On achieving software diversity for improved network security using distributed coloring algorithms
暂无分享,去创建一个
[1] T. G. Horsfall,et al. Genetic vulnerability of major crops , 1972 .
[2] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[3] Ellen W. Zegura,et al. How to model an internetwork , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.
[4] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[5] Gregory R. Ganger,et al. Self-Securing Network Interfaces: What, Why and How (CMU-CS-02-144) , 2002 .
[6] Salim Hariri,et al. Randomized Instruction Set Emulation To Disrupt Binary Code Injection Attacks , 2003 .
[7] Mark Stamp,et al. Risks of monoculture , 2004, CACM.
[8] Algirdas Avizienis,et al. A fault tolerance approach to computer viruses , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[9] S. Bornholdt,et al. Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[10] Stephanie Forrest,et al. Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[11] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[12] A. Barabasi,et al. Halting viruses in scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[13] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[14] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[15] Harrick M. Vin,et al. Heterogeneous networking: a new survivability paradigm , 2001, NSPW '01.
[16] Gregory J. Pottie,et al. Instrumenting the world with wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[17] Cynthia A. Phillips,et al. A graph-based system for network-vulnerability analysis , 1998, NSPW '98.
[18] Alessandro Vespignani,et al. Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[19] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[20] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[21] Wayne Goddard,et al. Coloring with defect , 1997, SODA '97.
[22] Richard C. Linger. Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[23] Yang Wang,et al. Modeling the effects of timing parameters on virus propagation , 2003, WORM '03.
[24] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[25] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[26] Alessandro Vespignani,et al. Epidemics and immunization in scale‐free networks , 2002, cond-mat/0205260.
[27] Giorgio Gambosi,et al. Complexity and Approximation , 1999, Springer Berlin Heidelberg.