Abstract is missing.
- From Fine Grained Code Diversity to JIT-ROP to Execute-Only Memory: The Cat and Mouse Game Between Attackers and Defenders ContinuesMichael Franz. 1 [doi]
- A Quantitative Framework for Moving Target Defense Effectiveness EvaluationKara Zaffarano, Joshua Taylor, Samuel Hamilton. 3-10 [doi]
- A Theory of Cyber Attacks: A Step Towards Analyzing MTD SystemsRui Zhuang, Alexandru G. Bardas, Scott A. DeLoach, Xinming Ou. 11-20 [doi]
- Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance DefensesMichael B. Crouse, Bryan Prosser, Errin W. Fulp. 21-29 [doi]
- Characterizing Network-Based Moving Target DefensesMarc Green, Douglas C. MacFarland, Doran R. Smestad, Craig A. Shue. 31-35 [doi]
- The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined NetworkingDouglas C. MacFarland, Craig A. Shue. 37-41 [doi]
- VINE: A Cyber Emulation Environment for MTD ExperimentationThomas C. Eskridge, Marco M. Carvalho, Evan Stoner, Troy Toggweiler, Adrian Granados. 43-47 [doi]
- Adaptive Just-In-Time Code DiversificationAbhinav Jangda, Mohit Mishra, Bjorn De Sutter. 49-53 [doi]
- Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and EvaluationHamed Okhravi. 55 [doi]
- Empirical Game-Theoretic Analysis for Moving Target DefenseAchintya Prakash, Michael P. Wellman. 57-65 [doi]
- Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack GraphsErik Miehling, Mohammad Rasouli, Demosthenis Teneketzis. 67-76 [doi]
- DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target DefensesChristopher Morrell, Reese Moore, Randy C. Marchany, Joseph G. Tront. 77-84 [doi]
- To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETsZhuo Lu, Lisa M. Marvel, Cliff Wang. 85-93 [doi]
- Software Protection with Code MobilityAlessandro Cabutto, Paolo Falcarin, Bert Abrath, Bart Coppens, Bjorn De Sutter. 95-103 [doi]