Affiliation:
1. College of Computer, National University of Defense Technology
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference34 articles.
1. [1] Networking and Information Technology Research and Development, “National Cyber Leap Year Summit 2009: Co-Chairs' Report (2009),” https://cyber.harvard.edu/cybersecurity/National_Cyber_Leap_Year_Summit_2009,_Co-Chairs%27_Report, accessed May 23. 2016.
2. [2] P.K. Manadhata and J.M. Wing, “A formal model for a systems attack surface,” Advances in Information Security, vol.54, pp.1-28, 2011.
3. [3] P.K. Manadhata and J.M. Wing, “An attack surface metric,” IEEE Trans. Softw. Eng., vol.37, no.3, pp.371-386, 2011.
4. [4] G.S. Kc, A.D. Keromytis, and V. Prevelakis, “Countering code-injection attacks with instruction-set randomization,” Proceedings of the ACM Conference on Computer and Communications Security (CCS'03), 2003.
5. [5] S. Antonatos, P. Akritidis, E.P. Markatos, and K.G. Anagnostakis, “Defending against hitlist worms using network address space randomization,” Computer Networks, vol.51, no.12, pp.3471-3490, 2007.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DSPHR: A Dynamic SDN-Based Port Hopping Routing Technique for Mitigating SD-WSN Attacks;Wireless Personal Communications;2024-04-16
2. Moving Target Defense Router: MaTaDoR;Proceedings of the 19th International Conference on Security and Cryptography;2022
3. TOTP Moving Target Defense for sensitive network services;Pervasive and Mobile Computing;2021-07
4. Layer 2 Packet Authentication for IoT Sensor Networks;2019 Twelfth International Conference on Mobile Computing and Ubiquitous Network (ICMU);2019-11
5. DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-based Cloud;IEEE Transactions on Dependable and Secure Computing;2019