Articles de revues sur le sujet « Moving Target Defense »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Moving Target Defense ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Lei, Cheng, Hong-Qi Zhang, Jing-Lei Tan, Yu-Chen Zhang, and Xiao-Hu Liu. "Moving Target Defense Techniques: A Survey." Security and Communication Networks 2018 (July 22, 2018): 1–25. http://dx.doi.org/10.1155/2018/3759626.
Texte intégralWang, Huangxin, Quan Jia, Dan Fleck, Walter Powell, Fei Li, and Angelos Stavrou. "A moving target DDoS defense mechanism." Computer Communications 46 (June 2014): 10–21. http://dx.doi.org/10.1016/j.comcom.2014.03.009.
Texte intégralShouq, Mohsen Alnemari, and M. Alzahrani Sabah. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 5 (2021): 84–90. https://doi.org/10.35940/ijrte.E5111.019521.
Texte intégralAlnemari, Shouq Mohsen, and Sabah M. Alzahrani. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 84–90. http://dx.doi.org/10.35940/ijrte.e5111.019521.
Texte intégralCho, Jin-Hee, Dilli P. Sharma, Hooman Alavizadeh, et al. "Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense." IEEE Communications Surveys & Tutorials 22, no. 1 (2020): 709–45. http://dx.doi.org/10.1109/comst.2019.2963791.
Texte intégralZhang, Zhihua, Lu Liu, Chunying Zhang, et al. "MTTEGDM: A Moving Target Evolutionary Game Defense Model Based on Three-Way Decisions." Electronics 13, no. 4 (2024): 734. http://dx.doi.org/10.3390/electronics13040734.
Texte intégralHeydari, Vahid. "Moving Target Defense for Securing SCADA Communications." IEEE Access 6 (2018): 33329–43. http://dx.doi.org/10.1109/access.2018.2844542.
Texte intégralShi, Yuan, Huanguo Zhang, Juan Wang, et al. "CHAOS: An SDN-Based Moving Target Defense System." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/3659167.
Texte intégralXu, Xiaoyu, Hao Hu, and Xianwei Zhu. "Compressing Deep Learning Model for Agile Moving Target Defense." Journal of Physics: Conference Series 2171, no. 1 (2022): 012032. http://dx.doi.org/10.1088/1742-6596/2171/1/012032.
Texte intégralHyder, M. F., and M. A. Ismail. "INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks." Engineering, Technology & Applied Science Research 10, no. 1 (2020): 5142–47. http://dx.doi.org/10.48084/etasr.3266.
Texte intégralHyder, M. F., and M. A. Ismail. "INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks." Engineering, Technology & Applied Science Research 10, no. 1 (2020): 5142–46. https://doi.org/10.5281/zenodo.3659507.
Texte intégralSoussi, Wissem, Maria Christopoulou, George Xilouris, and Gurkan Gur. "Moving Target Defense as a Proactive Defense Element for Beyond 5G." IEEE Communications Standards Magazine 5, no. 3 (2021): 72–79. http://dx.doi.org/10.1109/mcomstd.211.2000087.
Texte intégralGe, Mengmeng, Jin-Hee Cho, Dongseong Kim, Gaurav Dixit, and Ing-Ray Chen. "Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–31. http://dx.doi.org/10.1145/3467021.
Texte intégralAyrault, Maxime, Ulrich Kühne, and Étienne Borde. "Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars." Information 13, no. 5 (2022): 242. http://dx.doi.org/10.3390/info13050242.
Texte intégralCunha, Vitor A., Daniel Corujo, Joao P. Barraca, and Rui L. Aguiar. "TOTP Moving Target Defense for sensitive network services." Pervasive and Mobile Computing 74 (July 2021): 101412. http://dx.doi.org/10.1016/j.pmcj.2021.101412.
Texte intégralVuppala, Satyanarayana, Alie El-Din Mady, and Adam Kuenzi. "Moving Target Defense Mechanism for Side-Channel Attacks." IEEE Systems Journal 14, no. 2 (2020): 1810–19. http://dx.doi.org/10.1109/jsyst.2019.2922589.
Texte intégralGhourab, Esraa M., Effat Samir, Mohamed Azab, Mohamed Eltoweissy, and Mohamed Azab. "Trustworthy Vehicular CommunicationEmploying Multidimensional Diversificationfor Moving-target Defense." Journal of Cyber Security and Mobility 8, no. 2 (2018): 133–64. http://dx.doi.org/10.13052/jcsm2245-1439.821.
