Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Moving Target Defense.

Articles de revues sur le sujet « Moving Target Defense »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Moving Target Defense ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Lei, Cheng, Hong-Qi Zhang, Jing-Lei Tan, Yu-Chen Zhang, and Xiao-Hu Liu. "Moving Target Defense Techniques: A Survey." Security and Communication Networks 2018 (July 22, 2018): 1–25. http://dx.doi.org/10.1155/2018/3759626.

Texte intégral
Résumé :
As an active defense technique to change asymmetry in cyberattack-defense confrontation, moving target defense research has become one of the hot spots. In order to gain better understanding of moving target defense, background knowledge and inspiration are expounded at first. Based on it, the concept of moving target defense is analyzed. Secondly, literature analysis method is adopted to explain the design principles and system architecture of moving target defense. In addition, some relevant key techniques are introduced from the aspects of strategy generation, shuffling implementation, and
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wang, Huangxin, Quan Jia, Dan Fleck, Walter Powell, Fei Li, and Angelos Stavrou. "A moving target DDoS defense mechanism." Computer Communications 46 (June 2014): 10–21. http://dx.doi.org/10.1016/j.comcom.2014.03.009.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Shouq, Mohsen Alnemari, and M. Alzahrani Sabah. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 5 (2021): 84–90. https://doi.org/10.35940/ijrte.E5111.019521.

Texte intégral
Résumé :
<strong>Abstract</strong>&mdash; The traditional technologies, tools and procedures of any network cannot be protected from attackers due to the unchanged services and configurations of the networks. To get rid of the asymmetrical feature, Moving Target Defense technique constantly changes the platform conformation which reduces success ratio of the cyberattack. Users are faced with realness with the increase of continual, progressive, and smart attacks. However, the defenders often follow the attackers in taking suitable action to frustrate expected attackers. The moving target defense idea a
Styles APA, Harvard, Vancouver, ISO, etc.
4

Alnemari, Shouq Mohsen, and Sabah M. Alzahrani. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 84–90. http://dx.doi.org/10.35940/ijrte.e5111.019521.

Texte intégral
Résumé :
The traditional technologies, tools and procedures of any network cannot be protected from attackers due to the unchanged services and configurations of the networks. To get rid of the asymmetrical feature, Moving Target Defense technique constantly changes the platform conformation which reduces success ratio of the cyberattack. Users are faced with realness with the increase of continual, progressive, and smart attacks. However, the defenders often follow the attackers in taking suitable action to frustrate expected attackers. The moving target defense idea appeared as a preemptive protect m
Styles APA, Harvard, Vancouver, ISO, etc.
5

Cho, Jin-Hee, Dilli P. Sharma, Hooman Alavizadeh, et al. "Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense." IEEE Communications Surveys & Tutorials 22, no. 1 (2020): 709–45. http://dx.doi.org/10.1109/comst.2019.2963791.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zhang, Zhihua, Lu Liu, Chunying Zhang, et al. "MTTEGDM: A Moving Target Evolutionary Game Defense Model Based on Three-Way Decisions." Electronics 13, no. 4 (2024): 734. http://dx.doi.org/10.3390/electronics13040734.

Texte intégral
Résumé :
Aiming at the fact that the moving target defense game model fails to accurately portray attack and defense gains, resulting in bias in attack and defense games and the inability to select effective defense strategies, we construct the moving target three-way evolutionary game defense model (MTTEGDM). Firstly, the model is defined and analyzed theoretically under the premise of uncertainty and irrationality. Then, combined with the three-way decisions, the attack intention is introduced into the target network loss calculation, and a dynamic weight adjustment algorithm based on the three-way d
Styles APA, Harvard, Vancouver, ISO, etc.
7

Heydari, Vahid. "Moving Target Defense for Securing SCADA Communications." IEEE Access 6 (2018): 33329–43. http://dx.doi.org/10.1109/access.2018.2844542.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Shi, Yuan, Huanguo Zhang, Juan Wang, et al. "CHAOS: An SDN-Based Moving Target Defense System." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/3659167.

