{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:21:04Z","timestamp":1770286864761,"version":"3.49.0"},"publisher-location":"Cham","reference-count":68,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031459320","type":"print"},{"value":"9783031459337","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_4","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"60-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Cyber Attacks Against Enterprise Networks: Characterization, Modeling and\u00a0Forecasting"],"prefix":"10.1007","author":[{"given":"Zheyuan","family":"Sun","sequence":"first","affiliation":[]},{"given":"Maochao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Kristin M.","family":"Schweitzer","sequence":"additional","affiliation":[]},{"given":"Raymond M.","family":"Bateman","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Kott","sequence":"additional","affiliation":[]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1111\/1468-0262.00418","volume":"71","author":"TG Andersen","year":"2003","unstructured":"Andersen, T.G., Bollerslev, T., Diebold, F.X., Labys, P.: Modeling and forecasting realized volatility. Econometrica 71(2), 579\u2013625 (2003)","journal-title":"Econometrica"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bakdash, J., et al.: Dataset associated with \u2018malware in the future? forecasting analyst detection of cyber events\u2019 (2019). https:\/\/osf.io\/hjffm\/","DOI":"10.1093\/cybsec\/tyy007"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Bakdash, J.Z., et al.: Malware in the future? Forecasting of analyst detection of cyber events. J. Cybersecurity 4(1) (2018)","DOI":"10.1093\/cybsec\/tyy007"},{"issue":"4","key":"4_CR4","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1198\/07350010152596718","volume":"19","author":"J Berkowitz","year":"2001","unstructured":"Berkowitz, J.: Testing density forecasts, with applications to risk management. J. Bus. Econ. Stat. 19(4), 465\u2013474 (2001)","journal-title":"J. Bus. Econ. Stat."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bollerslev, T., Russell, J., Watson, M.W.: Volatility and Time Series Econometrics: Essays in Honor of Robert Engle. Oxford University Press, Oxford (2010)","DOI":"10.1093\/acprof:oso\/9780199549498.001.0001"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-89137-4_6","volume-title":"Science of Cyber Security","author":"J Charlton","year":"2021","unstructured":"Charlton, J., Du, P., Xu, S.: A new method for inferring ground-truth labels and malware detector effectiveness metrics. In: Lu, W., Sun, K., Yung, M., Liu, F. (eds.) SciSec 2021. LNCS, vol. 13005, pp. 77\u201392. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-89137-4_6"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Chen, H., Cho, J., Xu, S.: Quantifying the security effectiveness of firewalls and DMZs. In: Proceedings of the HoTSoS 2018, pp. 9:1\u20139:11 (2018)","DOI":"10.1145\/3190619.3190639"},{"key":"4_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3107514","author":"H Chen","year":"2021","unstructured":"Chen, H., Cam, H., Xu, S.: Quantifying cybersecurity effectiveness of dynamic network diversity. IEEE Trans. Dependable Secur. Comput. (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3107514","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"5","key":"4_CR9","doi-asserted-by":"publisher","first-page":"e0124472","DOI":"10.1371\/journal.pone.0124472","volume":"10","author":"Y Chen","year":"2015","unstructured":"Chen, Y., Huang, Z., Xu, S., Lai, Y.: Spatiotemporal patterns and predictability of cyberattacks. PLoS One 10(5), e0124472 (2015)","journal-title":"PLoS