Texte intégralCarvalho, Marco, Jeffrey M. Bradshaw, Larry Bunch, et al. "Command and Control Requirements for Moving-Target Defense." IEEE Intelligent Systems 27, no. 3 (2012): 79–85. http://dx.doi.org/10.1109/mis.2012.45.
Texte intégralLee, Suhyeon, Huy Kang Kim, and Kyounggon Kim. "Ransomware protection using the moving target defense perspective." Computers & Electrical Engineering 78 (September 2019): 288–99. http://dx.doi.org/10.1016/j.compeleceng.2019.07.014.
Texte intégral., Abhishekh Patil. "IP ADDRESS SHUFFLING USING MOVING TARGET DEFENSE (MTD)." International Journal of Research in Engineering and Technology 05, no. 11 (2016): 20–22. http://dx.doi.org/10.15623/ijret.2016.0511004.
Texte intégralTian, Jue, Rui Tan, Xiaohong Guan, and Ting Liu. "Enhanced Hidden Moving Target Defense in Smart Grids." IEEE Transactions on Smart Grid 10, no. 2 (2019): 2208–23. http://dx.doi.org/10.1109/tsg.2018.2791512.
Texte intégralAzab, Mohamed, and Mohamed Eltoweissy. "ChameleonSoft: Software Behavior Encryption for Moving Target Defense." Mobile Networks and Applications 18, no. 2 (2012): 271–92. http://dx.doi.org/10.1007/s11036-012-0392-0.
Texte intégralŻal, Mariusz, Marek Michalski, and Piotr Zwierzykowski. "Implementation of a Lossless Moving Target Defense Mechanism." Electronics 13, no. 5 (2024): 918. http://dx.doi.org/10.3390/electronics13050918.
Texte intégralSun, Rongbo, Yuefei Zhu, Jinlong Fei, and Xingyu Chen. "A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive." Applied Sciences 13, no. 9 (2023): 5367. http://dx.doi.org/10.3390/app13095367.
Texte intégralTamba, Tua A., Bin Hu, and Yul Y. Nazaruddin. "On Event-Triggered Implementation of Moving Target Defense Control." IFAC-PapersOnLine 53, no. 2 (2020): 3539–44. http://dx.doi.org/10.1016/j.ifacol.2020.12.1727.
Texte intégralCai, Gui-lin, Bao-sheng Wang, Wei Hu, and Tian-zuo Wang. "Moving target defense: state of the art and characteristics." Frontiers of Information Technology & Electronic Engineering 17, no. 11 (2016): 1122–53. http://dx.doi.org/10.1631/fitee.1601321.
Texte intégralMullins, Tristen, Brandon Baggett, Todd Andel, and Todd McDonald. "Circuit-Variant Moving Target Defense for Side-Channel Attacks." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 219–26. http://dx.doi.org/10.34190/iccws.17.1.14.
Texte intégralShiva, Sajjan. "Automated Live Migration in OpenStack:A Moving Target Defense Solution." Journal of Computer Science Applications and Information Technology 2, no. 3 (2017): 1–5. http://dx.doi.org/10.15226/2474-9257/2/3/00119.
Texte intégralPARK, Taekeun, and Keewon KIM. "Strengthening Network-Based Moving Target Defense with Disposable Identifiers." IEICE Transactions on Information and Systems E105.D, no. 10 (2022): 1799–802. http://dx.doi.org/10.1587/transinf.2022edl8022.
Texte intégralPal, Partha, Richard Schantz, Aaron Paulos, and Brett Benyo. "Managed Execution Environment as a Moving-Target Defense Infrastructure." IEEE Security & Privacy 12, no. 2 (2014): 51–59. http://dx.doi.org/10.1109/msp.2013.133.
Texte intégralZhang, Hong-qi, Cheng Lei, De-xian Chang, and Ying-jie Yang. "Network moving target defense technique based on collaborative mutation." Computers & Security 70 (September 2017): 51–71. http://dx.doi.org/10.1016/j.cose.2017.05.007.
Texte intégralTian, Jue, Rui Tan, Xiaohong Guan, Zhanbo Xu, and Ting Liu. "Moving Target Defense Approach to Detecting Stuxnet-Like Attacks." IEEE Transactions on Smart Grid 11, no. 1 (2020): 291–300. http://dx.doi.org/10.1109/tsg.2019.2921245.
Texte intégralTan, Jinglei, Hui Jin, Hongqi Zhang, et al. "A survey: When moving target defense meets game theory." Computer Science Review 48 (May 2023): 100544. http://dx.doi.org/10.1016/j.cosrev.2023.100544.
