暂无分享,去创建一个
Sailik Sengupta | Subbarao Kambhampati | Dijiang Huang | Ankur Chowdhary | S. Kambhampati | Dijiang Huang | Ankur Chowdhary | Sailik Sengupta
[1] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[2] Sushil Jajodia,et al. A Moving Target Defense Approach to Disrupting Stealthy Botnets , 2016, MTD@CCS.
[3] Scott A. DeLoach,et al. Towards a Theory of Moving Target Defense , 2014, MTD '14.
[4] Scott A. DeLoach,et al. Investigating the application of moving target defenses to network security , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[5] Sushil Jajodia,et al. SHARE , 2018, ACM Transactions on Internet Technology.
[6] Gail-Joon Ahn,et al. Science DMZ: SDN based secured cloud testbed , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
[7] Chin-Tser Huang,et al. A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces , 2014, 2014 IEEE International Conference on Communications (ICC).
[8] Ross Brewer,et al. Advanced persistent threats: minimising the damage , 2014, Netw. Secur..
[9] Tsuyoshi Murata,et al. {m , 1934, ACML.
[10] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[11] Siv Hilde Houmb,et al. Quantifying security risk level from CVSS estimates of frequency and impact , 2010, J. Syst. Softw..
[12] Sailik Sengupta,et al. Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud , 2018, GameSec.
[13] Milind Tambe,et al. From physical security to cybersecurity , 2015, J. Cybersecur..
[14] Harry G. Perros,et al. SDN-based solutions for Moving Target Defense network protection , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[15] Sailik Sengupta,et al. A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications , 2017, AAMAS.
[16] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[17] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[18] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.
[19] Angelos Stavrou,et al. MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[20] Dijiang Huang,et al. SDN based Scalable MTD solution in Cloud Network , 2016, MTD@CCS.
[21] Michael L. Littman,et al. Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.