Intrusion Detection and Prevention in Cyber Physical Systems

[1]  Leslie S. Winters,et al.  Composable M&S Web Services for Net-Centric Applications , 2006 .

[2]  Margo I. Seltzer,et al.  An architecture a day keeps the hacker away , 2005, CARN.

[3]  Michael Franz,et al.  E unibus pluram: massive-scale software diversity as a defense mechanism , 2010, NSPW '10.

[4]  Yung-Chuan Lee,et al.  A Pre-Kernel Agent Platform for security assurance , 2011, 2011 IEEE Symposium on Intelligent Agent (IA).

[5]  John Johansen,et al.  PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.

[6]  Monica S. Lam,et al.  Efficient context-sensitive pointer analysis for C programs , 1995, PLDI '95.

[7]  Yoseba K. Penya,et al.  N-grams-based File Signatures for Malware Detection , 2009, ICEIS.

[8]  Mohamed Eltoweissy,et al.  CyberX: A biologically-inspired platform for cyber trust management , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[9]  Les Hatton,et al.  N-Version Design vs. One Good Version , 1997, IEEE Softw..

[10]  Calton Pu,et al.  A Specialization Toolkit to Increase the Diversity of Operating Systems , 1996 .

[11]  Klaus Fischer,et al.  Interoperability through a Platform-Independent Model for Agents , 2007, IESA.

[12]  Thierry Coupaye,et al.  The FRACTAL component model and its support in Java , 2006, Softw. Pract. Exp..

[13]  Nancy G. Leveson,et al.  An experimental evaluation of the assumption of independence in multiversion programming , 1986, IEEE Transactions on Software Engineering.

[14]  Michael Franz,et al.  Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities , 2008, 2008 International Conference on Complex, Intelligent and Software Intensive Systems.

[15]  Mohamed Eltoweissy,et al.  Bio-inspired Evolutionary Sensory system for Cyber-Physical System defense , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[16]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..

[17]  Bernard P. Zeigler,et al.  DEVS namespace for interoperable DEVS/SOA , 2009, Proceedings of the 2009 Winter Simulation Conference (WSC).

[18]  Deborah A. Frincke,et al.  DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems , 2010, DPM/SETOP.

[19]  George M. Lawler Distributed architecture for the object-oriented method for interoperability , 2003 .

[20]  Xu Chen,et al.  Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[21]  Ravishankar K. Iyer,et al.  Transparent runtime randomization for security , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..

[22]  Donald F. Towsley,et al.  The monitoring and early detection of Internet worms , 2005, IEEE/ACM Transactions on Networking.

[23]  Frederick B. Cohen,et al.  Operating system protection through program evolution , 1993, Comput. Secur..

[24]  Robert Feldt,et al.  Generating diverse software versions with genetic programming: and experimental study , 1998, IEE Proc. Softw..

[25]  D. L. Parnas,et al.  On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.

[26]  Michael Franz,et al.  On the effectiveness of multi-variant program execution for vulnerability detection and prevention , 2010, MetriSec '10.

[27]  David H. Ackley,et al.  Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[28]  Mohamed Eltoweissy,et al.  ChameleonSoft: Software Behavior Encryption for Moving Target Defense , 2013, Mob. Networks Appl..

[29]  Fred B. Schneider,et al.  Independence from obfuscation: a semantic framework for diversity , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[30]  Robert Feldt,et al.  Generating multiple diverse software versions with genetic programming , 1998, Proceedings. 24th EUROMICRO Conference (Cat. No.98EX204).

[31]  Luigi Benedicenti,et al.  Increasing the reliability of control systems with agent technology , 2001, SIAP.

[32]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[33]  Srinivasan Parthasarathy,et al.  Towards NIC-based intrusion detection , 2003, KDD '03.

[34]  Frantisek Plasil,et al.  SOFA/DCUP: architecture for component trading and dynamic updating , 1998, Proceedings. Fourth International Conference on Configurable Distributed Systems (Cat. No.98EX159).

[35]  Wendy M. Maiden DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems , 2010 .

[36]  James E. Just,et al.  Review and analysis of synthetic diversity for breaking monocultures , 2004, WORM '04.