Formal Approach for Resilient Reachability based on End-System Route Agility
暂无分享,去创建一个
Ehab Al-Shaer | Mahantesh Halappanavar | Christopher S. Oehmen | Usman Rauf | Fida Gillani | Samrat Chatterjee | M. Halappanavar | E. Al-Shaer | C. Oehmen | S. Chatterjee | Usman Rauf | F. Gillani
[1] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[2] Toby Walsh,et al. Handbook of Constraint Programming (Foundations of Artificial Intelligence) , 2006 .
[3] Roman Barták,et al. Constraint Processing , 2009, Encyclopedia of Artificial Intelligence.
[4] Martin Fränzle,et al. Efficient Solving of Large Non-linear Arithmetic Constraint Systems with Complex Boolean Structure , 2007, J. Satisf. Boolean Model. Comput..
[5] T. L. Priyadarsini,et al. Secure Data Collection in Wireless Sensor Networks using Randomized Dispersive Routes , 2016 .
[6] Adrian Perrig,et al. The Coremelt Attack , 2009, ESORICS.
[7] Jure Leskovec,et al. {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .
[8] Virgil D. Gligor,et al. The Crossfire Attack , 2013, 2013 IEEE Symposium on Security and Privacy.
[9] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[10] Christopher N. Gutierrez,et al. Denial of Service Elusion (DoSE): Keeping Clients Connected for Less , 2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).
[11] Satish K. Tripathi,et al. A framework for reliable routing in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] Ehab Al-Shaer,et al. Formal Approach for Route Agility against Persistent Attackers , 2013, ESORICS.
[13] Fei Li,et al. Catch Me If You Can: A Cloud-Enabled DDoS Defense , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[14] Ivan Stojmenovic,et al. Ad hoc Networking , 2004 .
[15] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[16] Ibrahim Matta,et al. BRITE: A Flexible Generator of Internet Topologies , 2000 .
[17] Ehab Al-Shaer,et al. Efficient Random Route Mutation considering flow and network constraints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[18] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[19] Adi Shamir,et al. How to share a secret , 1979, CACM.
[20] Ehab Al-Shaer,et al. Agile virtualized infrastructure to proactively defend against cyber attacks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[21] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[22] Hilary Putnam,et al. A Computing Procedure for Quantification Theory , 1960, JACM.
[23] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[24] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[25] Larry L. Peterson,et al. Vsys: A Programmable sudo , 2011, USENIX Annual Technical Conference.
[26] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[27] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.