Operational cost of deploying Moving Target Defenses defensive work factors
暂无分享,去创建一个
[1] Erik Lee,et al. Network Randomization and Dynamic Defense for Critical Infrastructure Systems , 2015 .
[2] Bryan Richardson,et al. Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[3] Angelos Stavrou,et al. MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[4] Mark D. Torgerson,et al. 12 th ICCRTS “ Adapting C 2 to the 21 st Century ” Security Metrics for Communication Systems Communications System Security Security Metrics Metrics and Assessments , 2006 .
[5] George Cybenko,et al. No free lunch in cyber security , 2014, MTD '14.
[6] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[7] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[8] Joseph G. Tront,et al. MT6D: A Moving Target IPv6 Defense , 2011, 2011 - MILCOM 2011 Military Communications Conference.