Texte intégralLei, Cheng, Duo-he Ma, Hong-qi Zhang, and Li-ming Wang. "Moving Target Network Defense Effectiveness Evaluation Based on Change-Point Detection." Mathematical Problems in Engineering 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6391502.
Texte intégralTan, Jing-lei, Heng-wei Zhang, Hong-qi Zhang, et al. "Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model." Security and Communication Networks 2020 (June 9, 2020): 1–12. http://dx.doi.org/10.1155/2020/3151495.
Texte intégralCai, Gui-lin, Bao-sheng Wang, and Qian-qian Xing. "Game theoretic analysis for the mechanism of moving target defense." Frontiers of Information Technology & Electronic Engineering 18, no. 12 (2017): 2017–34. http://dx.doi.org/10.1631/fitee.1601797.
Texte intégralZhang, Huan, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo, and Bin Wu. "Strategy Selection for Moving Target Defense in Incomplete Information Game." Computers, Materials & Continua 62, no. 2 (2020): 763–86. http://dx.doi.org/10.32604/cmc.2020.06553.
Texte intégralMercado-Velazquez, Andres Aharhel, Ponciano Jorge Escamilla-Ambrosio, and Floriberto Ortiz-Rodriguez. "A Moving Target Defense Strategy for Internet of Things Cybersecurity." IEEE Access 9 (2021): 118406–18. http://dx.doi.org/10.1109/access.2021.3107403.
Texte intégralYoon, Seunghyun, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, and Hyuk Lim. "Attack Graph-Based Moving Target Defense in Software-Defined Networks." IEEE Transactions on Network and Service Management 17, no. 3 (2020): 1653–68. http://dx.doi.org/10.1109/tnsm.2020.2987085.
Texte intégralKanellopoulos, Aris, and Kyriakos G. Vamvoudakis. "A Moving Target Defense Control Framework for Cyber-Physical Systems." IEEE Transactions on Automatic Control 65, no. 3 (2020): 1029–43. http://dx.doi.org/10.1109/tac.2019.2915746.
Texte intégralNiakanlahiji, Amirreza, and Jafar Haadi Jafarian. "WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense." Security and Communication Networks 2019 (May 14, 2019): 1–13. http://dx.doi.org/10.1155/2019/2156906.
Texte intégralZangeneh, Vahid, and Mehdi Shajari. "A cost-sensitive move selection strategy for moving target defense." Computers & Security 75 (June 2018): 72–91. http://dx.doi.org/10.1016/j.cose.2017.12.013.
Texte intégralTorquato, Matheus, and Marco Vieira. "Moving target defense in cloud computing: A systematic mapping study." Computers & Security 92 (May 2020): 101742. http://dx.doi.org/10.1016/j.cose.2020.101742.
Texte intégralZhang, Huan, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo, and Bin Wu. "Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks." IEEE Access 7 (2019): 65982–95. http://dx.doi.org/10.1109/access.2019.2918319.
Texte intégralSong, Fei, Yu-Tong Zhou, Yu Wang, Tian-Ming Zhao, Ilsun You, and Hong-Ke Zhang. "Smart collaborative distribution for privacy enhancement in moving target defense." Information Sciences 479 (April 2019): 593–606. http://dx.doi.org/10.1016/j.ins.2018.06.002.
Texte intégralQian, Yaguan, Yankai Guo, Qiqi Shao, et al. "EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks." ACM Transactions on Privacy and Security 25, no. 3 (2022): 1–24. http://dx.doi.org/10.1145/3517806.
Texte intégralJin, Han Jun, and Feng Jiao Wang. "A Fast Algorithm Research of Moving Targets Detection Based on GPU." Advanced Materials Research 850-851 (December 2013): 776–79. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.776.
Texte intégralGao, Chungang, Yongjie Wang, and Xinli Xiong. "A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/3949292.
Texte intégralSong, Qun, Zhenyu Yan, and Rui Tan. "DeepMTD: Moving Target Defense for Deep Visual Sensing against Adversarial Examples." ACM Transactions on Sensor Networks 18, no. 1 (2022): 1–32. http://dx.doi.org/10.1145/3469032.
Texte intégralGao, Chungang, and Yongjie Wang. "Reinforcement learning based self-adaptive moving target defense against DDoS attacks." Journal of Physics: Conference Series 1812, no. 1 (2021): 012039. http://dx.doi.org/10.1088/1742-6596/1812/1/012039.
Texte intégral