Author:
El Mir Iman,Chowdhary Ankur,Huang Dijiang,Pisharody Sandeep,Kim Dong Seong,Haqiq Abdelkrim
Publisher
Springer International Publishing
Reference15 articles.
1. Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: The 2nd Conference on Symposium on Networked Systems Design and Implementation, vol. 2, pp. 273–286. USENIX Association (2005)
2. Hong, J., Kim, D.S.: Assessing the effectiveness of moving target defenses using security models. IEEE Trans. Depend. Secur. Comput. 13, 163–177 (2016)
3. Jia, Q., Sun, K., Stavrou, A.: MOTAG: moving target defense against internet denial of service attacks. In: 22nd International Conference on Computer Communications and Networks (ICCCN), pp. 1–9. IEEE (2013)
4. Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: First Workshop on Hot Topics in Software Defined Networks, pp. 127–132. ACM, New York (2012)
5. Rohrer, J.P., Jabbar, A., Sterbenz, J.P.G.: Path diversification for future internet end-to-end resilience and survivability. Telecommun. Syst. 56, 49–67 (2014)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献