One"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Cho, J.H., Xu, S., Hurley, P.M., Mackay, M., Benjamin, T., Beaumont, M.: STRAM: measuring the trustworthiness of computer-based systems. ACM Comput. Surv. 51(6), 128:1\u2013128:47 (2019)","DOI":"10.1145\/3277666"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Christoffersen, P.F.: Evaluating interval forecasts. International Economic Review, pp. 841\u2013862 (1998)","DOI":"10.2307\/2527341"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Condon, E., He, A., Cukier, M.: Analysis of computer security incident data using time series models. In: International Symposium on Software Reliability Engineering, pp. 77\u201386 (2008)","DOI":"10.1109\/ISSRE.2008.39"},{"key":"4_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75959-3","volume-title":"Time Series Analysis With Applications in R","author":"JD Cryer","year":"2008","unstructured":"Cryer, J.D., Chan, K.S.: Time Series Analysis With Applications in R. Springer, New York (2008). https:\/\/doi.org\/10.1007\/978-0-387-75959-3"},{"key":"4_CR14","series-title":"Springer Texts in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55156-8","volume-title":"Modern Mathematical Statistics with Applications","author":"JL Devore","year":"2021","unstructured":"Devore, J.L., Berk, K.N., Carlton, M.A.: Modern Mathematical Statistics with Applications. STS, Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-55156-8"},{"issue":"12","key":"4_CR15","first-page":"2965","volume":"13","author":"P Du","year":"2018","unstructured":"Du, P., Sun, Z., Chen, H., Cho, J.H., Xu, S.: Statistical estimation of malware detection metrics in the absence of ground truth. IEEE T-IFS 13(12), 2965\u20132980 (2018)","journal-title":"IEEE T-IFS"},{"key":"4_CR16","series-title":"Applications of Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33483-2","volume-title":"Modelling Extremal Events","author":"P Embrechts","year":"1997","unstructured":"Embrechts, P., Kl\u00fcppelberg, C., Mikosch, T.: Modelling Extremal Events. AM, vol. 33. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/978-3-642-33483-2"},{"issue":"4","key":"4_CR17","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1198\/073500104000000370","volume":"22","author":"RF Engle","year":"2004","unstructured":"Engle, R.F., Manganelli, S.: CAViaR: conditional autoregressive value at risk by regression quantiles. J. Bus. Econ. Stat. 22(4), 367\u2013381 (2004)","journal-title":"J. Bus. Econ. Stat."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Fachkha, C., Bou-Harb, E., Debbabi, M.: Towards a forecasting model for distributed denial of service activities. In: 2013 IEEE 12th International Symposium on Network Computing and Applications, pp. 110\u2013117 (2013)","DOI":"10.1109\/NCA.2013.13"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s13635-019-0090-6","volume":"2019","author":"X Fang","year":"2019","unstructured":"Fang, X., Xu, M., Xu, S., Zhao, P.: A deep learning framework for predicting cyber attacks rates. EURASIP J. Inf. Secur. 2019, 5 (2019)","journal-title":"EURASIP J. Inf. Secur."},{"key":"4_CR20","first-page":"2186","volume":"16","author":"Z Fang","year":"2021","unstructured":"Fang, Z., Xu, M., Xu, S., Hu, T.: A framework for predicting data breach risk: leveraging dependence to cope with sparsity. IEEE T-IFS 16, 2186\u20132201 (2021)","journal-title":"IEEE T-IFS"},{"issue":"441","key":"4_CR21","first-page":"359","volume":"93","author":"C Fernandez","year":"1998","unstructured":"Fernandez, C., Steel, M.F.J.: On Bayesian modeling of fat tails and skewness. J. Am. Stat. Assoc. 93(441), 359\u2013371 (1998)","journal-title":"J. Am. Stat. Assoc."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Ganesan, R., Jajodia, S., Cam, H.: Optimal scheduling of cybersecurity analysts for minimizing risk. ACM Trans. Intell. Syst. Technol. 