Littérature scientifique sur le sujet « Moving Target Defense »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Moving Target Defense ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Moving Target Defense"

1

Lei, Cheng, Hong-Qi Zhang, Jing-Lei Tan, Yu-Chen Zhang, and Xiao-Hu Liu. "Moving Target Defense Techniques: A Survey." Security and Communication Networks 2018 (July 22, 2018): 1–25. http://dx.doi.org/10.1155/2018/3759626.

Texte intégral
Résumé :
As an active defense technique to change asymmetry in cyberattack-defense confrontation, moving target defense research has become one of the hot spots. In order to gain better understanding of moving target defense, background knowledge and inspiration are expounded at first. Based on it, the concept of moving target defense is analyzed. Secondly, literature analysis method is adopted to explain the design principles and system architecture of moving target defense. In addition, some relevant key techniques are introduced from the aspects of strategy generation, shuffling implementation, and
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wang, Huangxin, Quan Jia, Dan Fleck, Walter Powell, Fei Li, and Angelos Stavrou. "A moving target DDoS defense mechanism." Computer Communications 46 (June 2014): 10–21. http://dx.doi.org/10.1016/j.comcom.2014.03.009.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Shouq, Mohsen Alnemari, and M. Alzahrani Sabah. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 5 (2021): 84–90. https://doi.org/10.35940/ijrte.E5111.019521.

Texte intégral
Résumé :
<strong>Abstract</strong>&mdash; The traditional technologies, tools and procedures of any network cannot be protected from attackers due to the unchanged services and configurations of the networks. To get rid of the asymmetrical feature, Moving Target Defense technique constantly changes the platform conformation which reduces success ratio of the cyberattack. Users are faced with realness with the increase of continual, progressive, and smart attacks. However, the defenders often follow the attackers in taking suitable action to frustrate expected attackers. The moving target defense idea a
Styles APA, Harvard, Vancouver, ISO, etc.
4

Alnemari, Shouq Mohsen, and Sabah M. Alzahrani. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 84–90. http://dx.doi.org/10.35940/ijrte.e5111.019521.

Texte intégral
Résumé :
The traditional technologies, tools and procedures of any network cannot be protected from attackers due to the unchanged services and configurations of the networks. To get rid of the asymmetrical feature, Moving Target Defense technique constantly changes the platform conformation which reduces success ratio of the cyberattack. Users are faced with realness with the increase of continual, progressive, and smart attacks. However, the defenders often follow the attackers in taking suitable action to frustrate expected attackers. The moving target defense idea appeared as a preemptive protect m
Styles APA, Harvard, Vancouver, ISO, etc.
5

Cho, Jin-Hee, Dilli P. Sharma, Hooman Alavizadeh, et al. "Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense." IEEE Communications Surveys & Tutorials 22, no. 1 (2020): 709–45. http://dx.doi.org/10.1109/comst.2019.2963791.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zhang, Zhihua, Lu Liu, Chunying Zhang, et al. "MTTEGDM: A Moving Target Evolutionary Game Defense Model Based on Three-Way Decisions." Electronics 13, no. 4 (2024): 734. http://dx.doi.org/10.3390/electronics13040734.

Texte intégral
Résumé :
Aiming at the fact that the moving target defense game model fails to accurately portray attack and defense gains, resulting in bias in attack and defense games and the inability to select effective defense strategies, we construct the moving target three-way evolutionary game defense model (MTTEGDM). Firstly, the model is defined and analyzed theoretically under the premise of uncertainty and irrationality. Then, combined with the three-way decisions, the attack intention is introduced into the target network loss calculation, and a dynamic weight adjustment algorithm based on the three-way d
Styles APA, Harvard, Vancouver, ISO, etc.
7

Heydari, Vahid. "Moving Target Defense for Securing SCADA Communications." IEEE Access 6 (2018): 33329–43. http://dx.doi.org/10.1109/access.2018.2844542.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Shi, Yuan, Huanguo Zhang, Juan Wang, et al. "CHAOS: An SDN-Based Moving Target Defense System." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/3659167.

Texte intégral
Résumé :
Moving target defense (MTD) has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN) points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obf
Styles APA, Harvard, Vancouver, ISO, etc.
9

Xu, Xiaoyu, Hao Hu, and Xianwei Zhu. "Compressing Deep Learning Model for Agile Moving Target Defense." Journal of Physics: Conference Series 2171, no. 1 (2022): 012032. http://dx.doi.org/10.1088/1742-6596/2171/1/012032.

