Related references
Note: Only part of the references are listed.A Moving Target Defense Approach to Disrupting Stealthy Botnets
Sridhar Venkatesan et al.
MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE (2016)
Markov Modeling of Moving Target Defense Games
Hoda Maleki et al.
MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE (2016)
Catch Me if You Can: A Cloud-Enabled DDoS Defense
Quan Jia et al.
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2014)
An Attack Surface Metric
Pratyusa K. Manadhata et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2011)
Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)
Anantha K. Bangalore et al.
DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY (2009)
Protocol scrubbing: Network security through transparent flow modification
D Watson et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2004)
Security performance
DA Menascé
IEEE INTERNET COMPUTING (2003)