Self-Adaptation Metrics for Active Cybersecurity
暂无分享,去创建一个
David J. Musliner | Scott E. Friedman | Tom Marble | Jeffrey M. Rye | Michael Boldt | Michael J. S. Pelican
[1] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[2] Tom Kellerman. Cyber-Threat Proliferation: Today's Truly Pervasive Global Epidemic , 2010, IEEE Security & Privacy.
[3] David J. Musliner,et al. Using Concolic Testing to Refine Vulnerability Profiles in FUZZBUSTER , 2012, 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops.
[4] David J. Musliner,et al. FUZZBUSTER: Towards Adaptive Immunity from Cyber Threats , 2011, 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops.
[5] Dave Aitel,et al. The Shellcoder's Handbook: Discovering and Exploiting Security Holes , 2004 .
[6] Alexander Egyed,et al. AWDRAT: A Cognitive Middleware System for Information Survivability , 2007, AI Mag..
[7] Koushik Sen,et al. Heuristics for Scalable Dynamic Test Generation , 2008, 2008 23rd IEEE/ACM International Conference on Automated Software Engineering.
[8] David J. Musliner,et al. Meta-control for Adaptive Cybersecurity in FUZZBUSTER , 2013, 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems.
[9] Claire Le Goues,et al. Automatic program repair with evolutionary computation , 2010, Commun. ACM.
[10] Alexander Egyed,et al. Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT , 2007, First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007).