Affiliation:
1. Zhengzhou Information Science and Technology Institute
2. Northwestern University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference19 articles.
1. [1] J.H. Jafarian, E. Al-Shaer, and Q. Duan, “An effective address mutation approach for disrupting reconnaissance attacks,” IEEE Trans. Inf. Forensics Security, vol.10, no.12, pp.2562-2577, 2015.
2. [2] P. Kampanakis, H. Perros, and T. Beyene, “SDN-based solutions for Moving Target Defense network protection,” Proc. 15th International Symposium on World of Wireless, Mobile and Multimedia Networks. IEEE, pp.1-6, 2014.
3. [3] D. Kewley, R. Fink, J. Lowry, et al., “Dynamic approaches to thwart adversary intelligence gathering,” Proc. IEEE DARPA Information Survivability Conference & Exposition II (DISCEX'01), pp.176-185, 2001.
4. [4] M. Sifalakis, S. Schmid, and D. Hutchison, “Network address hopping: a mechanism to enhance data protection for packet communications,” Proc. 2005 IEEE International Conference on Communications. IEEE, pp.1518-1523, 2005.
5. [5] M. Atighetchi, P. Pal, F. Webber, and C. Jones, “Adaptive use of network-centric mechanisms in cyber-defense,” Proc. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing. IEEE, pp.183-192, 2003.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献