-
1
-
-
84890055624
-
Toward network configuration randomization for moving target defense
-
Springer
-
E. Al-Shaer. Toward network configuration randomization for moving target defense. In Moving Target Defense, pages 153-159. Springer, 2011.
-
(2011)
Moving Target Defense
, pp. 153-159
-
-
Al-Shaer, E.1
-
2
-
-
34250345531
-
Defending against hitlist worms using network address space randomization
-
S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hitlist worms using network address space randomization. Computer Networks, 51(12):3471-3490, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3471-3490
-
-
Antonatos, S.1
Akritidis, P.2
Markatos, E.P.3
Anagnostakis, K.G.4
-
4
-
-
77956231127
-
On the general applicability of instruction-set randomization
-
S. W. Boyd, G. S. Kc, M. E. Locasto, A. D. Keromytis, and V. Prevelakis. On the general applicability of instruction-set randomization. Dependable and Secure Computing, IEEE Transactions on, 7(3):255-270, 2010.
-
(2010)
Dependable and Secure Computing, IEEE Transactions on
, vol.7
, Issue.3
, pp. 255-270
-
-
Boyd, S.W.1
Kc, G.S.2
Locasto, M.E.3
Keromytis, A.D.4
Prevelakis, V.5
-
6
-
-
85094324399
-
Modeling next generation configuration management tools
-
M. Burgess and A. L. Couch. Modeling next generation configuration management tools. In LISA, pages 131-147, 2006.
-
(2006)
LISA
, pp. 131-147
-
-
Burgess, M.1
Couch, A.L.2
-
7
-
-
84937721003
-
End-to-end software diversification of Internet services
-
Springer
-
M. Christodorescu, M. Fredrikson, S. Jha, and J. Giffin. End-to-end software diversification of Internet services. In Moving Target Defense, pages 117-130. Springer, 2011.
-
(2011)
Moving Target Defense
, pp. 117-130
-
-
Christodorescu, M.1
Fredrikson, M.2
Jha, S.3
Giffin, J.4
-
8
-
-
84856954668
-
MT6D: A moving target ipv6 defense
-
IEEE
-
M. Dunlop, S. Groat, W. Urbanski, R. Marchany, and J. Tront. MT6D: A moving target ipv6 defense. In Military Communications Conference, 2011-MILCOM 2011, pages 1321-1326. IEEE, 2011.
-
(2011)
Military Communications Conference, 2011-MILCOM 2011
, pp. 1321-1326
-
-
Dunlop, M.1
Groat, S.2
Urbanski, W.3
Marchany, R.4
Tront, J.5
-
9
-
-
27544503196
-
Adepts: Adaptive intrusion response using attack graphs in an e-commence environment
-
Piscataway, NJ
-
B. Foo, Y. Wu, Y. Mao, S. Bagchi, and E. Spafford. Adepts: Adaptive intrusion response using attack graphs in an e-commence environment. In Proceedings of the International Conference on Dependable Systems and Networks, pages 508-517, Piscataway, NJ, 2005.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 508-517
-
-
Foo, B.1
Wu, Y.2
Mao, Y.3
Bagchi, S.4
Spafford, E.5
-
11
-
-
84906772489
-
Introducing diversity and uncertainty to create moving attack surfaces for web services
-
Springer
-
Y. Huang and A. K. Ghosh. Introducing diversity and uncertainty to create moving attack surfaces for web services. In Moving Target Defense, pages 131-151. Springer, 2011.
-
(2011)
Moving Target Defense
, pp. 131-151
-
-
Huang, Y.1
Ghosh, A.K.2
-
12
-
-
84863914729
-
Configuration management security in data center environments
-
Springer
-
K. Kant. Configuration management security in data center environments. In Moving Target Defense, pages 161-181. Springer, 2011.
-
(2011)
Moving Target Defense
, pp. 161-181
-
-
Kant, K.1
-
14
-
-
84866390219
-
The meerkats cloud security architecture.
-
IEEE
-
A. D. Keromytis, R. Geambasu, S. Sethumadhavan, S. J. Stolfo, J. Yang, A. Benameur, M. Dacier, M. Elder, D. Kienzle, and A. Stavrou. The meerkats cloud security architecture. In Dist. Computing Systems Workshops, 2012 32nd International Conference on, pages 446-450. IEEE, 2012.
-
(2012)
Dist. Computing Systems Workshops, 2012 32nd International Conference on
, pp. 446-450
-
-
Keromytis, A.D.1
Geambasu, R.2
Sethumadhavan, S.3
Stolfo, S.J.4
Yang, J.5
Benameur, A.6
Dacier, M.7
Elder, M.8
Kienzle, D.9
Stavrou, A.10
-
15
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
22nd Annual, IEEE
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, pages 339-348. IEEE, 2006.
