University, Computing and Information Sciences Department. August 2009.
  12. A host-based security assessment architecture for industrial control systems. Abhishek Rakshit and Xinming Ou. 2nd International Symposium on Resilient Control Systems (ISRCS), Idaho Falls, ID, USA, August 2009.
  13. A comprehensive approach to enterprise network security management John Homer. Ph.D. dissertation, Kansas State University, May 2009.
  14. A host-based security assessment architecture for effective leveraging of shared knowledge. Abhishek Rakshit, MS Report, Kansas State University, 2009.
  15. SAT-solving approaches to context-aware enterprise network security management. John Homer and Xinming Ou, In IEEE JSAC Special Issue on Network Infrastructure Configuration,
  16. Security risk prioritization for logical attack graphs. Hussain Almohri, MS Thesis, Kansas State University, 2008.
  17. A practical approach to modeling uncertainty in intrusion analysis. Xinming Ou, Raj Rajagopalan, and Sakthiyuvaraja Sakthivelmurugan. Technical report, Kansas State University, Computing and Information Sciences Department. November 2008.
  18. Identifying critical attack assets in dependency attack graphs. Reginald Sawilla and Xinming Ou. In 13th European Symposium on Research in Computer Security (ESORICS 2008), Malaga, Spain, October 2008. The extended version.
  19. Improving attack graph visualization through data reduction and attack grouping. John Homer, Ashok Varikuti, Xinming Ou, and Miles A. McQueen. In 5th International Workshop on Visualization for Cyber Security (VizSEC 2008), Cambridge, MA, U.S.A., September 2008.
  20. From attack graphs to automated configuration management - an iterative approach. John Homer, Xinming Ou, and Miles A. McQueen. Technical report, Kansas State University, Computing and Information Sciences Department. January 2008.
  21. Googling attack graphs. Reginald Sawilla and Xinming Ou. Technical report, Defence R & D Canada -- Ottawa TM 2007-205, September 2007.
  22. A scalable approach to attack graph generation. Xinming Ou, Wayne F. Boyer, and Miles A. McQueen. In 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, U.S.A., October 2006.
The documents contained in these pages are included to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.