Specification-driven Moving Target Defense Synthesis
暂无分享,去创建一个
[1] Ehab Al-Shaer,et al. ConfigChecker: A tool for comprehensive security configuration analytics , 2011, 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG).
[2] David Hutchison,et al. Network address hopping: a mechanism to enhance data protection for packet communications , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[3] Jan Medved,et al. OpenDaylight: Towards a Model-Driven SDN Controller architecture , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[4] Erik Lee,et al. Final Report for the Network Security Mechanisms Utilizing Network Address Translation LDRD Project , 2002 .
[5] John T. Michalski. Network security mechanisms utilising network address translation , 2006, Int. J. Crit. Infrastructures.
[6] Ehab Al-Shaer,et al. Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.
[7] Ehab Al-Shaer,et al. Efficient Random Route Mutation considering flow and network constraints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[8] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[9] Satish K. Tripathi,et al. A framework for reliable routing in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Sushil Jajodia,et al. A Moving Target Defense Approach to Disrupting Stealthy Botnets , 2016, MTD@CCS.
[11] Nikolaj Bjørner,et al. Satisfiability Modulo Theories: An Appetizer , 2009, SBMF.
[12] Virgil D. Gligor,et al. The Crossfire Attack , 2013, 2013 IEEE Symposium on Security and Privacy.
[13] Ehab Al-Shaer,et al. Random Host Mutation for Moving Target Defense , 2012, SecureComm.
[14] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[15] Ryan A . Morehart. Evaluating the Effectiveness of IP Hopping via an Address Routing Gateway , 2013 .
[16] Shouhuai Xu,et al. Metrics Towards Measuring Cyber Agility , 2019, IEEE Transactions on Information Forensics and Security.
[17] Michael Atighetchi,et al. Adaptive use of network-centric mechanisms in cyber-defense , 2003, Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003..
[18] Miroslaw Truszczynski,et al. Answer set programming at a glance , 2011, Commun. ACM.
[19] D. Kewley,et al. Dynamic approaches to thwart adversary intelligence gathering , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[20] Ehab Al-Shaer,et al. Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers , 2014, MTD '14.
[21] David W. White. CERT Resiliency Engineering Framework , 2007 .
[22] Iulian Neamtiu,et al. A framework to evaluate cyber agility , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[23] Richard Graubart,et al. Resiliency techniques for systems-of-systems extending and applying the Cyber Resiliency Engineering Framework to the space domain , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
[24] Mazharul Islam,et al. CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).