Manipulating the attacker's view of a system's attack surface
暂无分享,去创建一个
Sushil Jajodia | Ermanno Battista | Valentina Casola | Massimiliano Albanese | S. Jajodia | V. Casola | Ermanno Battista | Massimiliano Albanese
[1] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[2] Thouraya Bouabana-Tebibel,et al. Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, San Francisco, CA, USA, August 2013] , 2014, IRI.
[3] Valentina Casola,et al. A moving target defense approach for protecting resource-constrained distributed devices , 2013, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI).
[4] Jens Myrup Pedersen,et al. Advances in intelligent and soft computing , 2011 .
[5] David Lee,et al. Network Protocol System Fingerprinting - A Formal Approach , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[7] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[8] Sushil Jajodia,et al. Scalable Analysis of Attack Scenarios , 2011, ESORICS.
[9] David Watson,et al. Protocol scrubbing: network security through transparent flow modification , 2004, IEEE/ACM Transactions on Networking.
[10] Sushil Jajodia,et al. A moving target defense mechanism for MANETs based on identity virtualization , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[11] Aun Haider,et al. Classification of malicious network streams using honeynets , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[12] Joseph G. Tront,et al. Implementing an IPv6 Moving Target Defense on a Live Network , 2012 .
[13] Ehab Al-Shaer,et al. Efficient Random Route Mutation considering flow and network constraints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[14] Sheng-Tzong Cheng,et al. A proactive approach to intrusion detection and malware collection , 2013, Secur. Commun. Networks.
[15] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.