Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense
暂无分享,去创建一个
[1] Karl N. Levitt,et al. A distributed host-based worm detection system , 2006, LSAD '06.
[2] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2007, Comput. Networks.
[3] Karl N. Levitt,et al. A framework for diversifying windows native APIs to tolerate code injection attacks , 2007, ASIACCS '07.
[4] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[5] K.S. Swarup,et al. Identification of Operating States of Power System Using Transient Stability Analysis , 2008, 2008 Joint International Conference on Power System Technology and IEEE Power India Conference.
[6] Karl N. Levitt,et al. Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach , 2008, RAID.
[7] Karl N. Levitt,et al. System Health and Intrusion Monitoring Using a Hierarchy of Constraints , 2001, Recent Advances in Intrusion Detection.