-
2
-
-
84893541332
-
A moving target defense mechanism for manets based on identity virtualization
-
Oct
-
M. Albanese, A. De Benedictis, S. Jajodia, and K. Sun. A moving target defense mechanism for manets based on identity virtualization. In Communications and Network Security (CNS), 2013 IEEE Conference on, pages 278-286, Oct 2013.
-
(2013)
Communications and Network Security (CNS), 2013 IEEE Conference on
, pp. 278-286
-
-
Albanese, M.1
Benedictis, A.D.2
Jajodia, S.3
Sun, K.4
-
3
-
-
34250345531
-
Defending against hitlist worms using network address space randomization
-
S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hitlist worms using network address space randomization. Comput. Netw., 51(12):3471-3490, 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.12
, pp. 3471-3490
-
-
Antonatos, S.1
Akritidis, P.2
Markatos, E.P.3
Anagnostakis, K.G.4
-
4
-
-
84966929628
-
Adaptive use of network-centric mechanisms in cyber-defense
-
IEEE Computer Society
-
M. Atighetchi, P. Pal, F. Webber, and C. Jones. Adaptive use of network-centric mechanisms in cyber-defense. In ISORC '03, page 183. IEEE Computer Society, 2003.
-
(2003)
ISORC '03
-
-
Atighetchi, M.1
Pal, P.2
Webber, F.3
Jones, C.4
-
5
-
-
84937682316
-
-
W. v. d. G. C. Contavalli
-
W. v. d. G. C. Contavalli. Client subnet in dns requests. http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00 2011.
-
(2011)
Client Subnet in Dns Requests
-
-
-
6
-
-
76249100996
-
An attacker-defender game for honeynets
-
Springer-Verlag
-
J.-Y. Cai, V. Yegneswaran, C. Alfeld, and P. Barford. An attacker-defender game for honeynets. In Proceedings of the 15th Annual International Conference on Computing and Combinatorics, pages 7-16. Springer-Verlag, 2009.
-
(2009)
Proceedings of the 15th Annual International Conference on Computing and Combinatorics
, pp. 7-16
-
-
Cai, J.-Y.1
Yegneswaran, V.2
Alfeld, C.3
Barford, P.4
-
7
-
-
38149070087
-
Hit-list worm detection and bot identification in large networks using protocol graphs
-
Berlin, Heidelberg, Springer-Verlag
-
M. P. Collins and M. K. Reiter. Hit-list worm detection and bot identification in large networks using protocol graphs. In Proceedings of the 10th international conference on Recent advances in intrusion detection, RAID'07, pages 276-295, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 10th International Conference on Recent Advances in Intrusion Detection, RAID'07
, pp. 276-295
-
-
Collins, M.P.1
Reiter, M.K.2
-
9
-
-
84866521295
-
Open flow random host mutation: Transparent moving target defense using software defined networking
-
Helsinki, Finland
-
J. H. Jafarian, E. Al-Shaer, and Q. Duan. Open flow random host mutation: Transparent moving target defense using software defined networking. In Proceedings of HotSDN workshop at SIGCOMM'12, Helsinki, Finland, 2012.
-
(2012)
Proceedings of HotSDN Workshop at SIGCOMM'12
-
-
Jafarian, J.H.1
Al-Shaer, E.2
Duan, Q.3
-
10
-
-
0003860037
-
-
editor. (Chapman & Hall/CRC Interdisciplinary Statistics). Chapman and Hall/CRC, 1 edition, Dec
-
R. E. Kass, editor. Markov Chain Monte Carlo in Practice (Chapman & Hall/CRC Interdisciplinary Statistics). Chapman and Hall/CRC, 1 edition, Dec. 1995.
-
(1995)
Markov Chain Monte Carlo in Practice
-
-
Kass, R.E.1
-
11
-
-
84964510395
-
Dynamic approaches to thwart adversary intelligence gathering
-
Proceedings, vol.1
-
D. Kewley, R. Fink, J. Lowry, and M. Dean. Dynamic approaches to thwart adversary intelligence gathering. In DARPA Information Survivability Conference Exposition II, 2001. DISCEX '01. Proceedings, volume 1, pages 176 -185 vol.1, 2001.
-
(2001)
DARPA Information Survivability Conference Exposition II, 2001. DISCEX '01
, vol.1
, pp. 176-185
-
-
Kewley, D.1
Fink, R.2
Lowry, J.3
Dean, M.4
-
12
-
-
84865538933
-
A network in a laptop: Rapid prototyping for software-defined networks
-
New York, NY, USA, ACM
-
B. Lantz, B. Heller, and N. McKeown. A network in a laptop: Rapid prototyping for software-defined networks. In Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets '10, pages 191-196, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets '10
, pp. 191-196
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
13
-
-
84884766781
-
-
OpenFlow group at Stanford University. POX Wiki, 2013. https://openflow.stanford.edu/display/ONL/POX+Wiki.
-
(2013)
POX Wiki
-
-
-
14
-
-
68649129121
-
Open flow: Enabling innovation in campus networks
-
Mar
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Open flow: Enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev., 38(2):69-74, Mar. 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
15
-
-
0003780986
-
The pagerank citation ranking: Bringing order to the web
-
November
-
L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical Report 1999-66, Stanford InfoLab, November 1999.
-
(1999)
Technical Report 1999-66, Stanford InfoLab
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
16
-
-
84874563385
-
-
K. security lab
-
K. security lab. Securelist. http://www.securelist.com/en/analysis, 2012.
-
(2012)
Securelist
-
-
-
17
-
-
78249239478
-
Behavior-based worm detectors compared
-
S. Jha, R. Sommer, and C. Kreibich, editors, volume 6307 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
S. Stafford and J. Li. Behavior-based worm detectors compared. In S. Jha, R. Sommer, and C. Kreibich, editors, Recent Advances in Intrusion Detection, volume 6307 of Lecture Notes in Computer Science, pages 38-57. Springer Berlin Heidelberg, 2010.
-
(2010)
Recent Advances in Intrusion Detection
, pp. 38-57
-
-
Stafford, S.1
Li., J.2
-
18
-
-
50249085983
-
An attack graph-based probabilistic security metric
-
Berlin, Heidelberg, Springer-Verlag
-
L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia. An attack graph-based probabilistic security metric. In Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security, pages 283-296, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceeedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
19
-
-
84863030748
-
A self-shielding dynamic network architecture
-
nov
-
J. Yackoski, P. Xie, H. Bullen, J. Li, and K. Sun. A self-shielding dynamic network architecture. In MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011, pages 1381 -1386, nov. 2011.
-
(2011)
Military Communications Conference, 2011 - MILCOM 2011
, pp. 1381-1386
-
-
Yackoski, J.1
Xie, P.2
Bullen, H.3
Li, J.4
Sun, K.5
|