-
1
-
-
84893541332
-
Amoving target defense mechanism for manets based on identityvirtualization
-
Washington, DC, USA, October
-
M. Albanese, A. D. Benedictis, S. Jajodia, and K. Sun. Amoving target defense mechanism for manets based on identityvirtualization. In Proceedings of the First IEEE Conferenceon Communications and Network Security (CNS 2013),Washington, DC, USA, October 2013.
-
(2013)
Proceedings of the First IEEE Conferenceon Communications and Network Security (CNS 2013)
-
-
Albanese, M.1
Benedictis, A.D.2
Jajodia, S.3
Sun, K.4
-
2
-
-
34250345531
-
Defending against hitlist worms using networkaddress space randomization
-
August
-
S. Antonatos, P. Akritidis, E. P. Markatos, and K. G.Anagnostakis. Defending against hitlist worms using networkaddress space randomization. Computer Networks,51(12):3471-3490, August 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3471-3490
-
-
Antonatos, S.1
Akritidis, P.2
Markatos, E.P.3
Anagnostakis, K.G.4
-
3
-
-
84966929628
-
Adaptiveuse of network-centric mechanisms in cyber-defense
-
May
-
M. Atighetchi, P. Pal, F. Webber, and C. Jones. Adaptiveuse of network-centric mechanisms in cyber-defense. InProceedings of the Sixth IEEE International Symposium onObject-Oriented Real-Time Distributed Computing (ISORC2003), pages 183-192, May 2003.
-
(2003)
InProceedings of the Sixth IEEE International Symposium OnObject-Oriented Real-Time Distributed Computing (ISORC2003)
, pp. 183-192
-
-
Atighetchi, M.1
Pal, P.2
Webber, F.3
Jones, C.4
-
4
-
-
83255189519
-
Analysis and comparison of security protocols in wirelesssensor networks
-
Madrid, Spain, October
-
V. Casola, A. D. Benedictis, A. Drago, and N. Mazzocca.Analysis and comparison of security protocols in wirelesssensor networks. In Proceedings of the 30th IEEE Symposiumon Reliable Distributed Systems Workshops (SRDSW2011), pages 52-56, Madrid, Spain, October 2011.
-
(2011)
Proceedings of the 30th IEEE Symposiumon Reliable Distributed Systems Workshops (SRDSW2011)
, pp. 52-56
-
-
Casola, V.1
Benedictis, A.D.2
Drago, A.3
Mazzocca, N.4
-
5
-
-
33847411543
-
Apolicy-based methodology for security evaluation: A securitymetric for public key infrastructures
-
April
-
V. Casola, A. Mazzeo, N. Mazzocca, and V. Vittorini. Apolicy-based methodology for security evaluation: A securitymetric for public key infrastructures. Journal of ComputerSecurity, 15(2):197-229, April 2007.
-
(2007)
Journal of ComputerSecurity
, vol.15
, Issue.2
, pp. 197-229
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Vittorini, V.4
-
6
-
-
23844470859
-
A referencemodel for security level evaluation: Policy and fuzzy techniques
-
V. Casola, R. Preziosi, M. Rak, and L. Troiano. A referencemodel for security level evaluation: Policy and fuzzy techniques.Journal of Universal Computer Science, 11(1):150-174, 2005.
-
(2005)
Journal of Universal Computer Science
, vol.11
, Issue.1
, pp. 150-174
-
-
Casola, V.1
Preziosi, R.2
Rak, M.3
Troiano, L.4
-
7
-
-
34247376029
-
Securingthe deluge network programming system
-
April2006
-
P. K. Dutta, J.W. Hui, D. C. Chu, and D. E. Culler. Securingthe deluge network programming system. In Proceedings ofthe Fifth International Conference on Information Processingin Sensor Networks (IPSN 2006), pages 326-333, April2006.
-
Proceedings Ofthe Fifth International Conference on Information Processingin Sensor Networks (IPSN 2006)
, pp. 326-333
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
11
-
-
22744432612
-
The dynamic behavior of a data disseminationprotocol for network programming at scale
-
Baltimore, MD, USA
-
J.W. Hui and D. Culler. The dynamic behavior of a data disseminationprotocol for network programming at scale. InProceedings of the 2nd International Conference on EmbeddedNetworked Sensor Systems (SenSys 2004), pages 81-94,Baltimore, MD, USA, 2004.
-
(2004)
Proceedings of the 2nd International Conference on EmbeddedNetworked Sensor Systems (SenSys 2004)
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
-
12
-
-
84877282861
-
Moving target defense: Creating asymmetric uncertaintyfor cyber threats
-
Springer
-
T. Jackson, B. Salamat, A. Homescu, K. Manivannan,G.Wagner, A. Gal, S. Brunthaler, C.Wimmer, and M. Franz.Moving Target Defense: Creating Asymmetric Uncertaintyfor Cyber Threats, chapter Compiler-Generated SoftwareDiversity, pages 77-98. Springer, 2011.
-
(2011)
Chapter Compiler-Generated SoftwareDiversity
, pp. 77-98
-
-
Jackson, T.1
Salamat, B.2
Homescu, A.3
Manivannan, K.4
Wagner, G.5
Gal, A.6
Brunthaler, S.7
Wimmer, C.8
Franz, M.9
-
13
-
-
84893301083
-
-
Springer, 1st edition
-
S. Jajodia, A. K. Ghosh, V. S. Subrahmanian, V. Swarup,C. Wang, and X. S. Wang, editors. Moving Target DefenseII: Application of Game Theory and Adversarial Modeling,volume 100 of Advances in Information Security. Springer,1st edition, 2013.
-
(2013)
Moving Target DefenseII: Application of Game Theory and Adversarial Modeling, Volume 100 of Advances in Information Security
-
-
Jajodia, S.1
Ghosh, A.K.2
Subrahmanian, V.S.3
Swarup, V.4
Wang, C.5
Wang, X.S.6
-
14
-
-
84863913620
-
-
Springer, 1st edition
-
S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S.Wang, editors. Moving Target Defense: Creating AsymmetricUncertainty for Cyber Threats, volume 54 of Advancesin Information Security. Springer, 1st edition, 2011.
-
(2011)
Moving Target Defense: Creating AsymmetricUncertainty for Cyber Threats, Volume 54 of Advancesin Information Security
-
-
Jajodia, S.1
Ghosh, A.K.2
Swarup, V.3
Wang, C.4
Wang, X.S.5
-
15
-
-
84964510395
-
Dynamic approachesto thwart adversary intelligence gathering
-
Anaheim, CA, USA, June
-
D. Kewley, R. Fink, J. Lowry, and M. Dean. Dynamic approachesto thwart adversary intelligence gathering. In Proceedingsof the DARPA Information Survivability Conference&Exposition (DISCEX 2011), volume 1, pages 176-185, Anaheim, CA, USA, June 2011.
-
(2011)
Proceedingsof the DARPA Information Survivability Conference& Exposition (DISCEX 2011), Volume 1
, pp. 176-185
-
-
Kewley, D.1
Fink, R.2
Lowry, J.3
Dean, M.4
-
17
-
-
51349093348
-
-
TechnicalReport WMCS-2007-11, College of William and Mary, October
-
H. Wang, B. Sheng, C. Tan, and Q. Li. WM-ECC: An ellipticcurve cryptography suite on sensor motes. TechnicalReport WMCS-2007-11, College of William and Mary, October2007.
-
(2007)
WM-ECC: An Ellipticcurve Cryptography Suite on Sensor Motes
-
-
Wang, H.1
Sheng, B.2
Tan, C.3
Li, Q.4
-
18
-
-
33745115947
-
Reprogramming wirelesssensor networks: Challenges and approaches
-
May
-
Q. Wang, Y. Zhu, and L. Cheng. Reprogramming wirelesssensor networks: Challenges and approaches. IEEE Networks,20(3):48-55, May 2006.
-
(2006)
IEEE Networks
, vol.20
, Issue.3
, pp. 48-55
-
-
Wang, Q.1
Zhu, Y.2
Cheng, L.3
|