Mohammed Samaka,et al. Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
 Ehab Al-Shaer,et al. Taxonomy of conflicts in network security policies , 2006, IEEE Communications Magazine.
 Sushil Jajodia,et al. Time-efficient and cost-effective network hardening using attack graphs , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
 Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
 Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
 Nathaniel Evans,et al. Multiple OS rotational environment an implemented Moving Target Defense , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
 Kemal Akkaya,et al. Mitigating Selective Jamming Attacks in Smart Meter Data Collection using Moving Target Defense , 2017, Q2SWinet@MSWiM.
 Seungjoon Lee,et al. Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.
 Pratyusa K. Manadhata. Game Theoretic Approaches to Attack Surface Shifting , 2013, Moving Target Defense.
 Shlomo Zilberstein,et al. Dynamic Programming for Partially Observable Stochastic Games , 2004, AAAI.
 Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
 Abdullah Al-Dujaili,et al. Adversarial Deep Learning for Robust Detection of Binary Encoded Malware , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
 Sailik Sengupta,et al. Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract) , 2016, AAMAS.
 Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.
 Richard Lippmann,et al. Practical Attack Graph Generation for Network Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
 Daniel R. Simon,et al. Secure traceroute to detect faulty or malicious routing , 2003, CCRV.
 Sailik Sengupta,et al. Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud , 2018, GameSec.
 Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
 Sateesh K. Peddoju,et al. HIDS: A host based intrusion detection system for cloud computing environment , 2018, Int. J. Syst. Assur. Eng. Manag..
 Michael P. Wellman,et al. Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis , 2018, Secur. Commun. Networks.
 Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
 Atul Prakash,et al. Distilling critical attack graph surface iteratively through minimum-cost SAT solving , 2011, ACSAC '11.
 Ehab Al-Shaer. Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.
 Dijiang Huang,et al. Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments , 2019, IEEE Transactions on Dependable and Secure Computing.
 Radha Poovendran,et al. A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense , 2015, GameSec.
 Jan Medved,et al. OpenDaylight: Towards a Model-Driven SDN Controller architecture , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
 Martin Roesch,et al. Snort: Lightweight Intrusion Detection for Networks , 1999, LISA.
 Yevgeniy Vorobeychik,et al. Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.
 Prasad Calyam,et al. Frequency-minimal moving target defense using software-defined networking , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
 Demosthenis Teneketzis,et al. Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs , 2015, MTD@CCS.
 Xiao Han,et al. Evaluation of Deception-Based Web Attacks Detection , 2017, MTD@CCS.
 David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.
 Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
 Sushil Jajodia,et al. A moving target defense mechanism for MANETs based on identity virtualization , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
 Fenlin Liu,et al. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks , 2017, Secur. Commun. Networks.
 Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
 Scott A. DeLoach,et al. Investigating the application of moving target defenses to network security , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
 Kevin M. Carter,et al. A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses , 2014, MTD '14.
 Sushil Jajodia,et al. A Moving Target Defense Approach to Disrupting Stealthy Botnets , 2016, MTD@CCS.
 Somesh Jha,et al. End-to-End Software Diversification of Internet Services , 2011, Moving Target Defense.
 Sailik Sengupta,et al. MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense , 2018, AAAI Workshops.
 Volodymyr Mosorov,et al. Nessi2 simulator for large-scale DDoS attack analysis , 2011, Perspective Technologies and Methods in MEMS Design.
 Mohammed Samaka,et al. Feasibility of Supervised Machine Learning for Cloud Security , 2016, 2016 International Conference on Information Science and Security (ICISS).
 Sushil Jajodia,et al. SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine , 2018, ACM Trans. Internet Techn..
 Vikram S. Adve,et al. The LLVM Compiler Framework and Infrastructure Tutorial , 2004, LCPC.
 Joshua Taylor,et al. A Quantitative Framework for Moving Target Defense Effectiveness Evaluation , 2015, MTD@CCS.
 Joshua Taylor,et al. Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks , 2016, MTD@CCS.
 Dong Seong Kim,et al. Software Defined Stochastic Model for Moving Target Defense , 2016, AECIA.
 Hongwei Shi,et al. Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory , 2020, IEEE Internet of Things Journal.
 Per Larsen,et al. Large-Scale Automated Software Diversity—Program Evolution Redux , 2017, IEEE Transactions on Dependable and Secure Computing.
 Mohsine Eleuldj,et al. OpenStack: Toward an Open-source Solution for Cloud Computing , 2012 .
 Stefan Rass,et al. Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.
 Sanjay Jha,et al. A Survey of Securing Networks Using Software Defined Networking , 2015, IEEE Transactions on Reliability.
 Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
 Bharat K. Bhargava,et al. Mayflies: A Moving Target Defense Framework for Distributed Systems , 2016, MTD@CCS.
 Deep Medhi,et al. SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment , 2015, 2015 IEEE International Conference on Dependable Systems and Networks Workshops.
 Fei Li,et al. Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks , 2016, MTD@CCS.
