Action Recommendation for Cyber Resilience
暂无分享,去创建一个
Indrajit Ray | Sutanay Choudhury | Pin-Yu Chen | Luke Rodriguez | Darren S. Curtis | Kiri Oler | Peter Nordquist | Pin-Yu Chen | I. Ray | Sutanay Choudhury | Luke Rodriguez | Kiri Oler | P. Nordquist
[1] Xirong Que,et al. On reliability-optimized controller placement for Software-Defined Networks , 2014, China Communications.
[2] Igor Linkov,et al. Resilience metrics for cyber systems , 2013, Environment Systems and Decisions.
[3] Hanghang Tong,et al. Make It or Break It: Manipulating Robustness in Large Networks , 2014, SDM.
[4] Minghui Zhu,et al. Comparing Different Moving Target Defense Techniques , 2014, MTD '14.
[5] Indrajit Ray,et al. Optimal security hardening on attack tree models of networks: a cost-benefit analysis , 2012, International Journal of Information Security.
[6] Mahantesh Halappanavar,et al. Towards a theory of autonomous reconstitution of compromised cyber-systems , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[7] Marc Teboulle,et al. A Fast Iterative Shrinkage-Thresholding Algorithm for Linear Inverse Problems , 2009, SIAM J. Imaging Sci..
[8] Chin-Tser Huang,et al. A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces , 2014, 2014 IEEE International Conference on Communications (ICC).
[9] Kevin M. Carter,et al. Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism , 2014, RAID.