Texte intégral
Résumé :
Abstract The moving target defense achieves the effect of defending against network attacks by constantly changing the attack surface. IP hopping defense is a typical representative of network layer moving target defense technology. It has been verified to show considerable defense effect against DDoS attacks and scanning attacks. Aiming at the problems that the system resource overhead of the existing IP hopping defense technology is too large, an agile IP hopping defense technology based on compressed neural network is proposed in this paper. A convolutional neural network (CNN) is deployed
Styles APA, Harvard, Vancouver, ISO, etc.
10

Hyder, M. F., and M. A. Ismail. "INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks." Engineering, Technology & Applied Science Research 10, no. 1 (2020): 5142–47. http://dx.doi.org/10.48084/etasr.3266.

Texte intégral
Résumé :
Intent-Based Networking (IBN) is an emerging networking paradigm while Moving Target Defense (MTD) is an active security technique. In this paper, the Intent-based Moving Target Defense (INMTD) framework using Software Defined Networks is proposed. INMTD is the first effort in exploiting IBN for the design of an efficient Moving Target Defense (MTD) framework. INMTD uses the concept of shadow servers in order to counter the first stage of cyber-attacks, i.e. reconnaissance attacks targeted against servers running in SDN networks. INMTD comprises of an MTD application running on an SDN controll
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Moving Target Defense"

1

DiMarco, Peter Lewis. "Evaluation of Moving Target IPv6 Defense and Distributed Denial of Service Defenses." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/24697.

Texte intégral
Résumé :
A Denial-of-Service (DoS) attack is a network attack from a single machine that attempts to prevent the victim, the targeted machine, from communicating to other devices on the network or perform its normal tasks. The extension of these attacks to include many malicious machines became known as Distributed Denial-of-Service (DDoS) attacks. DDoS attacks cause an immense amount of strain on both the victim and the devices used to reach the victim. In reaction to these attacks, preexisting technologies were used as DDoS defenses to mitigate the effects. The two most notable defenses used are the
Styles APA, Harvard, Vancouver, ISO, etc.
2

Zhuang, Rui. "A theory for understanding and quantifying moving target defense." Diss., Kansas State University, 2015. http://hdl.handle.net/2097/20525.

Texte intégral
Résumé :
Doctor of Philosophy<br>Computing and Information Sciences<br>Scott A. DeLoach<br>The static nature of cyber systems gives attackers a valuable and asymmetric advantage - time. To eliminate this asymmetric advantage, a new approach, called Moving Target Defense (MTD) has emerged as a potential solution. MTD system seeks to proactively change system configurations to invalidate the knowledge learned by the attacker and force them to spend more effort locating and re-locating vulnerabilities. While it sounds promising, the approach is so new that there is no standard definition of what an MTD is
Styles APA, Harvard, Vancouver, ISO, etc.
3

Zeitz, Kimberly Ann. "Cybersecurity for the Internet of Things: A Micro Moving Target IPv6 Defense." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102446.

Texte intégral
Résumé :
As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cybersecurity for the IoT through the exploration of a moving target defense to apply for limiting the time attackers may conduct reconnaissance on embedded systems while considering the challenges presented from IoT devices such as resource and performance constraints. We introduce the design and optimizations for
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sherburne, Matthew Gilbert. "Micro-Moving Target IPv6 Defense for 6LoWPAN and the Internet of Things." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52043.

Texte intégral
Résumé :
The Internet of Things (IoT) is composed of billions of sensors and actuators that have varying tasks aimed at making industry, healthcare, and home life more efficient. These sensors and actuators are mainly low-powered and resource-constrained embedded devices with little room for implementing IP security in addition to their main function. With the fact that more of these devices are using IPv6 addressing, we seek to adapt a moving-target defense measure called Moving Target IPv6 Defense for use with embedded devices in order to add an additional layer of security. This adaptation, which we
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hardman, Owen Russell. "Optimizing a Network Layer Moving Target Defense by Translating Software from Python to C." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/64435.

