Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
moving-target defense
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
biblio
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
Submitted by grigby1 on Fri, 05/15/2020 - 11:58am
Reconnaissance
IP networks
motag technique
moving-target defense
Network reconnaissance
numerical evaluations
proactive moving-target defense technique
proxy servers
pubcrawl
internet
replica application servers
resilience
Resiliency
Scalability
Servers
Streaming media
transport protocols
adversarial coupon collection
hypermedia
HTTP redirection
extrapolations
extrapolation
DDoS attacker reconnaissance phase
DDoS Attack
computer network security
Computer crime
Computational modeling
Cloud Computing
cloud based multiserver system
botnet reconnaissance
botnet
AWS prototype
adversarial coupon-collector mathematical model
biblio
Towards Proactive SDN-Controller Attack and Failure Resilience
Submitted by grigby1 on Wed, 05/09/2018 - 2:53pm
resilience
moving-target defense
network performance
PAFR
plug-and-play operation
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
proactive SDN-controller attack
pubcrawl
live remote checkpointing
sandboxing
SDN networks
security
Servers
software defined modules
software defined networking
Software-Defined Networks
Virtualization
controller/host isolation
checkpointing
collaboration
composability
computer network performance evaluation
computer network security
Containers
control systems
controller resilience
controller sandboxing mechanism
central SDN controller
data center networks
failure resilience
failure-and-attack-resilient execution
generic hardware platforms
host-based attacks
Linux
Linux containers
Linux-containers
biblio
Defense on the Move: Ant-Based Cyber Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:19am
Mobile communication
target tracking
Swarm Intelligence
Statistics
security of data
protected infrastructure
Particle swarm intelligence
optimisation
MTD
moving-target defense
mobile resilient defense
ant-based cyber defense
malware
digital ants
Detectors
defended systems
Database systems
Cyberspace
Cybersecurity
computer security
Computer crime
biblio
Morphing communications of Cyber-Physical Systems towards moving-target defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:18am
morphing communications
traffic analysis attacks
Time factors
thwarting traffic analysis attacks
telecommunication traffic
Silicon
security
reliable communication services
real-time systems
networking infrastructures
network sessions
moving-target defense
Algorithm design and analysis
long-range communication services
internet
inter-packet delays
Information systems
eavesdrop network traffic
delays
cyber-physical systems
CPSMorph traffic morphing algorithm
CPS traffic
computer network reliability
biblio
Moving-Target Defenses for Computer Networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:15am
attack
Complexity theory
Computer crime
computer network protection
computer network security
computer security
Cyberspace
moving-target defense
moving-target defenses
MTD
network security
security approach
static target
system security
target
target tracking
biblio
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces
Submitted by BrandonB on Tue, 05/05/2015 - 11:13am
moving-target defense
VM migration-snapshotting
uncertainty
simulation
service attack surface
security of data
security
S-shaped generalized logistic function
risk modeling
replacement pool
Probes
probability
probabilistic MTD service deployment
Probabilistic logic
probabilistic algorithm
moving-target defense strategy
attack-surface heterogeneity-and-dynamics awareness
Mathematical model
Information systems
homogeneity problem
heterogeneous attack surfaces
Equations
dynamic probability
dynamic attack surfaces
diversity-compatibility
deep automation
configuration staticity
cloud-specific features
cloud-based service security
cloud infrastructures
Cloud Computing
attacker intelligence
biblio
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics
Submitted by shouhuai on Wed, 09/17/2014 - 6:31pm
Quantitative Verification
Systems Engineering
Modeling
Science of Security
Validation and Verification
CPS Technologies
Foundations
ACM CCS
CPS Technologies
Cyber Epidemic Dynamics
Cybersecurity dynamics
epidemic threshold
foundations
modeling
moving target defense
moving-target defense
Quantitative Verification
Science of Security
security models
systems engineering
Systems Security
validation and verification
ACM CCS
Moving-Target Defense
Systems Security
biblio
HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
Submitted by Laurie Williams on Wed, 09/17/2014 - 6:30pm
Architectures
Architectures
Control
Modeling
Science of Security
Foundations
Access Control
Architectures
control
distributed systems security
foundations
Human and Societal Aspects of Security and Privacy
modeling
moving-target defense
network security
Phishing
Science of Security
Social Engineering Attacks
Phishing
Access Control
Social Engineering Attacks
Human and Societal Aspects of Security and Privacy
Distributed Systems Security
Network Security
Moving-Target Defense
file
Software-Defined Cyber-Physical Systems to Support Mobile-Defense Security of Critical Utilities
Submitted by Riccardo Bettati on Mon, 02/17/2014 - 4:43pm. Contributors:
Riccardo Bettati
Guafei Gu
Narasimha Reddy
CPS Domains
Embedded Software
Energy
Resilient Systems
CPS Technologies
Foundations
moving-target defense
security
software-defined systems
CFP Paper Submissions
CFP Submissions
2013 National Workshop on Energy Cyber-Physical Systems
2013
Academia
Publications