Academic literature on the topic 'Moving Target Defense'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Moving Target Defense.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Moving Target Defense"
Lei, Cheng, Hong-Qi Zhang, Jing-Lei Tan, Yu-Chen Zhang, and Xiao-Hu Liu. "Moving Target Defense Techniques: A Survey." Security and Communication Networks 2018 (July 22, 2018): 1–25. http://dx.doi.org/10.1155/2018/3759626.
Full textWang, Huangxin, Quan Jia, Dan Fleck, Walter Powell, Fei Li, and Angelos Stavrou. "A moving target DDoS defense mechanism." Computer Communications 46 (June 2014): 10–21. http://dx.doi.org/10.1016/j.comcom.2014.03.009.
Full textShouq, Mohsen Alnemari, and M. Alzahrani Sabah. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 5 (2021): 84–90. https://doi.org/10.35940/ijrte.E5111.019521.
Full textAlnemari, Shouq Mohsen, and Sabah M. Alzahrani. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 84–90. http://dx.doi.org/10.35940/ijrte.e5111.019521.
Full textCho, Jin-Hee, Dilli P. Sharma, Hooman Alavizadeh, et al. "Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense." IEEE Communications Surveys & Tutorials 22, no. 1 (2020): 709–45. http://dx.doi.org/10.1109/comst.2019.2963791.
Full textZhang, Zhihua, Lu Liu, Chunying Zhang, et al. "MTTEGDM: A Moving Target Evolutionary Game Defense Model Based on Three-Way Decisions." Electronics 13, no. 4 (2024): 734. http://dx.doi.org/10.3390/electronics13040734.
Full textHeydari, Vahid. "Moving Target Defense for Securing SCADA Communications." IEEE Access 6 (2018): 33329–43. http://dx.doi.org/10.1109/access.2018.2844542.
Full textShi, Yuan, Huanguo Zhang, Juan Wang, et al. "CHAOS: An SDN-Based Moving Target Defense System." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/3659167.
Full textXu, Xiaoyu, Hao Hu, and Xianwei Zhu. "Compressing Deep Learning Model for Agile Moving Target Defense." Journal of Physics: Conference Series 2171, no. 1 (2022): 012032. http://dx.doi.org/10.1088/1742-6596/2171/1/012032.
Full textHyder, M. F., and M. A. Ismail. "INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks." Engineering, Technology & Applied Science Research 10, no. 1 (2020): 5142–47. http://dx.doi.org/10.48084/etasr.3266.
Full textDissertations / Theses on the topic "Moving Target Defense"
DiMarco, Peter Lewis. "Evaluation of Moving Target IPv6 Defense and Distributed Denial of Service Defenses." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/24697.
Full textZhuang, Rui. "A theory for understanding and quantifying moving target defense." Diss., Kansas State University, 2015. http://hdl.handle.net/2097/20525.
Full textZeitz, Kimberly Ann. "Cybersecurity for the Internet of Things: A Micro Moving Target IPv6 Defense." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102446.
Full textSherburne, Matthew Gilbert. "Micro-Moving Target IPv6 Defense for 6LoWPAN and the Internet of Things." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52043.
Full textHardman, Owen Russell. "Optimizing a Network Layer Moving Target Defense by Translating Software from Python to C." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/64435.
Full textSagisi, Joseph Lozano. "HE-MT6D: A Network Security Processor with Hardware Engine for Moving Target IPv6 Defense (MT6D) over 1 Gbps IEEE 802.3 Ethernet." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/86789.
Full textNavas, Renzo Efraín. "Improving the resilience of the constrained Internet of Things : a moving target defense approach." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0217.
Full textBasam, Dileep Kumar. "Strengthening MT6D Defenses with Darknet and Honeypot capabilities." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/64375.
Full textDunlop, Matthew William. "Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77333.
Full textBardas, Alexandru Gavril. "Evaluating and quantifying the feasibility and effectiveness of whole IT system moving target defenses." Diss., Kansas State University, 2016. http://hdl.handle.net/2097/32570.
Full textBooks on the topic "Moving Target Defense"
Jajodia, Sushil, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and X. Sean Wang, eds. Moving Target Defense. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0977-9.
Full textJajodia, Sushil, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, and X. Sean Wang, eds. Moving Target Defense II. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-5416-8.
Full textShetty, Sachin, Xuebiao Yuchi, and Min Song. Moving Target Defense for Distributed Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31032-9.
Full textJajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer New York, 2013.
Find full textSong, Min, Sachin Shetty, and Xuebiao Yuchi. Moving Target Defense for Distributed Systems. Springer, 2016.
Find full textSong, Min, Sachin Shetty, and Xuebiao Yuchi. Moving Target Defense for Distributed Systems. Springer, 2018.
