Abstract is missing.
- No free lunch in cyber securityGeorge Cybenko, Jeff Hughes. 1-12 [doi]
- Security and Science of AgilityPatrick Drew McDaniel, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa M. Marvel, Ananthram Swami, Prasant Mohapatra, Srikanth V. Krishnamurthy, Iulian Neamtiu. 13-19 [doi]
- A Game Theoretic Approach to Strategy Determination for Dynamic Platform DefensesKevin M. Carter, James Riordan, Hamed Okhravi. 21-30 [doi]
- Towards a Theory of Moving Target DefenseRui Zhuang, Scott A. DeLoach, Xinming Ou. 31-40 [doi]
- On the Challenges of Effective MovementThomas Hobson, Hamed Okhravi, David Bigelow, Robert Rudd, William W. Streilein. 41-50 [doi]
- Reinforcement Learning Algorithms for Adaptive Cyber Defense against HeartbleedMinghui Zhu, Zhisheng Hu, Peng Liu. 51-58 [doi]
- Moving Target Defense for Hardening the Security of the Power System State EstimationMohammad Ashiqur Rahman, Ehab Al-Shaer, Rakesh B. Bobba. 59-68 [doi]
- Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated AttackersJafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan. 69-78 [doi]
- Software Security and Randomization through Program Partitioning and Circuit VariationTodd R. Andel, Lindsey N. Whitehurst, Jeffrey T. McDonald. 79-86 [doi]
- Software Profiling Options and Their Effects on Security Based DiversificationMark Murphy, Per Larsen, Stefan Brunthaler, Michael Franz. 87-96 [doi]
- Comparing Different Moving Target Defense TechniquesJun Xu, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu, Peng Liu. 97-107 [doi]