A zoning algorithm for dynamic cyber zone defense
暂无分享,去创建一个
[1] Brian P. Van Leeuwen,et al. Operational cost of deploying Moving Target Defenses defensive work factors , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[2] Patrick D. McDaniel,et al. Adaptive protocol switching using Dynamically Insertable Bumps in the stack , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[3] Robert Mitchell,et al. Foundations for Cyber Zone Defense , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[4] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[5] Ehab Al-Shaer,et al. Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.
[6] Asif Effendi,et al. ICS and IT: Managing Cyber Security Across the Enterprise , 2015 .
[7] Kaliappa Nadar Ravindran. Management Software for Protocol-level Adaptations in Dependable Network Services , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).
[8] Mitchell Robert,et al. Refining the Foundations for Cyber Zone Defense , 2016 .
[9] Scott A. DeLoach,et al. Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense | NIST , 2012 .
[10] Chaojing Tang,et al. A new dynamic address solution for moving target defense , 2016, 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference.
[11] Harry G. Perros,et al. SDN-based solutions for Moving Target Defense network protection , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[12] Ing-Ray Chen,et al. Parameterizing Moving Target Defenses , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[13] William W. Streilein,et al. Survey of Cyber Moving Target Techniques , 2013 .