8(4), 52:1\u201352:32 (2017)","DOI":"10.1145\/2914795"},{"issue":"4","key":"4_CR23","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1093\/comnet\/cny031","volume":"7","author":"R Garcia-Lebron","year":"2019","unstructured":"Garcia-Lebron, R., Myers, D.J., Xu, S., Sun, J.: Node diversification in complex networks by decentralized colouring. J. Complex Netw. 7(4), 554\u2013563 (2019)","journal-title":"J. Complex Netw."},{"issue":"4","key":"4_CR24","doi-asserted-by":"publisher","first-page":"48002","DOI":"10.1209\/0295-5075\/81\/48002","volume":"81","author":"KI Goh","year":"2008","unstructured":"Goh, K.I., Barab\u00e1si, A.L.: Burstiness and memory in complex systems. EPL (Europhys. Lett.) 81(4), 48002 (2008)","journal-title":"EPL (Europhys. Lett.)"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Han, Y., Lu, W., Xu, S.: Characterizing the power of moving target defense via cyber epidemic dynamics. In: HotSoS, pp. 1\u201312 (2014)","DOI":"10.1145\/2600176.2600180"},{"issue":"3","key":"4_CR26","first-page":"2517","volume":"8","author":"Y Han","year":"2021","unstructured":"Han, Y., Lu, W., Xu, S.: Preventive and reactive cyber defense dynamics with ergodic time-dependent parameters is globally attractive. IEEE TNSE 8(3), 2517\u20132532 (2021)","journal-title":"IEEE TNSE"},{"issue":"7","key":"4_CR27","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1002\/jae.800","volume":"20","author":"PR Hansen","year":"2005","unstructured":"Hansen, P.R., Lunde, A.: A forecast comparison of volatility models: does anything beat a GARCH (1, 1)? J. Appl. Economet. 20(7), 873\u2013889 (2005)","journal-title":"J. Appl. Economet."},{"issue":"10","key":"4_CR28","doi-asserted-by":"publisher","first-page":"2348","DOI":"10.1109\/TIFS.2017.2705629","volume":"12","author":"R Harang","year":"2017","unstructured":"Harang, R., Kott, A.: Burstiness of intrusion detection process: empirical evidence and a modeling approach. IEEE Trans. Inf. Forensics Secur. 12(10), 2348\u20132359 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR29","unstructured":"Hollander, M., Wolfe, D.A., Chicken, E.: Nonparametric Statistical Methods. vol. 751. Wiley, Hoboken (2013)"},{"key":"4_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep00397","volume":"2","author":"M Karsai","year":"2012","unstructured":"Karsai, M., Kaski, K., Barab\u00e1si, A.L., Kert\u00e9sz, J.: Universal features of correlated bursty behaviour. Sci. Rep. 2, 1\u20137 (2012)","journal-title":"Sci. Rep."},{"issue":"3","key":"4_CR31","doi-asserted-by":"publisher","first-page":"032311","DOI":"10.1103\/PhysRevE.94.032311","volume":"94","author":"EK Kim","year":"2016","unstructured":"Kim, E.K., Jo, H.H.: Measuring burstiness for finite event sequences. Phys. Rev. E 94(3), 032311 (2016)","journal-title":"Phys. Rev. E"},{"issue":"1","key":"4_CR32","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MSP.2013.19","volume":"11","author":"A Kott","year":"2013","unstructured":"Kott, A., Arnold, C.: The promises and challenges of continuous monitoring and risk scoring. IEEE Secur. Priv. 11(1), 90\u201393 (2013)","journal-title":"IEEE Secur. Priv."