Texte intégral
Résumé :
Moving target defense (MTD) has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN) points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obf
Styles APA, Harvard, Vancouver, ISO, etc.
9

Xu, Xiaoyu, Hao Hu, and Xianwei Zhu. "Compressing Deep Learning Model for Agile Moving Target Defense." Journal of Physics: Conference Series 2171, no. 1 (2022): 012032. http://dx.doi.org/10.1088/1742-6596/2171/1/012032.

Texte intégral
Résumé :
Abstract The moving target defense achieves the effect of defending against network attacks by constantly changing the attack surface. IP hopping defense is a typical representative of network layer moving target defense technology. It has been verified to show considerable defense effect against DDoS attacks and scanning attacks. Aiming at the problems that the system resource overhead of the existing IP hopping defense technology is too large, an agile IP hopping defense technology based on compressed neural network is proposed in this paper. A convolutional neural network (CNN) is deployed
Styles APA, Harvard, Vancouver, ISO, etc.
10

Hyder, M. F., and M. A. Ismail. "INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks." Engineering, Technology & Applied Science Research 10, no. 1 (2020): 5142–47. http://dx.doi.org/10.48084/etasr.3266.

Texte intégral
Résumé :
Intent-Based Networking (IBN) is an emerging networking paradigm while Moving Target Defense (MTD) is an active security technique. In this paper, the Intent-based Moving Target Defense (INMTD) framework using Software Defined Networks is proposed. INMTD is the first effort in exploiting IBN for the design of an efficient Moving Target Defense (MTD) framework. INMTD uses the concept of shadow servers in order to counter the first stage of cyber-attacks, i.e. reconnaissance attacks targeted against servers running in SDN networks. INMTD comprises of an MTD application running on an SDN controll
Styles APA, Harvard, Vancouver, ISO, etc.
11

Hyder, M. F., and M. A. Ismail. "INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks." Engineering, Technology & Applied Science Research 10, no. 1 (2020): 5142–46. https://doi.org/10.5281/zenodo.3659507.

Texte intégral
Résumé :
Intent-Based Networking (IBN) is an emerging networking paradigm while Moving Target Defense (MTD) is an active security technique. In this paper, the Intent-based Moving Target Defense (INMTD) framework using Software Defined Networks is proposed. INMTD is the first effort in exploiting IBN for the design of an efficient Moving Target Defense (MTD) framework. INMTD uses the concept of shadow servers in order to counter the first stage of cyber-attacks, i.e. reconnaissance attacks targeted against servers running in SDN networks. INMTD comprises of an MTD application running on an SDN controll
Styles APA, Harvard, Vancouver, ISO, etc.
12

Soussi, Wissem, Maria Christopoulou, George Xilouris, and Gurkan Gur. "Moving Target Defense as a Proactive Defense Element for Beyond 5G." IEEE Communications Standards Magazine 5, no. 3 (2021): 72–79. http://dx.doi.org/10.1109/mcomstd.211.2000087.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Ge, Mengmeng, Jin-Hee Cho, Dongseong Kim, Gaurav Dixit, and Ing-Ray Chen. "Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–31. http://dx.doi.org/10.1145/3467021.

Texte intégral
Résumé :
Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised by attackers, because strong security protections may not be suitable to be deployed. This requires an alternative approach to protect vulnerable components in IoT networks. In this article, we propose an integrated defense technique to achieve intrusion prevention by leveraging cyberdeception (i.e., a decoy system) and moving target defense (i.e., network topology shuffling). We evaluate the effectiveness and efficiency of our proposed technique analytically based on a graphical security model in a softw
Styles APA, Harvard, Vancouver, ISO, etc.
14

Ayrault, Maxime, Ulrich Kühne, and Étienne Borde. "Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars." Information 13, no. 5 (2022): 242. http://dx.doi.org/10.3390/info13050242.

Texte intégral
Résumé :
During their life-cycle, modern connected cars will have to face various and changing security threats. As for any critical embedded system, security fixes in the form of software updates need to be thoroughly verified and cannot be deployed on a daily basis. The system needs to commit to a defense strategy, while attackers can examine vulnerabilities and prepare possible exploits before attacking. In order to break this asymmetry, it can be advantageous to use proactive defenses, such as reconfiguring parts of the system configuration. However, resource constraints and losses in quality of se
Styles APA, Harvard, Vancouver, ISO, etc.
15

Cunha, Vitor A., Daniel Corujo, Joao P. Barraca, and Rui L. Aguiar. "TOTP Moving Target Defense for sensitive network services." Pervasive and Mobile Computing 74 (July 2021): 101412. http://dx.doi.org/10.1016/j.pmcj.2021.101412.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Vuppala, Satyanarayana, Alie El-Din Mady, and Adam Kuenzi. "Moving Target Defense Mechanism for Side-Channel Attacks." IEEE Systems Journal 14, no. 2 (2020): 1810–19. http://dx.doi.org/10.1109/jsyst.2019.2922589.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Ghourab, Esraa M., Effat Samir, Mohamed Azab, Mohamed Eltoweissy, and Mohamed Azab. "Trustworthy Vehicular CommunicationEmploying Multidimensional Diversificationfor Moving-target Defense." Journal of Cyber Security and Mobility 8, no. 2 (2018): 133–64. http://dx.doi.org/10.13052/jcsm2245-1439.821.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Carvalho, Marco, Jeffrey M. Bradshaw, Larry Bunch, et al. "Command and Control Requirements for Moving-Target Defense." IEEE Intelligent Systems 27, no. 3 (2012): 79–85. http://dx.doi.org/10.1109/mis.2012.45.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Lee, Suhyeon, Huy Kang Kim, and Kyounggon Kim. "Ransomware protection using the moving target defense perspective." Computers & Electrical Engineering 78 (September 2019): 288–99. http://dx.doi.org/10.1016/j.compeleceng.2019.07.014.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

., Abhishekh Patil. "IP ADDRESS SHUFFLING USING MOVING TARGET DEFENSE (MTD)." International Journal of Research in Engineering and Technology 05, no. 11 (2016): 20–22. http://dx.doi.org/10.15623/ijret.2016.0511004.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Tian, Jue, Rui Tan, Xiaohong Guan, and Ting Liu. "Enhanced Hidden Moving Target Defense in Smart Grids." IEEE Transactions on Smart Grid 10, no. 2 (2019): 2208–23. http://dx.doi.org/10.1109/tsg.2018.2791512.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Azab, Mohamed, and Mohamed Eltoweissy. "ChameleonSoft: Software Behavior Encryption for Moving Target Defense." Mobile Networks and Applications 18, no. 2 (2012): 271–92. http://dx.doi.org/10.1007/s11036-012-0392-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Żal, Mariusz, Marek Michalski, and Piotr Zwierzykowski. "Implementation of a Lossless Moving Target Defense Mechanism." Electronics 13, no. 5 (2024): 918. http://dx.doi.org/10.3390/electronics13050918.

Texte intégral
Résumé :
The contemporary world, dominated by information technologt (IT), necessitates sophisticated protection mechanisms against attacks that pose significant threats to individuals, companies, and governments alike. The unpredictability of human behavior, coupled with the scattered development of applications and devices, complicates supply chain maintenance, making it impossible to develop a system entirely immune to cyberattacks. Effective execution of many attack types hinges on prior network reconnaissance. Thus, hindering effective reconnaissance serves as a countermeasure to attacks. This pap
Styles APA, Harvard, Vancouver, ISO, etc.
24

Sun, Rongbo, Yuefei Zhu, Jinlong Fei, and Xingyu Chen. "A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive." Applied Sciences 13, no. 9 (2023): 5367. http://dx.doi.org/10.3390/app13095367.

Texte intégral
Résumé :
Represented by reactive security defense mechanisms, cyber defense possesses a static, reactive, and deterministic nature, with overwhelmingly high costs to defend against ever-changing attackers. To change this situation, researchers have proposed moving target defense (MTD), which introduces the concept of an attack surface to define cyber defense in a brand-new manner, aiming to provide a dynamic, continuous, and proactive defense mechanism. With the increasing use of machine learning in networking, researchers have discovered that MTD techniques based on machine learning can provide omni-b
Styles APA, Harvard, Vancouver, ISO, etc.
25

Tamba, Tua A., Bin Hu, and Yul Y. Nazaruddin. "On Event-Triggered Implementation of Moving Target Defense Control." IFAC-PapersOnLine 53, no. 2 (2020): 3539–44. http://dx.doi.org/10.1016/j.ifacol.2020.12.1727.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Cai, Gui-lin, Bao-sheng Wang, Wei Hu, and Tian-zuo Wang. "Moving target defense: state of the art and characteristics." Frontiers of Information Technology & Electronic Engineering 17, no. 11 (2016): 1122–53. http://dx.doi.org/10.1631/fitee.1601321.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Mullins, Tristen, Brandon Baggett, Todd Andel, and Todd McDonald. "Circuit-Variant Moving Target Defense for Side-Channel Attacks." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 219–26. http://dx.doi.org/10.34190/iccws.17.1.14.

Texte intégral
Résumé :
The security of cryptosystems involves preventing an attacker's ability to obtain information about plaintext. Traditionally, this has been done by prioritizing secrecy of the key through complex key selection and secure key exchange. With the emergence of side-channel analysis (SCA) attacks, bits of a secret key may be derived by correlating key values with physical properties of cryptographic process execution. Information such as power consumption and electromagnetic (EM) radiation side-channel properties can be observed during encryption or decryption. These signals reflect data-dependent
Styles APA, Harvard, Vancouver, ISO, etc.
28

Shiva, Sajjan. "Automated Live Migration in OpenStack:A Moving Target Defense Solution." Journal of Computer Science Applications and Information Technology 2, no. 3 (2017): 1–5. http://dx.doi.org/10.15226/2474-9257/2/3/00119.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

PARK, Taekeun, and Keewon KIM. "Strengthening Network-Based Moving Target Defense with Disposable Identifiers." IEICE Transactions on Information and Systems E105.D, no. 10 (2022): 1799–802. http://dx.doi.org/10.1587/transinf.2022edl8022.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Pal, Partha, Richard Schantz, Aaron Paulos, and Brett Benyo. "Managed Execution Environment as a Moving-Target Defense Infrastructure." IEEE Security & Privacy 12, no. 2 (2014): 51–59. http://dx.doi.org/10.1109/msp.2013.133.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Zhang, Hong-qi, Cheng Lei, De-xian Chang, and Ying-jie Yang. "Network moving target defense technique based on collaborative mutation." Computers & Security 70 (September 2017): 51–71. http://dx.doi.org/10.1016/j.cose.2017.05.007.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Tian, Jue, Rui Tan, Xiaohong Guan, Zhanbo Xu, and Ting Liu. "Moving Target Defense Approach to Detecting Stuxnet-Like Attacks." IEEE Transactions on Smart Grid 11, no. 1 (2020): 291–300. http://dx.doi.org/10.1109/tsg.2019.2921245.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Tan, Jinglei, Hui Jin, Hongqi Zhang, et al. "A survey: When moving target defense meets game theory." Computer Science Review 48 (May 2023): 100544. http://dx.doi.org/10.1016/j.cosrev.2023.100544.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Lei, Cheng, Duo-he Ma, Hong-qi Zhang, and Li-ming Wang. "Moving Target Network Defense Effectiveness Evaluation Based on Change-Point Detection." Mathematical Problems in Engineering 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6391502.

Texte intégral
Résumé :
In order to evaluate the effectiveness of moving target network defense, a dynamic effectiveness evaluation approach based on change-point detection is presented. Firstly, the concept of multilayer network resource graph is defined, which helps establish the relationship between the change of resource vulnerability and the transfer of network node state. Secondly, a change-point detection and standardized measurement algorithm is proposed. Consequently, it improves the efficiency of evaluation by measuring the change-point dynamically and enhancing the accuracy of evaluation based on multilaye
Styles APA, Harvard, Vancouver, ISO, etc.
35

Tan, Jing-lei, Heng-wei Zhang, Hong-qi Zhang, et al. "Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model." Security and Communication Networks 2020 (June 9, 2020): 1–12. http://dx.doi.org/10.1155/2020/3151495.

Texte intégral
Résumé :
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to advanced persistent threats (APTs). Moving target defense, as an effective defense means, is constantly developing. It is difficult to effectively characterize an MTD attack and defense game with existing game models and effectively select the defense timing to balance SDN service quality and MTD decision-making benefits. From the hidden confrontation between the actual attack and defense sides, existing attack-defense scenarios are abstractly characterized and analyzed. Based on the APT attack
Styles APA, Harvard, Vancouver, ISO, etc.
36

Cai, Gui-lin, Bao-sheng Wang, and Qian-qian Xing. "Game theoretic analysis for the mechanism of moving target defense." Frontiers of Information Technology & Electronic Engineering 18, no. 12 (2017): 2017–34. http://dx.doi.org/10.1631/fitee.1601797.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Zhang, Huan, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo, and Bin Wu. "Strategy Selection for Moving Target Defense in Incomplete Information Game." Computers, Materials & Continua 62, no. 2 (2020): 763–86. http://dx.doi.org/10.32604/cmc.2020.06553.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Mercado-Velazquez, Andres Aharhel, Ponciano Jorge Escamilla-Ambrosio, and Floriberto Ortiz-Rodriguez. "A Moving Target Defense Strategy for Internet of Things Cybersecurity." IEEE Access 9 (2021): 118406–18. http://dx.doi.org/10.1109/access.2021.3107403.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Yoon, Seunghyun, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, and Hyuk Lim. "Attack Graph-Based Moving Target Defense in Software-Defined Networks." IEEE Transactions on Network and Service Management 17, no. 3 (2020): 1653–68. http://dx.doi.org/10.1109/tnsm.2020.2987085.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Kanellopoulos, Aris, and Kyriakos G. Vamvoudakis. "A Moving Target Defense Control Framework for Cyber-Physical Systems." IEEE Transactions on Automatic Control 65, no. 3 (2020): 1029–43. http://dx.doi.org/10.1109/tac.2019.2915746.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Niakanlahiji, Amirreza, and Jafar Haadi Jafarian. "WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense." Security and Communication Networks 2019 (May 14, 2019): 1–13. http://dx.doi.org/10.1155/2019/2156906.

Texte intégral
Résumé :
Existing mitigation techniques for cross-site scripting attacks have not been widely adopted, primarily due to imposing impractical overheads on developers, Web servers, or Web browsers. They either enforce restrictive coding practices on developers, fail to support legacy Web applications, demand browser code modification, or fail to provide browser backward compatibility. Moving target defense (MTD) is a novel proactive class of techniques that aim to defeat attacks by imposing uncertainty in attack reconnaissance and planning. This uncertainty is achieved by frequent and random mutation (ra
Styles APA, Harvard, Vancouver, ISO, etc.
42

