-
1
-
-
84899577662
-
Cybersecurity game-change research & development recommendations
-
May
-
"Cybersecurity Game-Change Research & Development Recommendations," Networking and Information Technology Research and Development Program, May 2010; www.nitrd.gov/pubs/ CSIAIWG%20Cybersecurity%20GameChangeRD%20Recommendations20100513.pdf.
-
(2010)
Networking and Information Technology Research and Development Program
-
-
-
2
-
-
84863936248
-
Command and control requirements for moving-Target defense
-
M. Carvalho et al., "Command and Control Requirements for Moving-Target Defense," IEEE Intelligent Systems, vol. 27, no. 3, 2012, pp. 79-85.
-
(2012)
IEEE Intelligent Systems
, vol.27
, Issue.3
, pp. 79-85
-
-
Carvalho, M.1
-
3
-
-
84872422025
-
Predictability-oriented defense against adaptive adversaries
-
R. Colbaugh and K. Glass, "Predictability-Oriented Defense against Adaptive Adversaries," Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics (SMC 12), 2012, pp. 2721-2727.
-
(2012)
Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics (SMC 12)
, pp. 2721-2727
-
-
Colbaugh, R.1
Glass, K.2
-
7
-
-
0742269305
-
Resilient self-organizing overlay networks for security update delivery
-
J. Li, P. Reiher, and G.J. Popek, "Resilient Self-Organizing Overlay Networks for Security Update Delivery," IEEE J. Selected Areas in Communications, vol. 22, no. 1, 2004, pp. 189-202.
-
(2004)
IEEE J. Selected Areas in Communications
, vol.22
, Issue.1
, pp. 189-202
-
-
Li, J.1
Reiher, P.2
Popek, G.J.3
-
8
-
-
84858289309
-
Creatinga cyber moving target for critical infrastructure applications using platform diversity
-
H. Okhravi et al., "Creating a Cyber Moving Target for Critical Infrastructure Applications Using Platform Diversity," Int'l J. Critical Infrastructure Protection, vol. 5, no. 1, 2012, pp. 30-39.
-
(2012)
Int'l J. Critical Infrastructure Protection
, vol.5
, Issue.1
, pp. 30-39
-
-
Okhravi, H.1
-
9
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
B. Cox et al., "N-Variant Systems: A Secretless Framework for Security through Diversity," Proc. 15th Usenix Security Symp., 2006, pp. 105-120.
-
(2006)
Proc. 15th Usenix Security Symp.
, pp. 105-120
-
-
Cox, B.1
-
10
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
G.S. Kc, A.D. Keromytis, and V. Prevelakis, "Countering Code-Injection Attacks with Instruction-Set Randomization," Proc. 10th ACM Conf. Computer and Communications Security (CCS 03), 2003, pp. 272-280. (Pubitemid 40673809)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
12
-
-
79957595816
-
Runtime defense against code injection attacks using replicated execution
-
B. Salamat et al., "Runtime Defense against Code Injection Attacks Using Replicated Execution," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 4, 2011, pp. 588-601.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.4
, pp. 588-601
-
-
Salamat, B.1
-
13
-
-
84856746279
-
GenProg: A generic method for automatic software repair
-
C. Le Goues et al., "GenProg: A Generic Method for Automatic Software Repair," IEEE Trans. Software Eng., vol. 38, no. 1, 2012, pp. 54-72.
-
(2012)
IEEE Trans. Software Eng.
, vol.38
, Issue.1
, pp. 54-72
-
-
Le Goues, C.1
-
14
-
-
0023997325
-
Data diversity: An approach to software fault tolerance
-
P.E. Ammann and J.C. Knight, "Data Diversity: An Approach to Software Fault Tolerance," IEEE Trans. Computers, vol. 37, no. 4, 1988, pp. 418-425.
-
(1988)
IEEE Trans. Computers
, vol.37
, Issue.4
, pp. 418-425
-
-
Ammann, P.E.1
Knight, J.C.2
-
15
-
-
70350684106
-
-
tech. report MSRTR-2008-120, Microsoft Research, Sept.
-
C. Cadar et al., Data Randomization, tech. report MSRTR- 2008-120, Microsoft Research, Sept. 2008.
-
(2008)
Data Randomization
-
-
Cadar, C.1
|