},{"issue":"1\u20133","key":"4_CR33","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/0304-4076(92)90104-Y","volume":"54","author":"D Kwiatkowski","year":"1992","unstructured":"Kwiatkowski, D., Phillips, P.C., Schmidt, P., Shin, Y., et al.: Testing the null hypothesis of stationarity against the alternative of a unit root. J. Econometrics 54(1\u20133), 159\u2013178 (1992)","journal-title":"J. Econometrics"},{"issue":"1","key":"4_CR34","first-page":"28","volume":"8","author":"X Li","year":"2011","unstructured":"Li, X., Parker, P., Xu, S.: A stochastic model for quantitative security analyses of networked systems. IEEE TDSC 8(1), 28\u201343 (2011)","journal-title":"IEEE TDSC"},{"issue":"3","key":"4_CR35","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TNET.2019.2912847","volume":"27","author":"Z Lin","year":"2019","unstructured":"Lin, Z., Lu, W., Xu, S.: Unified preventive and reactive cyber defense dynamics is still globally convergent. IEEE\/ACM ToN 27(3), 1098\u20131111 (2019)","journal-title":"IEEE\/ACM ToN"},{"key":"4_CR36","volume-title":"Quantitative Risk Management: Concepts, Techniques, and Tools","author":"AJ McNeil","year":"2010","unstructured":"McNeil, A.J., Frey, R., Embrechts, P.: Quantitative Risk Management: Concepts, Techniques, and Tools. Princeton University Press, Princeton (2010)"},{"issue":"1","key":"4_CR37","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1162\/003465304323023886","volume":"86","author":"T Mikosch","year":"2004","unstructured":"Mikosch, T., Starica, C.: Nonstationarities in financial time series, the long-range dependence, and the IGARCH effects. Rev. Econ. Stat. 86(1), 378\u2013390 (2004)","journal-title":"Rev. Econ. Stat."},{"issue":"12","key":"4_CR38","doi-asserted-by":"publisher","first-page":"3217","DOI":"10.1109\/TIFS.2019.2912551","volume":"14","author":"JD Mireles","year":"2019","unstructured":"Mireles, J.D., Ficke, E., Cho, J., Hurley, P., Xu, S.: Metrics towards measuring cyber agility. IEEE Trans. Inf. Forensics Secur. 14(12), 3217\u20133232 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR39","first-page":"319","volume-title":"SciSec 2023, LNCS","author":"R Monta\u00f1ez Rodriguez","year":"2023","unstructured":"Monta\u00f1ez Rodriguez, R., Longtchi, T., Gwartney, K., Ear, E., Azari, D.P., Kelley, C.P., Xu, S.: Quantifying psychological sophistication of malicious emails. In: Yung, M., et al. (eds.) SciSec 2023, LNCS, vol. 14299, pp. 319\u2013331. Springer, Cham (2023)"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Monta\u00f1ez, R., Atyabi, A., Xu, S.: Book chapter in \"cybersecurity and cognitive science\", chap. social engineering attacks and defenses in the physical world vs. cyberspace: a contrast study. Elsevier, pp. 3\u201341 (2022)","DOI":"10.1016\/B978-0-323-90570-1.00012-7"},{"key":"4_CR41","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.3389\/fpsyg.2020.01755","volume":"11","author":"R Monta\u00f1ez","year":"2020","unstructured":"Monta\u00f1ez, R., Golob, E., Xu, S.: Human cognition through the lens of social engineering cyberattacks. Front. Psychol. 11, 1755 (2020)","journal-title":"Front. Psychol."},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Pendleton, M., Garcia-Lebron, R., Cho, J.H., Xu, S.: A survey on systems security metrics. ACM Comput. Surv. 49(4), 62:1\u201362:35 (2016)","DOI":"10.1145\/3005714"},{"issue":"14","key":"4_CR43","doi-asserted-by":"publisher","first-page":"2534","DOI":"10.1080\/02664763.2016.1257590","volume":"44","author":"C Peng","year":"2017","unstructured":"Peng, C., Xu, M., Xu, S., Hu, T.: Modeling and predicting extreme cyber attack rates via marked point processes. J. Appl. Stat. 44(14), 2534\u20132563 (2017)","journal-title":"J. Appl. Stat."},{"issue":"15","key":"4_CR44","doi-asserted-by":"publisher","first-page":"2718","DOI":"10.1080\/02664763.2018.1436701","volume":"45","author":"C Peng","year":"2018","unstructured":"Peng, C., Xu, M., Xu, S., Hu, T.: Modeling multivariate cybersecurity risks. J. Appl. Stat. 45(15), 2718\u20132740 (2018)","journal-title":"J. Appl. Stat."