-
1
-
-
84890046220
-
Mandiant intelligence center, APT1: Exposing one of china's cyber espionage units
-
Mandiant Intelligence Center, "APT1: Exposing one of China's cyber espionage units," Mandiant, Tech. Rep. , 2013.
-
(2013)
Mandiant, Tech. Rep.
-
-
-
7
-
-
35148893877
-
Evaluating and strengthening enterprise network security using attack graphs
-
R. Lippmann, K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. K. Cunningham. , "Evaluating and strengthening enterprise network security using attack graphs. " MIT Lincoln Laboratory, Tech. Rep. , 2005.
-
(2005)
MIT Lincoln Laboratory, Tech. Rep.
-
-
Lippmann, R.1
Ingols, K.2
Scott, C.3
Piwowarski, K.4
Kratkiewicz, K.5
Artz, M.6
Cunningham, R.K.7
-
10
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
may
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated generation and analysis of attack graphs. " in the IEEE Symposium on Security and Privacy, may 2002.
-
(2002)
The IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
11
-
-
77953193332
-
Application-level simulation for network security
-
S. Schmidt, R. Bye, J. Chinnow, K. Bsufka, A. Camtepe, and S. Albayrak, "Application-level simulation for network security," SIMULATION, vol. 86, pp. 311-330, 2010.
-
(2010)
SIMULATION
, vol.86
, pp. 311-330
-
-
Schmidt, S.1
Bye, R.2
Chinnow, J.3
Bsufka, K.4
Camtepe, A.5
Albayrak, S.6
-
12
-
-
84863030748
-
A self-shielding dynamic network architecture
-
J. Yackoski, P. Xie, H. Bullen, J. Li, and K. Sun, "A self-shielding dynamic network architecture," Proceedings of IEEE MILCOM, pp. 1381-1386, 2011.
-
(2011)
Proceedings of IEEE MILCOM
, pp. 1381-1386
-
-
Yackoski, J.1
Xie, P.2
Bullen, H.3
Li, J.4
Sun, K.5
-
13
-
-
84890100156
-
Mission-oriented moving target defense based on cryptographically strong network dynamics
-
New York, USA: ACM
-
J. Yackoski, J. Li, S. A. DeLoach, X. Ou, and A. Singhal, "Mission-oriented moving target defense based on cryptographically strong network dynamics," in CSIIRW '12: Eight Annual Workshop on Cyber Security and Information Intelligence Research. New York, USA: ACM, 2013.
-
(2013)
CSIIRW '12: Eight Annual Workshop on Cyber Security and Information Intelligence Research
-
-
Yackoski, J.1
Li, J.2
Deloach, S.A.3
Ou, X.4
Singhal, A.5
-
14
-
-
84890049645
-
-
Openstack july
-
Openstack, "Openstack: The folsom release," http://www. openstack. org/software/, july 1, 2013.
-
(2013)
Openstack: The Folsom Release
, vol.1
-
-
-
15
-
-
84964510395
-
Dynamic approaches to thwart adversary intelligence gathering
-
D. Kewley, R. Fink, J. Lowry, and M. Dean, "Dynamic approaches to thwart adversary intelligence gathering,," Proceedings of the DARPA Information Survivability Conference & Exposition, pp. 176-185, 2001.
-
(2001)
Proceedings of the DARPA Information Survivability Conference & Exposition
, pp. 176-185
-
-
Kewley, D.1
Fink, R.2
Lowry, J.3
Dean, M.4
-
16
-
-
31844455887
-
Final report for the network security mechanisms utilizing network address translation LDRD project
-
November
-
J. Michalski, C. Price, E. Stanton, E. L. Chua, K. Seah, W. Y. Heng, and T. C. Pheng, "Final report for the network security mechanisms utilizing network address translation LDRD project," Sandia National Laboratories, Tech. Rep. Technical Report SAND2002-3613, November 2002.
-
(2002)
Sandia National Laboratories, Tech. Rep. Technical Report SAND2002-3613
-
-
Michalski, J.1
Price, C.2
Stanton, E.3
Chua, E.L.4
Seah, K.5
Heng, W.Y.6
Pheng, T.C.7
-
17
-
-
34250345531
-
Defending against hitlist worms using network address space randomization
-
Aug.
-
S. Antonatos, P. Akritidis, E. Markatos, and K. Anagnostakis, "Defending against hitlist worms using network address space randomization," Comput. Netw. , vol. 51, no. 12, pp. 3471-3490, Aug. 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.12
, pp. 3471-3490
-
-
Antonatos, S.1
Akritidis, P.2
Markatos, E.3
Anagnostakis, K.4
-
18
-
-
84890012760
-
Improving the quality of service and security of military networks with a network tasking order process
-
M. D. Compton, "Improving the quality of service and security of military networks with a network tasking order process," Ph. D. dissertation, Air Force Institute of Technology, 2009.
-
(2009)
Ph. D. Dissertation, Air Force Institute of Technology
-
-
Compton, M.D.1
-
19
-
-
84890055624
-
Toward network configuration randomization for moving target defense
-
S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Eds. Springer New York
-
E. Al-Shaer, "Toward network configuration randomization for moving target defense," in Moving Target Defense, ser. Advances in Information Security, S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Eds. Springer New York, 2011, vol. 54, pp. 153-159.
-
(2011)
Moving Target Defense, Ser. Advances in Information Security
, vol.54
, pp. 153-159
-
-
Al-Shaer, E.1
|