


default search action
2nd MTD@CCS 2015: Denver, Colorado, USA
- George Cybenko, Dijiang Huang:

Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3823-3
MTD Keynote I
- Michael Franz:

From Fine Grained Code Diversity to JIT-ROP to Execute-Only Memory: The Cat and Mouse Game Between Attackers and Defenders Continues. 1
MTD Modeling and Evaluation I (regular papers)
- Kara Zaffarano

, Joshua Taylor, Samuel N. Hamilton:
A Quantitative Framework for Moving Target Defense Effectiveness Evaluation. 3-10 - Rui Zhuang, Alexandru G. Bardas, Scott A. DeLoach, Xinming Ou:

A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems. 11-20 - Michael B. Crouse, Bryan Prosser, Errin W. Fulp:

Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses. 21-29
MTD Technologies I (short papers)
- Marc Green, Douglas C. MacFarland, Doran R. Smestad, Craig A. Shue:

Characterizing Network-Based Moving Target Defenses. 31-35 - Douglas C. MacFarland, Craig A. Shue:

The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined Networking. 37-41 - Thomas C. Eskridge

, Marco M. Carvalho
, Evan Stoner
, Troy Toggweiler, Adrian Granados:
VINE: A Cyber Emulation Environment for MTD Experimentation. 43-47 - Abhinav Jangda, Mohit Mishra, Bjorn De Sutter:

Adaptive Just-In-Time Code Diversification. 49-53
MTD Keynote II
- Hamed Okhravi:

Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation. 55
MTD Modeling and Evaluation II
- Achintya Prakash, Michael P. Wellman

:
Empirical Game-Theoretic Analysis for Moving Target Defense. 57-65 - Erik Miehling, Mohammad Rasouli, Demosthenis Teneketzis:

Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs. 67-76
Doctoral Symposium
- Christopher Morrell, Reese Moore, Randy C. Marchany, Joseph G. Tront:

DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses. 77-84 - Zhuo Lu, Lisa M. Marvel, Cliff Wang:

To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs. 85-93 - Alessandro Cabutto

, Paolo Falcarin
, Bert Abrath, Bart Coppens, Bjorn De Sutter:
Software Protection with Code Mobility. 95-103

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