},{"key":"4_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/b97391","volume-title":"Introduction to Time Series and Forecasting","author":"B Peter","year":"2002","unstructured":"Peter, B., Richard, D.: Introduction to Time Series and Forecasting. Springer, New York (2002). https:\/\/doi.org\/10.1007\/b97391"},{"issue":"2","key":"4_CR46","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1093\/biomet\/75.2.335","volume":"75","author":"PC Phillips","year":"1988","unstructured":"Phillips, P.C., Perron, P.: Testing for a unit root in time series regression. Biometrika 75(2), 335\u2013346 (1988)","journal-title":"Biometrika"},{"issue":"3","key":"4_CR47","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1198\/jbes.2010.09153","volume":"29","author":"Z Qu","year":"2011","unstructured":"Qu, Z.: A test against spurious long memory. J. Bus. Econ. Stat. 29(3), 423\u2013438 (2011)","journal-title":"J. Bus. Econ. Stat."},{"key":"4_CR48","doi-asserted-by":"publisher","unstructured":"Resnick, S.: Heavy-Tail Phenomena: Probabilistic and Statistical Modeling. Springer, New York (2007). https:\/\/doi.org\/10.1007\/978-0-387-45024-7","DOI":"10.1007\/978-0-387-45024-7"},{"key":"4_CR49","doi-asserted-by":"crossref","unstructured":"Rodriguez, R.M., Xu, S.: Cyber social engineering kill chain. In: Proceedings of International Conference on Science of Cyber Security (SciSec 2022), pp. 487\u2013504 (2022)","DOI":"10.1007\/978-3-031-17551-0_32"},{"issue":"3","key":"4_CR50","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1561\/0900000004","volume":"1","author":"G Samorodnitsky","year":"2006","unstructured":"Samorodnitsky, G.: Long range dependence. Founda. Trends Stoch. Syst. 1(3), 163\u2013257 (2006)","journal-title":"Founda. Trends Stoch. Syst."},{"issue":"6","key":"4_CR51","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1111\/j.1467-9892.2010.00717.x","volume":"32","author":"X Shao","year":"2011","unstructured":"Shao, X.: A simple test of changes in mean in the possible presence of long-range dependence. J. Time Ser. Anal. 32(6), 598\u2013606 (2011)","journal-title":"J. Time Ser. Anal."},{"issue":"2","key":"4_CR52","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1214\/aoms\/1177706259","volume":"30","author":"SD Silvey","year":"1959","unstructured":"Silvey, S.D.: The Lagrangian multiplier test. Ann. Math. Stat. 30(2), 389\u2013407 (1959)","journal-title":"Ann. Math. Stat."},{"issue":"25","key":"4_CR53","volume":"7","author":"V Trieu-Do","year":"2020","unstructured":"Trieu-Do, V., Garcia-Lebron, R., Xu, M., Xu, S., Feng, Y.: Characterizing and leveraging granger causality in cybersecurity: framework and case study. EAI Endorsed Trans. Secur. Safety 7(25), e4 (2020)","journal-title":"EAI Endorsed Trans. Secur. Safety"},{"key":"4_CR54","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1214\/ss\/1177010131","volume":"10","author":"W Willinger","year":"1995","unstructured":"Willinger, W., Taqqu, M.S., Leland, W.E., Wilson, V.: Self-similarity in high-speed packet traffic: analysis and modeling of ethernet traffic measurements. Stat. Sci. 10, 67\u201385 (1995)","journal-title":"Stat. Sci."},{"issue":"4","key":"4_CR55","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1080\/00401706.2016.1256841","volume":"59","author":"M Xu","year":"2017","unstructured":"Xu, M., Hua, L., Xu, S.: A vine copula model for predicting the effectiveness of cyber defense early-warning. Technometrics 59(4), 508\u2013520 (2017)","journal-title":"Technometrics"},{"issue":"11","key":"4_CR56","first-page":"2856","volume":"13","author":"M Xu","year":"2018","unstructured":"Xu, M., Schweitzer, K.M., Bateman, R.M., Xu, S.: Modeling and predicting cyber hacking breaches. IEEE T-IFS 13(11), 2856\u20132871 (2018)","journal-title":"IEEE T-IFS"},{"issue":"3","key":"4_CR57","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1080\/15427951.2012.654480","volume":"8","author":"M Xu","year":"2012","unstructured":"Xu, M., Xu, S.: An extended stochastic model for quantitative security analysis of networked systems. Internet Math. 8(3), 288\u2013320 (2012)","journal-title":"Internet Math."