Evaluating Moving Target Defense with PLADD
暂无分享,去创建一个
Alexander V. Outkin | John Daniel Siirola | Daniel R. Tauritz | Stephen J. Verzi | Samuel A. Mulder | John D. Siirola | Jared Lee Gearhart | Cynthia A. Phillips | Asmeret Bier Naugle | Stephen T. Jones | Jared L. Gearhart | Stephen T. Jones | Jacob A. Hobbs | C. Phillips | Alexander Outkin | S. Verzi | A. Naugle | S. Mulder | D. Tauritz
[1] Michael P. Wellman,et al. Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report) , 2014, GameSec.
[2] Sushil Jajodia,et al. Moving Target Defense II: Application of Game Theory and Adversarial Modeling , 2012 .
[3] David H. Ackley,et al. Randomized instruction set emulation , 2005, TSEC.
[4] Richard K. Belew,et al. Coevolutionary search among adversaries , 1997 .
[5] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[6] Ronald L. Rivest,et al. Chaffing and Winnowing: Confidentiality without Encryption , 2012 .
[7] Herbert Bos,et al. SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets , 2013, 2013 IEEE Symposium on Security and Privacy.
[8] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[9] Milind Tambe,et al. Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers , 2013, GameSec.
[10] Bruce Schneier,et al. Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator , 1999, Selected Areas in Cryptography.
[11] Dawn Song,et al. Mitigating buffer overflows by operating system randomization , 2002 .
[12] Akimichi Takemura,et al. Defensive Forecasting , 2005, AISTATS.
[13] Peter,et al. Game-theoretic probability and its uses , especially defensive forecasting , 2007 .
[14] N. Taleb. Antifragile: Things That Gain from Disorder , 2012 .
[15] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2007, Comput. Networks.
[16] Carlos Cid,et al. Are We Compromised? Modelling Security Assessment Games , 2012, GameSec.
[17] Anh Nguyen-Tuong,et al. Effectiveness of Moving Target Defenses , 2011, Moving Target Defense.
[18] Daniel R. Tauritz. INCREASING INFRASTRUCTURE RESILIENCE THROUGH COMPETITIVE COEVOLUTION , 2009 .
[19] Ronald L. Rivest,et al. Defending against the Unknown Enemy: Applying FlipIt to System Security , 2012, GameSec.
[20] Aron Laszka,et al. Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks , 2013, WINE.
[21] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[22] Michael P. Wellman. Methods for Empirical Game-Theoretic Analysis , 2006, AAAI.
[23] Gábor Horváth,et al. FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources , 2014, GameSec.
[24] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[25] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[26] George Candea,et al. Microreboot - A Technique for Cheap Recovery , 2004, OSDI.