Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
moving target defense
biblio
A Moving Target Defense Technology Based on SCIT
Submitted by grigby1 on Mon, 08/02/2021 - 3:07pm
network security
Switches
Software stack diversity
Software
Servers
security
Scalability
Random switching
pubcrawl
intrusion tolerance
moving target defense
Metrics
Complexity theory
Communication networks
cleaning
composability
Resiliency
biblio
A New Security Framework for Remote Patient Monitoring Devices
Submitted by grigby1 on Thu, 05/20/2021 - 12:16pm
medical devices
wearables security
Wearable Device
Virtualization
Ubiquitous Computing Security
Scalability
resilience
remote attacks
pubcrawl
Protocols
Pacemakers
moving target defense
virtualization privacy
IP networks
internet
Human Factors
Computer hacking
Bluetooth jamming
Biomedical monitoring
Human behavior
privacy
Metrics
composability
Resiliency
biblio
WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense
Submitted by aekwall on Thu, 05/13/2021 - 11:35am
Conferences
security
attack surface
moving target defense
Resiliency
pubcrawl
Metrics
web services
uncertainty
Complexity theory
Scalability
Web attacks
insufficient coverage problem
web gene tree
file
MAZE: A Secure Cloud Storage Service Using Moving Target Defense and Secure Shell Protocol (SSH) Tunneling
Submitted by akarns on Fri, 03/12/2021 - 3:54pm. Contributors:
Vasco Xu
Sherif Khattab
ABSTRACT
Cloud Security
cloud storage
moving target defense
Presentations
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 2:56pm
network security
unique universal identifiers
Twitter
timestamp-based concurrency control algorithms
Synchronization
synchronisation
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
Protocols
protocol
proactive defense
network security objectives
Concurrency
Network reconnaissance
Network Identification
network entity identifiers
moving target defense
IP networks
decentralized identifier distribution
Databases
Cryptography
cryptographically secure random values
Cryptographic Protocols
concurrency control
collision probability
security
biblio
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
hierarchical attack graph
network configurations
Attack Path
attack graphs
adaptive defense services
advanced SDN technology
affordable defense services
Asset Criticality
attack graph-based MTD technique
attack path prediction
attack success probability
complex system operations
critical hosts
complex network
hierarchical attack graph model
highly exploitable hosts
interrupt attack execution
minimum MTD cost
MTD shuffling decisions
network address shuffling
potential attacker
proactive defense mechanism
proactive defense services
proactive/adaptive defense
SDN functionalities
composability
IP networks
telecommunication traffic
telecommunication security
security
attack surface
Protocols
Software
software defined networking
Electronic mail
Resiliency
pubcrawl
computer network security
graph theory
software-defined networking
network topology
Measurement
probability
control systems
Software-Defined Networks
moving target defense
target defense
Predictive Metrics
SDN controllers
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
Adaptive MTD Security using Markov Game Modeling
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
multistage attack scenario
Common Vulnerability Scoring System
computing elements
CVSS
distributed networking
expert knowledge
large scale cloud networks
Markov Game modeling
monitoring attacks
attack policy
network administrator
proactive security framework
reactive security mechanism
sub-optimal policy
target software vulnerabilities
transition probabilities
two-player zero-sum Markov Game
adaptive filtering
Markov processes
computer network security
Scalability
game theory
Resiliency
pubcrawl
Metrics
Computer crime
security experts
packet filtering
critical information
moving target defense
multistage attacks
Intrusion Detection Systems
security state
cloud network
adaptive MTD security
attack graphs
biblio
Enhanced dynamic cyber zone defense
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
intrusion tolerance
simulation
security of data
security
Runtime
Resiliency
pubcrawl
moving target defense
Limiting
Laboratories
Intrusion Tolrance
intrusion tolerance technique
Algorithm
information security
Heuristic algorithms
dynamic cyber zone defense
discrete-time simulation
cyber systems
cyber incidents
computer security
composability
Complexity theory
collaboration zones
biblio
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Submitted by grigby1 on Fri, 05/15/2020 - 11:56am
NFV
VSNs
virtualisation
virtual shadow networks
telecommunication network topology
software defined networking technologies
software defined networking
Servers
SDN
Scalability
Resiliency
resilience
Reconnaissance
pubcrawl
overlay networks
centralized management
network topology
Network reconnaissance
network function virtualization
MTD
moving target defense
mirrors
link-map
ISP
Internet Service Provider networks
internet
flooding reconnaissance attacks
DDoS Attacks
computer network security
Computer crime
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »