Characterizing Network-Based Moving Target Defenses
暂无分享,去创建一个
[1] Sujata Banerjee,et al. DevoFlow: scaling flow management for high-performance networks , 2011, SIGCOMM.
[2] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2005, WORM '05.
[3] Michael Atighetchi,et al. Adaptive use of network-centric mechanisms in cyber-defense , 2003, Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003..
[4] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[5] Donald F. Towsley,et al. On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.
[6] D. Kewley,et al. Dynamic approaches to thwart adversary intelligence gathering , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] Scott A. DeLoach,et al. Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense | NIST , 2012 .
[8] Erik Blasch,et al. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD) , 2014, Defense + Security Symposium.
[9] Dan Rubenstein,et al. Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[10] Craig A. Shue,et al. Resolvers Revealed: Characterizing DNS Resolvers and their Clients , 2013, TOIT.
[11] Curtis R. Taylor,et al. On building inexpensive network capabilities , 2012, CCRV.
[12] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[13] Xin Huang,et al. Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization , 2014, CoNEXT.
[14] Joseph G. Tront,et al. MT6D: A Moving Target IPv6 Defense , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[15] Sakir Sezer,et al. Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[16] William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.