


default search action
Moving Target Defense 2013
- Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1 - Pratyusa K. Manadhata:
Game Theoretic Approaches to Attack Surface Shifting. 1-13 - Manish Jain, Bo An, Milind Tambe:
Security Games Applied to Real-World: Research Contributions and Challenges. 15-39 - Daniel Bilar, George Cybenko, John P. Murphy:
Adversarial Dynamics: The Conficker Case Study. 41-71 - Cleotilde Gonzalez:
From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity. 73-86 - Don J. Torrieri, Sencun Zhu, Sushil Jajodia:
Cyber Maneuver Against External Adversaries and Compromised Nodes. 87-96 - Justin Yackoski, Harry Bullen, Xiang Yu, Jason H. Li:
Applying Self-Shielding Dynamics to the Network Architecture. 97-115 - Claire Le Goues
, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason Hiser, John C. Knight, Matthew Van Gundy:
Moving Target Defenses in the Helix Self-Regenerative Architecture. 117-149 - Todd Jackson, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz:
Diversifying the Software Stack Using Randomized NOP Insertion. 151-173 - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Practical Software Diversification Using In-Place Code Randomization. 175-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.