 Wen Shen,et al. Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model , 2020, AAMAS.
 Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
 Scott A. DeLoach,et al. Mission-oriented moving target defense based on cryptographically strong network dynamics , 2013, CSIIRW '13.
 Dijiang Huang,et al. MTD Analysis and evaluation framework in Software Defined Network (MASON) , 2018, SDN-NFV@CODASPY.
 Michael E. Locasto,et al. Software Diversity: Security, Entropy and Game Theory , 2012, HotSec.
 Omar Santos,et al. Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services , 2014 .
 Min Zhu,et al. B4: experience with a globally-deployed software defined wan , 2013, SIGCOMM.
 Xiang Yu,et al. Applying Self-Shielding Dynamics to the Network Architecture , 2013, Moving Target Defense.
 Yevgeniy Vorobeychik,et al. Optimal randomized classification in adversarial settings , 2014, AAMAS.
 Jong Hyuk Park,et al. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats , 2014, Symmetry.
 Haifeng Xu,et al. Deceiving Cyber Adversaries: A Game Theoretic Approach , 2018, AAMAS.
 Michael L. Littman,et al. Value-function reinforcement learning in Markov games , 2001, Cognitive Systems Research.
 Michael B. Crouse,et al. Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses , 2015, MTD@CCS.
 Cheng Lei,et al. Optimal Strategy Selection for Moving Target Defense Based on Markov Game , 2017, IEEE Access.
 Michael P. Wellman,et al. Empirical Game-Theoretic Analysis for Moving Target Defense , 2015, MTD@CCS.
 Baosheng Wang,et al. RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
 Guanhua Yan,et al. Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats , 2018, MTD@CCS.
 Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
 Eric Eide,et al. Introducing CloudLab: Scientific Infrastructure for Advancing Cloud Architectures and Applications , 2014, login Usenix Mag..
 Minghui Zhu,et al. Comparing Different Moving Target Defense Techniques , 2014, MTD '14.
 Siv Hilde Houmb,et al. Quantifying security risk level from CVSS estimates of frequency and impact , 2010, J. Syst. Softw..
 Jin B. Hong,et al. Assessing the Effectiveness of Moving Target Defenses Using Security Models , 2016, IEEE Transactions on Dependable and Secure Computing.
 Sailik Sengupta,et al. Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks , 2018, ArXiv.
 P. Mell,et al. Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme , 2002 .
 Dijiang Huang,et al. Security policy checking in distributed SDN based clouds , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
 Dijiang Huang,et al. TRUFL: Distributed Trust Management Framework in SDN , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
 Yitzchak M. Gottlieb,et al. CyberVAN: A Cyber Security Virtual Assured Network testbed , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
 Jin B. Hong,et al. Scalable Security Models for Assessing Effectiveness of Moving Target Defenses , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
 Jin B. Hong,et al. Performance Analysis of Scalable Attack Representation Models , 2013, SEC.
 Jin B. Hong,et al. Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
 Xinming Ou,et al. Identifying Critical Attack Assets in Dependency Attack Graphs , 2008, ESORICS.
 Richard Colbaugh,et al. Predictability-oriented defense against adaptive adversaries , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
 Harry G. Perros,et al. SDN-based solutions for Moving Target Defense network protection , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
 Wei Hu,et al. Moving target defense: state of the art and characteristics , 2016, Frontiers of Information Technology & Electronic Engineering.
 Scott A. DeLoach,et al. MTD CBITS: Moving Target Defense for Cloud-Based IT Systems , 2017, ESORICS.
 The Folk Theorem with Imperfect Public Information , 1994 .
 Sailik Sengupta,et al. A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications , 2017, AAMAS.
 Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
 Yulong Wang,et al. U-TRI: Unlinkability Through Random Identifier for SDN Network , 2017, MTD@CCS.
 Florian Skopik,et al. Combating advanced persistent threats: From network event correlation to incident detection , 2015, Comput. Secur..
 Danilo Gligoroski,et al. Bypassing Data Execution Prevention on MicrosoftWindows XP SP2 , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
 Akihiro Nakao,et al. GENI: A federated testbed for innovative network experiments , 2014, Comput. Networks.
 Angelos Stavrou,et al. MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
 Jin B. Hong,et al. A survey on the usability and practical applications of Graphical Security Models , 2017, Comput. Sci. Rev..
 Laurent Vanbever,et al. NetHide: Secure and Practical Network Topology Obfuscation , 2018, USENIX Security Symposium.
 William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.
 Jin B. Hong,et al. Scalable Security Model Generation and Analysis Using k-importance Measures , 2013, SecureComm.
 Dijiang Huang,et al. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities , 2019, IEEE Communications Surveys & Tutorials.
 Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
 Dijiang Huang,et al. S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks , 2019, RAID.
 Dijiang Huang,et al. Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments , 2017, SDN-NFV@CODASPY.
 Julian Jang,et al. Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
 Kemal Akkaya,et al. Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).