Xiaoyan Sun
Orcid: 0000-0002-0321-2338Affiliations:
- Worcester Polytechnic Institute, Worcester, MA, USA
- California State University, Sacramento, CA, USA (former)
- Pennsylvania State University, PA, USA (Phd)
According to our database1,
Xiaoyan Sun
authored at least 37 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Computer, May, 2024
CoRR, 2024
Proceedings of the Silicon Valley Cybersecurity Conference, 2024
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024
2023
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
2022
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach.
J. Comput. Secur., 2022
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022
Proceedings of the Information Systems Security - 18th International Conference, 2022
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks.
CoRR, 2020
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
2018
IEEE Trans. Inf. Forensics Secur., 2018
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud.
EAI Endorsed Trans. Security Safety, 2018
IEEE Secur. Priv., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
2014
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
2013
Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013
2012
Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
2009
Proceedings of the IEEE Vehicular Networking Conference, 2009