Texte intégral
Résumé :
The security of powerful systems and large networks is often addressed through complex defenses. While these types of defenses offer increased security, they are resource intensive and therefore impractical to implement on many new classes of networked systems, such as mobile phones and small, embedded network infrastructure devices. To provide security for these systems, new defenses must be created that provide highly efficient security. The Moving Target IPv6 Defense (MT6D) is a network layer moving target defense that dynamically changes Internet Protocol version 6 (IPv6) addresses mid-ses
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sagisi, Joseph Lozano. "HE-MT6D: A Network Security Processor with Hardware Engine for Moving Target IPv6 Defense (MT6D) over 1 Gbps IEEE 802.3 Ethernet." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/86789.

Texte intégral
Résumé :
Traditional static network addressing allows attackers the incredible advantage of taking time to plan and execute attacks against a network. To counter, Moving Target IPv6 Defense (MT6D) provides a network host obfuscation technique that dynamically obscures network and transport layer addresses. Software driven implementations have posed many challenges, namely, constant code maintenance to remain compliant with all library and kernel dependencies, less than optimal throughput, and the requirement for a dedicated general purpose hardware. The work of this thesis presents Network Security Pro
Styles APA, Harvard, Vancouver, ISO, etc.
7

Navas, Renzo Efraín. "Improving the resilience of the constrained Internet of Things : a moving target defense approach." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0217.

Texte intégral
Résumé :
Les systèmes de l’Internet des Objets (IoT) sont de plus en plus déployés dans le monde réel, mais leur sécurité est en retard par rapport à l’état de l’art des systèmes non IoT. La Défense par Cible Mouvante (MTD) est un paradigme de cyberdéfense qui propose de randomiser les composants des systèmes, dans l’intention de faire échec aux cyberattaquants qui s’appuyaient auparavant sur la nature statique des systèmes. Les attaquants sont désormais limités par le temps. Le MTD a été mis en œuvre avec succès dans les systèmes conventionnels, mais son utilisation pour améliorer la sécurité des IoT
Styles APA, Harvard, Vancouver, ISO, etc.
8

Basam, Dileep Kumar. "Strengthening MT6D Defenses with Darknet and Honeypot capabilities." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/64375.

Texte intégral
Résumé :
With the ever increasing adoption of IPv6, there has been a growing concern for security and privacy of IPv6 networks. Mechanisms like the Moving Target IPv6 Defense (MT6D) leverage the immense address space available with the new 128-bit addressing scheme to improve security and privacy of IPv6 networks. MT6D allows participating hosts to hop onto new addresses, that are cryptographically computed, without any disruption to ongoing conversations. However, there is no feedback mechanism in the current MT6D implementation to substantiate the core strength of the scheme i.e., to find an attack
Styles APA, Harvard, Vancouver, ISO, etc.
9

Dunlop, Matthew William. "Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77333.

Texte intégral
Résumé :
Society's increased use of network applications, such as email, social networking, and web browsing, creates a massive amount of information floating around in cyber space. An attacker can collect this information to build a profile of where people go, what their interests are, and even what they are saying to each other. For certain government and corporate entities, the exposure of this information could risk national security or loss of capital. This work identifies vulnerabilities in the way the Internet Protocol version 6 (IPv6) forms addresses. These vulnerabilities provide attackers wit
Styles APA, Harvard, Vancouver, ISO, etc.
10

Bardas, Alexandru Gavril. "Evaluating and quantifying the feasibility and effectiveness of whole IT system moving target defenses." Diss., Kansas State University, 2016. http://hdl.handle.net/2097/32570.

Texte intégral
Résumé :
Doctor of Philosophy<br>Computing and Information Sciences<br>Scott A. DeLoach<br>Xinming (Simon) Ou<br>The Moving Target Defense (MTD) concept has been proposed as an approach to rebalance the security landscape by increasing uncertainty and apparent complexity for attackers, reducing their window of opportunity, and raising the costs of their reconnaissance and attack efforts. Intuitively, the idea of applying MTD techniques to a whole IT system should provide enhanced security; however, little research has been done to show that it is feasible or beneficial to the system’s security. This di
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "Moving Target Defense"