},{"key":"4_CR58","doi-asserted-by":"crossref","unstructured":"Xu, S.: Emergent behavior in cybersecurity. In: Proceedings of the HotSoS 2014, pp. 13:1\u201313:2 (2014)","DOI":"10.1145\/2600176.2600189"},{"key":"4_CR59","doi-asserted-by":"crossref","unstructured":"Xu, S.: The cybersecurity dynamics way of thinking and landscape (invited paper). In: ACM Workshop on Moving Target Defense (2020)","DOI":"10.1145\/3411496.3421225"},{"issue":"1","key":"4_CR60","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TDSC.2011.33","volume":"9","author":"S Xu","year":"2012","unstructured":"Xu, S., Lu, W., Zhan, Z.: A stochastic model of multivirus dynamics. IEEE Trans. Dependable Secur. Comput. 9(1), 30\u201345 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"4_CR61","doi-asserted-by":"crossref","unstructured":"Xu, S.: Cybersecurity dynamics. In: Proceedings of the Symposium on the Science of Security (HotSoS 14), pp. 14:1\u201314:2 (2014)","DOI":"10.1145\/2600176.2600190"},{"key":"4_CR62","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-10597-6_1","volume-title":"Proactive and Dynamic Network Defense","author":"S Xu","year":"2019","unstructured":"Xu, S.: Cybersecurity dynamics: a foundation for the science of cybersecurity. In: Wang, C., Lu, Z. (eds.) Proactive and Dynamic Network Defense. Advances in Information Security, vol. 74, pp. 1\u201331. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10597-6_1"},{"key":"4_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-89137-4_1","volume-title":"Science of Cyber Security","author":"S Xu","year":"2021","unstructured":"Xu, S.: SARR: a cybersecurity metrics and quantification framework (keynote). In: Lu, W., Sun, K., Yung, M., Liu, F. (eds.) SciSec 2021. LNCS, vol. 13005, pp. 3\u201317. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-89137-4_1"},{"issue":"2","key":"4_CR64","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10796-021-10134-8","volume":"23","author":"S Xu","year":"2021","unstructured":"Xu, S., Yung, M., Wang, J.: Seeking foundations for the science of cyber security. Inf. Syst. Front. 23(2), 263\u2013267 (2021)","journal-title":"Inf. Syst. Front."},{"key":"4_CR65","doi-asserted-by":"crossref","unstructured":"Zhan, Z., Xu, M., Xu, S.: A characterization of cybersecurity posture from network telescope data. In: Proceedings of the InTrust, pp. 105\u2013126 (2014)","DOI":"10.1007\/978-3-319-27998-5_7"},{"issue":"11","key":"4_CR66","first-page":"1775","volume":"8","author":"Z Zhan","year":"2013","unstructured":"Zhan, Z., Xu, M., Xu, S.: Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE T-IFS 8(11), 1775\u20131789 (2013)","journal-title":"IEEE T-IFS"},{"issue":"8","key":"4_CR67","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1109\/TIFS.2015.2422261","volume":"10","author":"Z Zhan","year":"2015","unstructured":"Zhan, Z., Xu, M., Xu, S.: Predicting cyber attack rates with extreme values. IEEE Trans. Inf. Forensics Secur. 10(8), 1666\u20131677 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"4_CR68","first-page":"156","volume":"5","author":"R Zheng","year":"2018","unstructured":"Zheng, R., Lu, W., Xu, S.: Preventive and reactive cyber defense dynamics is globally stable. IEEE TNSE 5(2), 156\u2013170 (2018)","journal-title":"IEEE TNSE"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T06:55:08Z","timestamp":1730530508000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}