Abstract is missing.
- A Cyber Mutation: Metrics, Techniques and Future DirectionsEhab Al-Shaer. 1 [doi]
- Have No PHEAR: Networks Without IdentifiersRichard Skowyra, Kevin Bauer, Veer Dedhia, Hamed Okhravi. 3-14 [doi]
- Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel AttacksHuangxin Wang, Fei Li, Songqing Chen. 15-25 [doi]
- SDN based Scalable MTD solution in Cloud NetworkAnkur Chowdhary, Sandeep Pisharody, Dijiang Huang. 27-36 [doi]
- A Moving Target Defense Approach to Disrupting Stealthy BotnetsSridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia. 37-46 [doi]
- Multi-dimensional Host Identity Anonymization for Defeating Skilled AttackersJafar Haadi Jafarian, Amirreza Niakanlahiji, Ehab Al-Shaer, Qi Duan. 47-58 [doi]
- Mayflies: A Moving Target Defense Framework for Distributed SystemsNoor O. Ahmed, Bharat Bhargava. 59-64 [doi]
- Demo: A Symbolic N-Variant SystemJun Xu, Pinyao Guo, Bo Chen, Robert F. Erbacher, Ping Chen, Peng Liu. 65-68 [doi]
- Moving Target Defense: a Journey from Idea to ProductJason H. Li, Justin Yackoski, Nicholas Evancich. 69-79 [doi]
- Markov Modeling of Moving Target Defense GamesHoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten van Dijk. 81-92 [doi]
- Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic AnalysisMason Wright, Sridhar Venkatesan, Massimiliano Albanese, Michael P. Wellman. 93-104 [doi]
- Dependency Graph Analysis and Moving Target Defense SelectionJason R. Hamlet, Christopher C. Lamb. 105-116 [doi]
- Formal Approach for Resilient Reachability based on End-System Route AgilityUsman Rauf, Fida Gillani, Ehab Al-Shaer, Mahantesh Halappanavar, Samrat Chatterjee, Christopher Oehmen. 117-127 [doi]
- Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and AttacksJoshua Taylor, Kara Zaffarano, Ben Koller, Charlie Bancroft, Jason Syversen. 129-134 [doi]