Abstract is missing.
- On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling AttacksMichal Piskozub, Riccardo Spolaor, Mauro Conti, Ivan Martinovic. 1-12 [doi]
- Specification-driven Moving Target Defense SynthesisMd. Mazharul Islam, Qi Duan, Ehab Al-Shaer. 13-24 [doi]
- Bayesian Stackelberg Game for Risk-aware Edge Computation OffloadingYang Bai, Lixing Chen, Linqi Song, Jie Xu. 25-35 [doi]
- A Scalable High Fidelity Decoy Framework against Sophisticated Cyber AttacksJianhua Sun, Songsong Liu, Kun Sun 0001. 37-46 [doi]
- Run or Hide? Both! A Method Based on IPv6 Address Switching to Escape While Being HiddenMaxime Ayrault, Etienne Borde, Ulrich Kühne. 47-56 [doi]
- A Cost-effective Shuffling Method against DDoS Attacks using Moving Target DefenseYuyang Zhou, Guang Cheng, Shanqing Jiang, Ying Hu, Yuyu Zhao, Zihan Chen. 57-66 [doi]
- A Collaborative Strategy for Mitigating Tracking through Browser FingerprintingAlejandro Gómez-Boix, Davide Frey, Yérom-David Bromberg, Benoit Baudry. 67-78 [doi]
- Should I (re)Learn or Should I Go(on)?: Stream Machine Learning for Adaptive Defense against Network AttacksPedro Casas, Pavol Mulinka, Juan Martin Vanerio. 79-88 [doi]