Proceedings of the 5th ACM Workshop on Moving Target Defense最新文献

筛选
英文 中文
Moving Target Defenses in the Helix Self-Regenerative Architecture 螺旋自再生建筑中的移动目标防御
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2013-01-01 DOI: 10.1007/978-1-4614-5416-8_7
Claire Le Goues, A. Nguyen-Tuong, Hao Chen, J. Davidson, S. Forrest, Jason Hiser, J. Knight, M. Gundy
{"title":"Moving Target Defenses in the Helix Self-Regenerative Architecture","authors":"Claire Le Goues, A. Nguyen-Tuong, Hao Chen, J. Davidson, S. Forrest, Jason Hiser, J. Knight, M. Gundy","doi":"10.1007/978-1-4614-5416-8_7","DOIUrl":"https://doi.org/10.1007/978-1-4614-5416-8_7","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83211216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Cyber Maneuver Against External Adversaries and Compromised Nodes 针对外部对手和受损节点的网络机动
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2013-01-01 DOI: 10.1007/978-1-4614-5416-8_5
D. Torrieri, Sencun Zhu, S. Jajodia
{"title":"Cyber Maneuver Against External Adversaries and Compromised Nodes","authors":"D. Torrieri, Sencun Zhu, S. Jajodia","doi":"10.1007/978-1-4614-5416-8_5","DOIUrl":"https://doi.org/10.1007/978-1-4614-5416-8_5","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76955858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Applying Self-Shielding Dynamics to the Network Architecture 自屏蔽动力学在网络体系结构中的应用
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2013-01-01 DOI: 10.1007/978-1-4614-5416-8_6
J. Yackoski, H. Bullen, Xiang Yu, Jason H. Li
{"title":"Applying Self-Shielding Dynamics to the Network Architecture","authors":"J. Yackoski, H. Bullen, Xiang Yu, Jason H. Li","doi":"10.1007/978-1-4614-5416-8_6","DOIUrl":"https://doi.org/10.1007/978-1-4614-5416-8_6","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73074765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Practical Software Diversification Using In-Place Code Randomization 使用就地代码随机化的实用软件多样化
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2013-01-01 DOI: 10.1007/978-1-4614-5416-8_9
Vasilis Pappas, M. Polychronakis, A. Keromytis
{"title":"Practical Software Diversification Using In-Place Code Randomization","authors":"Vasilis Pappas, M. Polychronakis, A. Keromytis","doi":"10.1007/978-1-4614-5416-8_9","DOIUrl":"https://doi.org/10.1007/978-1-4614-5416-8_9","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82358239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats 移动目标防御——为网络威胁创造不对称的不确定性
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2011-09-30 DOI: 10.1007/978-1-4614-0977-9
S. Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff X. Wang, X. S. Wang
{"title":"Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats","authors":"S. Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff X. Wang, X. S. Wang","doi":"10.1007/978-1-4614-0977-9","DOIUrl":"https://doi.org/10.1007/978-1-4614-0977-9","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91213713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 426
Toward Network Configuration Randomization for Moving Target Defense 移动目标防御网络配置随机化研究
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2011-01-01 DOI: 10.1007/978-1-4614-0977-9_9
E. Al-Shaer
{"title":"Toward Network Configuration Randomization for Moving Target Defense","authors":"E. Al-Shaer","doi":"10.1007/978-1-4614-0977-9_9","DOIUrl":"https://doi.org/10.1007/978-1-4614-0977-9_9","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78043499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
Symbiotes and defensive Mutualism: Moving Target Defense 共生与防御互惠:移动目标防御
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2011-01-01 DOI: 10.1007/978-1-4614-0977-9_5
Ang Cui, S. Stolfo
{"title":"Symbiotes and defensive Mutualism: Moving Target Defense","authors":"Ang Cui, S. Stolfo","doi":"10.1007/978-1-4614-0977-9_5","DOIUrl":"https://doi.org/10.1007/978-1-4614-0977-9_5","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81896693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution 全球ISR:迈向全面防御未经授权的代码执行
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2011-01-01 DOI: 10.1007/978-1-4614-0977-9_3
G. Portokalidis, A. Keromytis
{"title":"Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution","authors":"G. Portokalidis, A. Keromytis","doi":"10.1007/978-1-4614-0977-9_3","DOIUrl":"https://doi.org/10.1007/978-1-4614-0977-9_3","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91183860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Manipulating Program Functionality to Eliminate Security Vulnerabilities 操纵程序功能以消除安全漏洞
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2011-01-01 DOI: 10.1007/978-1-4614-0977-9_6
M. Rinard
{"title":"Manipulating Program Functionality to Eliminate Security Vulnerabilities","authors":"M. Rinard","doi":"10.1007/978-1-4614-0977-9_6","DOIUrl":"https://doi.org/10.1007/978-1-4614-0977-9_6","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85348097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Formal Model for a System's Attack Surface 系统攻击面的形式化模型
Proceedings of the 5th ACM Workshop on Moving Target Defense Pub Date : 2011-01-01 DOI: 10.1007/978-1-4614-0977-9_1
P. Manadhata, Jeannette M. Wing
{"title":"A Formal Model for a System's Attack Surface","authors":"P. Manadhata, Jeannette M. Wing","doi":"10.1007/978-1-4614-0977-9_1","DOIUrl":"https://doi.org/10.1007/978-1-4614-0977-9_1","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78977449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信