


default search action
Moving Target Defense 2013
- Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:

Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1 - Pratyusa K. Manadhata:

Game Theoretic Approaches to Attack Surface Shifting. 1-13 - Manish Jain, Bo An, Milind Tambe:

Security Games Applied to Real-World: Research Contributions and Challenges. 15-39 - Daniel Bilar, George Cybenko, John P. Murphy:

Adversarial Dynamics: The Conficker Case Study. 41-71 - Cleotilde Gonzalez:

From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity. 73-86 - Don J. Torrieri, Sencun Zhu, Sushil Jajodia:

Cyber Maneuver Against External Adversaries and Compromised Nodes. 87-96 - Justin Yackoski, Harry Bullen, Xiang Yu, Jason H. Li:

Applying Self-Shielding Dynamics to the Network Architecture. 97-115 - Claire Le Goues

, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason Hiser, John C. Knight, Matthew Van Gundy:
Moving Target Defenses in the Helix Self-Regenerative Architecture. 117-149 - Todd Jackson, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz:

Diversifying the Software Stack Using Randomized NOP Insertion. 151-173 - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:

Practical Software Diversification Using In-Place Code Randomization. 175-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














