Author:
Cai Gui-lin,Wang Bao-sheng,Hu Wei,Wang Tian-zuo
Publisher
Zhejiang University Press
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing
Reference94 articles.
1. Albanese, M., de Benedictis, A., Jajodia, S., et al., 2013. A moving target defense mechanism for MANETs based on identity virtualization. Proc. IEEE Conf. on Communications and Network Security, p.278–286.
https://doi.org/10.1109/CNS.2013.6682717
2. Al-Shaer, E., 2011. Toward network configuration randomization for moving target defense. In: Jajodia, S., Ghosh, A.K., Swarup, V., et al. (Eds.), Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Springer New York, USA, p.153–159.
https://doi.org/10.1007/978-1-4614-0977-9_9
3. Al-Shaer, E., Duan, Q., Jafarian, J.H., 2013. Random host mutation for moving target defense. In: Keromytis, A.D., di Pietro, R. (Eds.), Security and Privacy in Communication Networks. Springer Berlin Heidelberg, Germany, p.310–327.
https://doi.org/10.1007/978-3-642-36883-7_19
4. Andel, T.R., Whitehurst, L.N., McDonald, J.T., 2014. Software security and randomization through program partitioning and circuit variation. Proc. 1st ACM Workshop on Moving Target Defense, p.79–86.
https://doi.org/10.1145/2663474.2663484
5. Azab, M., Hassan, R., Eltoweissy, M., 2011. ChameleonSoft: a moving target defense system. Proc. 7th Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, p.241–250.
Cited by
74 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献