Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
moving target defense
biblio
A Moving Target Defense Approach to Disrupting Stealthy Botnets
Submitted by grigby1 on Tue, 06/27/2017 - 1:43pm
botnets
detector placement
Metrics
moving target defense
moving target defenses
pubcrawl
resilience
Scalability
biblio
Moving Target Defense: A Journey from Idea to Product
Submitted by grigby1 on Tue, 05/30/2017 - 12:41pm
collaboration
composability
Enterprise Network Security
IPv6
ipv6 security
Metrics
moving target defense
pubcrawl
Resiliency
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Wed, 05/06/2015 - 9:54am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Autonomic Resilient Cloud Management (ARCM) Design and Evaluation
Submitted by BrandonB on Tue, 05/05/2015 - 11:21am
ARCM
autonomic resilient cloud management
behavior obfuscation
BO
Cloud Computing
cloud service behavior obfuscation
cloud system security
Conferences
moving target defense
Resiliency
security of data
software fault tolerance
biblio
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Internet services
Web and internet services
turning victim servers
system architecture
shuffling mechanism
Shuffling
Servers
optimal reassignment strategy
network attacks
moving targets
moving target mechanism
moving target defense
large-scale DDoS attacks
IP networks
Amazon EC2
intelligent client reassignment
DDoS
computer network security
Computer crime
computer architecture
computational distributed denial-of-service attacks
cloud-enabled DDoS defense
Cloud Computing
cloud
client-to-server reassignment plans
client-server systems
attack mitigation
attack dilution strategies
biblio
Multiple OS rotational environment an implemented Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:17am
moving target defense
testing
Servers
security of data
security
operating systems (computers)
operating systems
Nmap
multiple OS rotational environment
MTD technique
Availability
manual penetration test
IP networks
insert
Fingerprint recognition
defensive strategies
cyber-attacks mitigation
CORE Impact Pro
CORE
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 11:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs
biblio
SDN-based solutions for Moving Target Defense network protection
Submitted by BrandonB on Tue, 05/05/2015 - 11:14am
MTD
software-defined networking
Software Defined Networks
Servers
SDN-based solutions
SDN-based MTD methods
SDN
Reconnaissance
Ports (Computers)
Payloads
network-based MTD techniques
Algorithm design and analysis
moving target defense network protection
moving target defense
delays
countermeasures attackers
computer network security
Cisco onePK
Cisco One Platform Kit
central control point
attack surface obfuscation
biblio
Scaling IPv6 address bindings in support of a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:14am
moving target defense
UDP requests
UDP echo server
transport protocols
Time factors
statistical improbability
standards
sockets
Servers
security
reconnaissance phase
Peer-to-peer computing
peer to peer scenario
networking
network security research
MT6D
bound interfaces
malicious actor
Local area networks
Kernel
IPv6 moving target defense
IPv6 address space
IPv6 address bindings
IPv6
IP networks
internet
Ethernet interface
computer network security
client-server systems
client server ratio
client server networks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »