메뉴 건너뛰기




Volumn , Issue , 2013, Pages 22-29

A moving target defense approach for protecting resource-constrained distributed devices

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION USE;

EID: 84891061868     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IRI.2013.6642449     Document Type: Conference Paper
Times cited : (50)

References (19)
  • 2
    • 34250345531 scopus 로고    scopus 로고
    • Defending against hitlist worms using networkaddress space randomization
    • August
    • S. Antonatos, P. Akritidis, E. P. Markatos, and K. G.Anagnostakis. Defending against hitlist worms using networkaddress space randomization. Computer Networks,51(12):3471-3490, August 2007.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3471-3490
    • Antonatos, S.1    Akritidis, P.2    Markatos, E.P.3    Anagnostakis, K.G.4
  • 5
    • 33847411543 scopus 로고    scopus 로고
    • Apolicy-based methodology for security evaluation: A securitymetric for public key infrastructures
    • April
    • V. Casola, A. Mazzeo, N. Mazzocca, and V. Vittorini. Apolicy-based methodology for security evaluation: A securitymetric for public key infrastructures. Journal of ComputerSecurity, 15(2):197-229, April 2007.
    • (2007) Journal of ComputerSecurity , vol.15 , Issue.2 , pp. 197-229
    • Casola, V.1    Mazzeo, A.2    Mazzocca, N.3    Vittorini, V.4
  • 6
    • 23844470859 scopus 로고    scopus 로고
    • A referencemodel for security level evaluation: Policy and fuzzy techniques
    • V. Casola, R. Preziosi, M. Rak, and L. Troiano. A referencemodel for security level evaluation: Policy and fuzzy techniques.Journal of Universal Computer Science, 11(1):150-174, 2005.
    • (2005) Journal of Universal Computer Science , vol.11 , Issue.1 , pp. 150-174
    • Casola, V.1    Preziosi, R.2    Rak, M.3    Troiano, L.4
  • 18
    • 33745115947 scopus 로고    scopus 로고
    • Reprogramming wirelesssensor networks: Challenges and approaches
    • May
    • Q. Wang, Y. Zhu, and L. Cheng. Reprogramming wirelesssensor networks: Challenges and approaches. IEEE Networks,20(3):48-55, May 2006.
    • (2006) IEEE Networks , vol.20 , Issue.3 , pp. 48-55
    • Wang, Q.1    Zhu, Y.2    Cheng, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.