Abstract is missing.
- Configuring Software and Systems for Defense-in-DepthTrent Jaeger. 1 [doi]
- From Cybersecurity to Collaborative ResiliencyGeorge I. Sharkov. 3-9 [doi]
- AHEAD: A New Architecture for Active DefenseFabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico. 11-16 [doi]
- A One-Year Perspective on Exposed In-memory Key-Value StoresTobias Fiebig, Anja Feldmann, Matthias Petschick. 17-22 [doi]
- Towards Automated Verification of Active Cyber Defense Strategies on Software Defined NetworksMohammed Noraden Alsaleh, Ehab Al-Shaer. 23-29 [doi]
- Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing PoliciesKevin Benton, L. Jean Camp. 31-36 [doi]
- An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer NetworksStefan Marksteiner, Harald Lernbeiß, Bernhard Jandl-Scherf. 37-43 [doi]
- A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber AttacksEmilie Purvine, John R. Johnson, Chaomei Lo. 45-52 [doi]
- SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?Nicholas J. Multari, Anoop Singhal, David O. Manz, Robert Cowles, Jorge Cuéllar, Christopher Oehmen, Gregory Shannon. 53 [doi]