{"title":"Moving Target Defense for Attack Mitigation in Multi-Vehicle Systems","authors":"J. Giraldo, A. Cárdenas","doi":"10.1007/978-3-030-10597-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-10597-6_7","url":null,"abstract":"","PeriodicalId":322827,"journal":{"name":"Proactive and Dynamic Network Defense","volume":"57 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128635116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach","authors":"Koorosh Firouzbakht, G. Noubir, M. Salehi","doi":"10.1007/978-3-030-10597-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-10597-6_10","url":null,"abstract":"","PeriodicalId":322827,"journal":{"name":"Proactive and Dynamic Network Defense","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive Network Defense with Game Theory","authors":"Sinong Wang, N. Shroff","doi":"10.1007/978-3-030-10597-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-10597-6_2","url":null,"abstract":"","PeriodicalId":322827,"journal":{"name":"Proactive and Dynamic Network Defense","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francesco Restuccia, Salvatore D’oro, Liyang Zhang, T. Melodia
{"title":"The Role of Machine Learning and Radio Reconfigurability in the Quest for Wireless Security","authors":"Francesco Restuccia, Salvatore D’oro, Liyang Zhang, T. Melodia","doi":"10.1007/978-3-030-10597-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-10597-6_8","url":null,"abstract":"","PeriodicalId":322827,"journal":{"name":"Proactive and Dynamic Network Defense","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128942927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive User Authentication Using WiFi Signals in Dynamic Networks","authors":"Hongbo Liu, Yan Wang, Jian Liu, Yingying Chen","doi":"10.1007/978-3-030-10597-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-10597-6_9","url":null,"abstract":"","PeriodicalId":322827,"journal":{"name":"Proactive and Dynamic Network Defense","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Entropy-Based Proactive and Reactive Cyber-Physical Security","authors":"Aris Kanellopoulos, K. Vamvoudakis","doi":"10.1007/978-3-030-10597-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-10597-6_3","url":null,"abstract":"","PeriodicalId":322827,"journal":{"name":"Proactive and Dynamic Network Defense","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115822416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanjun Pan, Ming Li, Yantian Hou, Ryan M. Gerdes, B. Cetiner
{"title":"Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas","authors":"Yanjun Pan, Ming Li, Yantian Hou, Ryan M. Gerdes, B. Cetiner","doi":"10.1007/978-3-030-10597-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-10597-6_5","url":null,"abstract":"","PeriodicalId":322827,"journal":{"name":"Proactive and Dynamic Network Defense","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}