Quantification of moving target cyber defenses
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Moving Target Defense II , 2013, Advances in Information Security.
[2] Béla Genge,et al. Cyber-physical testbeds , 2014, CACM.
[3] M. Kynn. The ‘heuristics and biases’ bias in expert elicitation , 2007 .
[4] Gordon S. Blair,et al. Models@ run.time , 2009, Computer.
[5] Daniel J. Ryan,et al. Quantifying information security risks using expert judgment elicitation , 2012, Comput. Oper. Res..
[6] J. Charles Kerkering,et al. Eliciting and Analyzing Expert Judgment, A Practical Guide , 2002, Technometrics.
[7] Nelly Bencomo,et al. Models@run.time , 2014, Lecture Notes in Computer Science.
[8] W. Neil Adger,et al. Using expert elicitation to define successful adaptation to climate change , 2009 .
[9] Brett Benyo,et al. Managed Execution Environment as a Moving-Target Defense Infrastructure , 2014, IEEE Security & Privacy.
[10] Erik Lebret,et al. The use of expert elicitation in environmental health impact assessment: a seven step procedure , 2010, Environmental health : a global access science source.
[11] William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.
[12] Shouhuai Xu,et al. Characterizing the power of moving target defense via cyber epidemic dynamics , 2014, HotSoS '14.
[13] Scott A. DeLoach,et al. Investigating the application of moving target defenses to network security , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[14] Sushil Jajodia,et al. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation , 2014, ICISS.
[15] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.