1

Jajodia, Sushil, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and X. Sean Wang, eds. Moving Target Defense. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0977-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Jajodia, Sushil, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, and X. Sean Wang, eds. Moving Target Defense II. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-5416-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Shetty, Sachin, Xuebiao Yuchi, and Min Song. Moving Target Defense for Distributed Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31032-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Jajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer New York, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Song, Min, Sachin Shetty, and Xuebiao Yuchi. Moving Target Defense for Distributed Systems. Springer, 2016.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Song, Min, Sachin Shetty, and Xuebiao Yuchi. Moving Target Defense for Distributed Systems. Springer, 2018.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Song, Min, Sachin Shetty, and Xuebiao Yuchi. Moving Target Defense for Distributed Systems. Springer London, Limited, 2016.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Thuraisingham, M. B. Mtd'17: ACM Workshop on Moving Target Defense. Association for Computing Machinery, 2017.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Moving target defense: Creating asymmetric uncertainty for cyber threats. Springer, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, Vipin Swarup, and X. Sean Wang. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Springer New York, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Moving Target Defense"

1

Okhravi, Hamed. "Moving Target Defense." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1770-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Moving Target Defense." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Okhravi, Hamed. "Moving Target Defense." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_1770.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Albanese, Massimiliano, Warren Connell, Sridhar Venkatesan, and George Cybenko. "Moving Target Defense Quantification." In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Manadhata, Pratyusa K. "Game Theoretic Approaches to Attack Surface Shifting." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Jain, Manish, Bo An, and Milind Tambe. "Security Games Applied to Real-World: Research Contributions and Challenges." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Bilar, Daniel, George Cybenko, and John Murphy. "Adversarial Dynamics: The Conficker Case Study." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Gonzalez, Cleotilde. "From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Torrieri, Don, Sencun Zhu, and Sushil Jajodia. "Cyber Maneuver Against External Adversaries and Compromised Nodes." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Yackoski, Justin, Harry Bullen, Xiang Yu, and Jason Li. "Applying Self-Shielding Dynamics to the Network Architecture." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Moving Target Defense"

1

Aydeger, Abdullah, Pei Zhou, Sanzida Hoque, Marco Carvalho, and Engin Zeydan. "MTDNS: Moving Target Defense for Resilient DNS Infrastructure." In 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC). IEEE, 2025. https://doi.org/10.1109/ccnc54725.2025.10975971.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Yang, Zheng, Degang Sun, Yan Wang, Xinbo Han, Chen Meng, and Weiqing Huang. "DFilter: A Network Access Layer Collaborative Defense Model for Moving Target Defense." In 2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2025. https://doi.org/10.1109/cscwd64889.2025.11033630.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Li, Jason, Justin Yackoski, and Nicholas Evancich. "Moving Target Defense." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2995272.2995286.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Nichols, Howard, Uttam Majumder, Gregory Owirka, and Lucas Finn. "Ground moving target processing for tracking selected targets." In SPIE Defense + Security, edited by Edmund Zelnio and Frederick D. Garber. SPIE, 2016. http://dx.doi.org/10.1117/12.2224762.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Johnson, Bruce L., and Timothy P. Grayson. "Moving target exploitation." In Aerospace/Defense Sensing and Controls, edited by Raja Suresh. SPIE, 1998. http://dx.doi.org/10.1117/12.317682.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Ufuk, Berkan, and Mehmet Sandikkaya. "Moving Target Defense Router: MaTaDoR." In 19th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0011306500003283.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Xu, Jun, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu, and Peng Liu. "Comparing Different Moving Target Defense Techniques." In the First ACM Workshop. ACM Press, 2014. http://dx.doi.org/10.1145/2663474.2663486.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Colbaugh, Richard, and Kristin Glass. "Moving target defense for adaptive adversaries." In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578785.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Islam, Md Mazharul, Qi Duan, and Ehab Al-Shaer. "Specification-driven Moving Target Defense Synthesis." In the 6th ACM Workshop. ACM Press, 2019. http://dx.doi.org/10.1145/3338468.3356830.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Jingzhe, Zhang, Feng Xuewei, Wang Dongxia, and Ming Liang. "Web Service Applying Moving Target Defense." In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE, 2018. http://dx.doi.org/10.1109/dsc.2018.00102.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Moving Target Defense"

1

Jones, Stephen T., Alexander V. Outkin, Jared Lee Gearhart, et al. Evaluating Moving Target Defense with PLADD. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222986.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Jenkins, Christipher D. Moving Target Defense for Space Systems. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1592959.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Fink, Glenn A., and Christopher S. Oehmen. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1059207.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ulrich, Jacob. A simple moving target defense for power grid security using network address translation. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-82.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Thompson, Robert T., and Jr. Moving Targets and Joint Theater Missile Defense Doctrine: Does it Apply to Locating and Engaging the Needle in the Haystack? Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada363153.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!