Kui Xu
Kui Xu
Verified email at
Cited by
Cited by
DNS for massive-scale command and control
K Xu, P Butler, S Saha, D Yao
IEEE Transactions on Dependable and Secure Computing 10 (3), 143-153, 2013
A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity
K Xu, K Tian, DD Yao, BG Ryder
46th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2016
Data-provenance verification for secure hosts
K Xu, H Xiong, C Wu, D Stefan, D Yao
IEEE Transactions on Dependable and Secure Computing 9 (2), 173-183, 2011
Detecting infection onset with behavior-based policies
K Xu, D Yao, Q Ma, A Crowell
2011 5th International Conference on Network and System Security, 57-64, 2011
Probabilistic program modeling for high-precision anomaly classification
K Xu, DD Yao, BG Ryder, K Tian
2015 IEEE 28th Computer Security Foundations Symposium, 497-511, 2015
Quantitatively analyzing stealthy communication channels
P Butler, K Xu, DD Yao
International Conference on Applied Cryptography and Network Security, 238-254, 2011
Role-playing game for studying user behaviors in security: A case study on email secrecy
K Xu, D Yao, MA Pérez-Quinones, C Link, ES Geller
10th IEEE International Conference on Collaborative Computing: Networking …, 2014
Anomaly Detection through System and Program Behavior Modeling
K Xu
Virginia Tech, 2014
Detecting the onset of infection for secure hosts
K Xu, Q Ma, DD Yao
International Workshop on Recent Advances in Intrusion Detection, 492-493, 2010
User-Behavior Based Detection of Infection Onset
K Xu, DD Yao, Q Ma, A Crowell
Influence of entanglement in quantum Parrondo game
K Xu, L Huang, W Yang
International Journal of Quantum Information 6 (06), 1203-1212, 2008
Session 1: Security
V Hu, T Grance, D Ferraiolo, D Kuhn, A Libonati, K Caine, A Kapadia, ...
Poster: System Anomaly Detection with Program Analysis and Machine Learning Assistance
K Xu, DD Yao, B Ryder
The system can't perform the operation now. Try again later.
Articles 1–13