Find full textSong, Min, Sachin Shetty, and Xuebiao Yuchi. Moving Target Defense for Distributed Systems. Springer London, Limited, 2016.
Find full textThuraisingham, M. B. Mtd'17: ACM Workshop on Moving Target Defense. Association for Computing Machinery, 2017.
Find full textMoving target defense: Creating asymmetric uncertainty for cyber threats. Springer, 2011.
Find full textJajodia, Sushil, Anup K. Ghosh, Cliff Wang, Vipin Swarup, and X. Sean Wang. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Springer New York, 2013.
Find full textBook chapters on the topic "Moving Target Defense"
Okhravi, Hamed. "Moving Target Defense." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1770-1.
Full textHuang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Moving Target Defense." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-9.
Full textOkhravi, Hamed. "Moving Target Defense." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1770.
Full textAlbanese, Massimiliano, Warren Connell, Sridhar Venkatesan, and George Cybenko. "Moving Target Defense Quantification." In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6_5.
Full textManadhata, Pratyusa K. "Game Theoretic Approaches to Attack Surface Shifting." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_1.
Full textJain, Manish, Bo An, and Milind Tambe. "Security Games Applied to Real-World: Research Contributions and Challenges." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_2.
Full textBilar, Daniel, George Cybenko, and John Murphy. "Adversarial Dynamics: The Conficker Case Study." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_3.
Full textGonzalez, Cleotilde. "From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_4.
Full textTorrieri, Don, Sencun Zhu, and Sushil Jajodia. "Cyber Maneuver Against External Adversaries and Compromised Nodes." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_5.
Full textYackoski, Justin, Harry Bullen, Xiang Yu, and Jason Li. "Applying Self-Shielding Dynamics to the Network Architecture." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_6.
Full textConference papers on the topic "Moving Target Defense"
Aydeger, Abdullah, Pei Zhou, Sanzida Hoque, Marco Carvalho, and Engin Zeydan. "MTDNS: Moving Target Defense for Resilient DNS Infrastructure." In 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC). IEEE, 2025. https://doi.org/10.1109/ccnc54725.2025.10975971.
Full textYang, Zheng, Degang Sun, Yan Wang, Xinbo Han, Chen Meng, and Weiqing Huang. "DFilter: A Network Access Layer Collaborative Defense Model for Moving Target Defense." In 2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2025. https://doi.org/10.1109/cscwd64889.2025.11033630.
Full textLi, Jason, Justin Yackoski, and Nicholas Evancich. "Moving Target Defense." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2995272.2995286.
Full textNichols, Howard, Uttam Majumder, Gregory Owirka, and Lucas Finn. "Ground moving target processing for tracking selected targets." In SPIE Defense + Security, edited by Edmund Zelnio and Frederick D. Garber. SPIE, 2016. http://dx.doi.org/10.1117/12.2224762.
Full textJohnson, Bruce L., and Timothy P. Grayson. "Moving target exploitation." In Aerospace/Defense Sensing and Controls, edited by Raja Suresh. SPIE, 1998. http://dx.doi.org/10.1117/12.317682.
Full textUfuk, Berkan, and Mehmet Sandikkaya. "Moving Target Defense Router: MaTaDoR." In 19th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0011306500003283.
Full textXu, Jun, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu, and Peng Liu. "Comparing Different Moving Target Defense Techniques." In the First ACM Workshop. ACM Press, 2014. http://dx.doi.org/10.1145/2663474.2663486.
Full textColbaugh, Richard, and Kristin Glass. "Moving target defense for adaptive adversaries." In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578785.
Full textIslam, Md Mazharul, Qi Duan, and Ehab Al-Shaer. "Specification-driven Moving Target Defense Synthesis." In the 6th ACM Workshop. ACM Press, 2019. http://dx.doi.org/10.1145/3338468.3356830.
Full textJingzhe, Zhang, Feng Xuewei, Wang Dongxia, and Ming Liang. "Web Service Applying Moving Target Defense." In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE, 2018. http://dx.doi.org/10.1109/dsc.2018.00102.
Full textReports on the topic "Moving Target Defense"
Jones, Stephen T., Alexander V. Outkin, Jared Lee Gearhart, et al. Evaluating Moving Target Defense with PLADD. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222986.
Full textJenkins, Christipher D. Moving Target Defense for Space Systems. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1592959.
Full textFink, Glenn A., and Christopher S. Oehmen. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1059207.
Full textUlrich, Jacob. A simple moving target defense for power grid security using network address translation. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-82.
Full textThompson, Robert T., and Jr. Moving Targets and Joint Theater Missile Defense Doctrine: Does it Apply to Locating and Engaging the Needle in the Haystack? Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada363153.
Full text