暂无分享,去创建一个
[1] Sushil Jajodia,et al. Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks , 2016, DBSec.
[2] Harish Sethu,et al. On achieving software diversity for improved network security using distributed coloring algorithms , 2004, CCS '04.
[3] Cristina Nita-Rotaru,et al. Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes , 2015, IEEE Trans. Dependable Secur. Comput..
[4] Donald Geman,et al. Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images , 1984 .
[5] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[6] Chris Hankin,et al. Effective Defence Against Zero-Day Exploits Using Bayesian Networks , 2016, CRITIS.
[7] C. Tappert,et al. A Survey of Binary Similarity and Distance Measures , 2010 .
[8] Brett Benyo,et al. Managed Execution Environment as a Moving-Target Defense Infrastructure , 2014, IEEE Security & Privacy.
[9] Alysson Neves Bessani,et al. OS diversity for intrusion tolerance: Myth or reality? , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[10] Juan E. Tapiador,et al. A Look into 30 Years of Malware Development from a Software Metrics Perspective , 2016, RAID.
[11] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[12] Kjell Jørgen Hole,et al. Diversity Reduces the Impact of Malware , 2015, IEEE Security & Privacy.
[13] Mathias Ekstedt,et al. Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis , 2018, IEEE Transactions on Dependable and Secure Computing.
[14] Vladimir Kolmogorov,et al. A New Look at Reweighted Message Passing , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Angelos D. Keromytis,et al. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization , 2012, 2012 IEEE Symposium on Security and Privacy.
[16] Sushil Jajodia,et al. Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks , 2014, ESORICS.
[17] Mehran Bozorgi,et al. Beyond heuristics: learning to classify vulnerabilities and predict exploits , 2010, KDD.
[18] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[19] Benoit Baudry,et al. The Multiple Facets of Software Diversity , 2014, ACM Comput. Surv..
[20] Sushil Jajodia,et al. Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks , 2016, IEEE Transactions on Information Forensics and Security.
[21] Sushil Jajodia,et al. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks , 2010, ESORICS.
[22] Per Larsen,et al. SoK: Automated Software Diversity , 2014, 2014 IEEE Symposium on Security and Privacy.
[23] Algirdas Avizienis,et al. The N-Version Approach to Fault-Tolerant Software , 1985, IEEE Transactions on Software Engineering.