-
(2006)
Computer Security Applications Conference, 2006. ACSAC'06
, pp. 339-348
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
16
-
-
0036093229
-
Towards cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok. Towards cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 10(1-2):5-22, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.4
Zadok, E.5
-
17
-
-
84906817346
-
Game theoretic approaches to attack surface shifting
-
Springer
-
P. K. Manadhata. Game theoretic approaches to attack surface shifting. In Moving Target Defense II, pages 1-13. Springer, 2013.
-
(2013)
Moving Target Defense
, vol.2
, pp. 1-13
-
-
Manadhata, P.K.1
-
20
-
-
84936741910
-
Global ISR: Toward a comprehensive defense against unauthorized code execution
-
Springer
-
G. Portokalidis and A. D. Keromytis. Global ISR: Toward a comprehensive defense against unauthorized code execution. In Moving Target Defense, pages 49-76. Springer, 2011.
-
(2011)
Moving Target Defense
, pp. 49-76
-
-
Portokalidis, G.1
Keromytis, A.D.2
-
21
-
-
78650371992
-
Requirements-aware systems: A research agenda for re for self-adaptive systems
-
IEEE
-
P. Sawyer, N. Bencomo, J. Whittle, E. Letier, and A. Finkelstein. Requirements-aware systems: A research agenda for re for self-adaptive systems. In Requirements Engineering Conference (RE), 2010 18th IEEE International, pages 95-103. IEEE, 2010.
-
(2010)
Requirements Engineering Conference (RE), 2010 18th IEEE International
, pp. 95-103
-
-
Sawyer, P.1
Bencomo, N.2
Whittle, J.3
Letier, E.4
Finkelstein, A.5
-
23
-
-
14844328033
-
On the effectiveness of address-space randomization
-
ACM
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security, pages 298-307. ACM, 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
24
-
-
84940644968
-
A note on the concept of entropy
-
C. E. Shannon. A note on the concept of entropy. Bell System Tech. J, 27:379-423, 1948.
-
(1948)
Bell System Tech. J
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
25
-
-
84937702351
-
-
Online, accessed June 30
-
M. P. Singh. Towards a science of security. http://www.computer.org/portal/web/computingnow/archive/january2013, 2013. Online, accessed June 30, 2014.
-
(2014)
Towards a Science of Security
-
-
Singh, M.P.1
-
26
-
-
34548776459
-
A taxonomy of intrusion response systems
-
N. Stakhanova, S. Basu, and J. Wong. A taxonomy of intrusion response systems. International Journal of Information and Computer Security, 1(1/2):169-184, 2007.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 169-184
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
28
-
-
84893633536
-
Nomad: Towards non-intrusive moving-target defense against web bots
-
IEEE
-
S. Vikram, C. Yang, and G. Gu. Nomad: Towards non-intrusive moving-target defense against web bots. In Communications and Network Security (CNS), 2013 IEEE Conference on, pages 55-63. IEEE, 2013.
-
(2013)
Communications and Network Security (CNS), 2013 IEEE Conference on
, pp. 55-63
-
-
Vikram, S.1
Yang, C.2
Gu, G.3
-
29
-
-
84890100156
-
Mission-oriented moving target defense based on cryptographically strong network dynamics
-
New York, USA, ACM
-
J. Yackoski, J. Li, S. A. DeLoach, X. Ou, and A. Singhal. Mission-oriented moving target defense based on cryptographically strong network dynamics. In CSIIRW '12: Eight Annual Workshop on Cyber Security and Information Intelligence Research, New York, USA, 2013. ACM.
-
(2013)
CSIIRW '12: Eight Annual Workshop on Cyber Security and Information Intelligence Research
-
-
Yackoski, J.1
Li, J.2
DeLoach, S.A.3
Ou, X.4
Singhal, A.5
-
30
-
-
84937695523
-
A model for analyzing the effect of moving target defenses on enterprise networks
-
Oak Ridge, Tennessee, April, ACM
-
R. Zhuang, S. A. DeLoach, and X. Ou. A model for analyzing the effect of moving target defenses on enterprise networks. In Proceedings of the 9th Cyber and Information Security Research Conference, Oak Ridge, Tennessee, April 2013. ACM.
-
(2013)
Proceedings of the 9th Cyber and Information Security Research Conference
-
-
Zhuang, R.1
De Loach, S.A.2
Ou, X.3
-
31
-
-
84890086466
-
Investigating the application of moving target defenses to network security
-
IEEE
-
R. Zhuang, S. Zhang, A. Bardas, S. A. DeLoach, X. Ou, and A. Singhal. Investigating the application of moving target defenses to network security. In Resilient Control Systems (ISRCS), 2013 6th Intl Symposium on, pages 162-169. IEEE, 2013.
-
(2013)
Resilient Control Systems (ISRCS), 2013 6th Intl Symposium on
, pp. 162-169
-
-
Zhuang, R.1
Zhang, S.2
Bardas, A.3
DeLoach, S.A.4
Ou, X.5
Singhal, A.6
|