Intrusion Detection and Prevention in Cyber Physical Systems
暂无分享,去创建一个
[1] Leslie S. Winters,et al. Composable M&S Web Services for Net-Centric Applications , 2006 .
[2] Margo I. Seltzer,et al. An architecture a day keeps the hacker away , 2005, CARN.
[3] Michael Franz,et al. E unibus pluram: massive-scale software diversity as a defense mechanism , 2010, NSPW '10.
[4] Yung-Chuan Lee,et al. A Pre-Kernel Agent Platform for security assurance , 2011, 2011 IEEE Symposium on Intelligent Agent (IA).
[5] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[6] Monica S. Lam,et al. Efficient context-sensitive pointer analysis for C programs , 1995, PLDI '95.
[7] Yoseba K. Penya,et al. N-grams-based File Signatures for Malware Detection , 2009, ICEIS.
[8] Mohamed Eltoweissy,et al. CyberX: A biologically-inspired platform for cyber trust management , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[9] Les Hatton,et al. N-Version Design vs. One Good Version , 1997, IEEE Softw..
[10] Calton Pu,et al. A Specialization Toolkit to Increase the Diversity of Operating Systems , 1996 .
[11] Klaus Fischer,et al. Interoperability through a Platform-Independent Model for Agents , 2007, IESA.
[12] Thierry Coupaye,et al. The FRACTAL component model and its support in Java , 2006, Softw. Pract. Exp..
[13] Nancy G. Leveson,et al. An experimental evaluation of the assumption of independence in multiversion programming , 1986, IEEE Transactions on Software Engineering.
[14] Michael Franz,et al. Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities , 2008, 2008 International Conference on Complex, Intelligent and Software Intensive Systems.
[15] Mohamed Eltoweissy,et al. Bio-inspired Evolutionary Sensory system for Cyber-Physical System defense , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[16] Ravi Jain,et al. D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..
[17] Bernard P. Zeigler,et al. DEVS namespace for interoperable DEVS/SOA , 2009, Proceedings of the 2009 Winter Simulation Conference (WSC).
[18] Deborah A. Frincke,et al. DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems , 2010, DPM/SETOP.
[19] George M. Lawler. Distributed architecture for the object-oriented method for interoperability , 2003 .
[20] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[21] Ravishankar K. Iyer,et al. Transparent runtime randomization for security , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[22] Donald F. Towsley,et al. The monitoring and early detection of Internet worms , 2005, IEEE/ACM Transactions on Networking.
[23] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[24] Robert Feldt,et al. Generating diverse software versions with genetic programming: and experimental study , 1998, IEE Proc. Softw..
[25] D. L. Parnas,et al. On the criteria to be used in decomposing systems into modules , 1972, Software Pioneers.
[26] Michael Franz,et al. On the effectiveness of multi-variant program execution for vulnerability detection and prevention , 2010, MetriSec '10.
[27] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[28] Mohamed Eltoweissy,et al. ChameleonSoft: Software Behavior Encryption for Moving Target Defense , 2013, Mob. Networks Appl..
[29] Fred B. Schneider,et al. Independence from obfuscation: a semantic framework for diversity , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[30] Robert Feldt,et al. Generating multiple diverse software versions with genetic programming , 1998, Proceedings. 24th EUROMICRO Conference (Cat. No.98EX204).
[31] Luigi Benedicenti,et al. Increasing the reliability of control systems with agent technology , 2001, SIAP.
[32] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[33] Srinivasan Parthasarathy,et al. Towards NIC-based intrusion detection , 2003, KDD '03.
[34] Frantisek Plasil,et al. SOFA/DCUP: architecture for component trading and dynamic updating , 1998, Proceedings. Fourth International Conference on Configurable Distributed Systems (Cat. No.98EX159).
[35] Wendy M. Maiden. DualTrust: A Trust Management Model for Swarm-Based Autonomic Computing Systems , 2010 .
[36] James E. Just,et al. Review and analysis of synthetic diversity for breaking monocultures , 2004, WORM '04.