Abstract is missing.
- Science, Security and Academic Literature: Can We Learn from History?Paul C. van Oorschot. 1-2 [doi]
- U-TRI: Unlinkability Through Random Identifier for SDN NetworkYulong Wang, Qingyu Chen, Junjie Yi, Jun Guo. 3-15 [doi]
- WebMTD: Defeating Web Code Injection Attacks using Web Element Attribute MutationAmirreza Niakanlahiji, Jafar Haadi Jafarian. 17-26 [doi]
- Mixr: Flexible Runtime Rerandomization for BinariesWilliam H. Hawkins, Anh Nguyen-Tuong, Jason D. Hiser, Michele Co, Jack W. Davidson. 27-37 [doi]
- Mutated Policies: Towards Proactive Attribute-based Defenses for Access ControlCarlos E. Rubio-Medrano, Josephine Lamp, Adam Doupé, Ziming Zhao, Gail-Joon Ahn. 39-49 [doi]
- Moving Targets vs. Moving Adversaries: On the Effectiveness of System RandomizationAhmad-Reza Sadeghi. 51-52 [doi]
- Performance Modeling of Moving Target DefensesWarren Connell, Daniel A. Menascé, Massimiliano Albanese. 53-63 [doi]
- Evaluation of Deception-Based Web Attacks DetectionXiao Han, Nizar Kheir, Davide Balzarotti. 65-73 [doi]
- Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement LearningSridhar Venkatesan, Massimiliano Albanese, Ankit Shah, Rajesh Ganesan, Sushil Jajodia. 75-85 [doi]
- Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic AnalysisThanh H. Nguyen, Mason Wright, Michael P. Wellman, Satinder Singh (Baveja). 87-97 [doi]
- Online Algorithms for Adaptive Cyber Defense on Bayesian Attack GraphsZhisheng Hu, Minghui Zhu, Peng Liu 0005. 99-109 [doi]
- Path Hopping: an MTD Strategy for Quantum-safe CommunicationReihaneh Safavi-Naini, Alireza Poostindouz, Viliam Lisý. 111-114 [doi]
- If You Can't Measure It, You Can't Improve It: Moving Target Defense MetricsStjepan Picek, Erik Hemberg, Una-May O'Reilly. 115-118 [doi]