Zangeneh, Vahid, and Mehdi Shajari. "A cost-sensitive move selection strategy for moving target defense." Computers & Security 75 (June 2018): 72–91. http://dx.doi.org/10.1016/j.cose.2017.12.013.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Torquato, Matheus, and Marco Vieira. "Moving target defense in cloud computing: A systematic mapping study." Computers & Security 92 (May 2020): 101742. http://dx.doi.org/10.1016/j.cose.2020.101742.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Zhang, Huan, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo, and Bin Wu. "Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks." IEEE Access 7 (2019): 65982–95. http://dx.doi.org/10.1109/access.2019.2918319.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Song, Fei, Yu-Tong Zhou, Yu Wang, Tian-Ming Zhao, Ilsun You, and Hong-Ke Zhang. "Smart collaborative distribution for privacy enhancement in moving target defense." Information Sciences 479 (April 2019): 593–606. http://dx.doi.org/10.1016/j.ins.2018.06.002.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

Qian, Yaguan, Yankai Guo, Qiqi Shao, et al. "EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks." ACM Transactions on Privacy and Security 25, no. 3 (2022): 1–24. http://dx.doi.org/10.1145/3517806.

Texte intégral
Résumé :
Edge intelligence has played an important role in constructing smart cities, but the vulnerability of edge nodes to adversarial attacks becomes an urgent problem. A so-called adversarial example can fool a deep learning model on an edge node for misclassification. Due to the transferability property of adversarial examples, an adversary can easily fool a black-box model by a local substitute model. Edge nodes in general have limited resources, which cannot afford a complicated defense mechanism like that on a cloud data center. To address the challenge, we propose a dynamic defense mechanism,
Styles APA, Harvard, Vancouver, ISO, etc.
47

Jin, Han Jun, and Feng Jiao Wang. "A Fast Algorithm Research of Moving Targets Detection Based on GPU." Advanced Materials Research 850-851 (December 2013): 776–79. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.776.

Texte intégral
Résumé :
Moving object detection which is an important part of the digital image processing technology is research focus and difficulty in computer vision, pattern recognition, object recognition and tracking, moving image coding, security monitoring and other fields. It also has a wide application prospect in the military, national defense and industry fields. However, when there are large amount of moving targets and exercise conditions, the amount of data generated is also inestimable and target detection is a bottleneck in the data processing at the same time. The work of this paper is to simplify
Styles APA, Harvard, Vancouver, ISO, etc.
48

Gao, Chungang, Yongjie Wang, and Xinli Xiong. "A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/3949292.

Texte intégral
Résumé :
Increasingly, cyber security personnel are using cyber deception defense techniques to deal with network intrusions. However, traditional cyber deception techniques (such as honeypots and honeynets) are easily detected by attackers, thus leading to failure. Therefore, we propose a cyber deception defense method based on the signal game to improve the effectiveness of the defense. More specifically, first, we propose a moving target defense (MTD) enhanced cyber deception defense mechanism. Then, on the basis of the in-depth analysis of network attack and defense scenarios, a signal game model i
Styles APA, Harvard, Vancouver, ISO, etc.
49

Song, Qun, Zhenyu Yan, and Rui Tan. "DeepMTD: Moving Target Defense for Deep Visual Sensing against Adversarial Examples." ACM Transactions on Sensor Networks 18, no. 1 (2022): 1–32. http://dx.doi.org/10.1145/3469032.

Texte intégral
Résumé :
Deep learning-based visual sensing has achieved attractive accuracy but is shown vulnerable to adversarial attacks. Specifically, once the attackers obtain the deep model, they can construct adversarial examples to mislead the model to yield wrong classification results. Deployable adversarial examples such as small stickers pasted on the road signs and lanes have been shown effective in misleading advanced driver-assistance systems. Most existing countermeasures against adversarial examples build their security on the attackers’ ignorance of the defense mechanisms. Thus, they fall short of fo
Styles APA, Harvard, Vancouver, ISO, etc.
50

Gao, Chungang, and Yongjie Wang. "Reinforcement learning based self-adaptive moving target defense against DDoS attacks." Journal of Physics: Conference Series 1812, no. 1 (2021): 012039. http://dx.doi.org/10.1088/1742-6596/1812/1/012039.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!