4.6 Article

Performance Modeling of Moving Target Defenses with Reconfiguration Limits

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Theory & Methods

A Moving Target Defense Approach to Disrupting Stealthy Botnets

Sridhar Venkatesan et al.

MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE (2016)

Proceedings Paper Computer Science, Theory & Methods

Markov Modeling of Moving Target Defense Games

Hoda Maleki et al.

MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Catch Me if You Can: A Cloud-Enabled DDoS Defense

Quan Jia et al.

2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2014)

Article Computer Science, Software Engineering

An Attack Surface Metric

Pratyusa K. Manadhata et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2011)

Proceedings Paper Engineering, Electrical & Electronic

Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT)

Anantha K. Bangalore et al.

DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY (2009)

Article Computer Science, Hardware & Architecture

Protocol scrubbing: Network security through transparent flow modification

D Watson et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2004)

Article Computer Science, Software Engineering

Security performance

DA Menascé

IEEE INTERNET COMPUTING (2003)