CONCEAL: A Strategy Composition for Resilient Cyber Deception: Framework, Metrics, and Deployment
- 3 January 2019
- book chapter
- other
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Multi-dimensional Host Identity Anonymization for Defeating Skilled AttackersPublished by Association for Computing Machinery (ACM) ,2016
- An Effective Address Mutation Approach for Disrupting Reconnaissance AttacksIEEE Transactions on Information Forensics and Security, 2015
- Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated AttackersPublished by Association for Computing Machinery (ACM) ,2014
- OpenDaylight: Towards a Model-Driven SDN Controller architecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- Openflow random host mutationPublished by Association for Computing Machinery (ACM) ,2012
- Toward Network Configuration Randomization for Moving Target DefensePublished by Springer Science and Business Media LLC ,2011
- Defending against hitlist worms using network address space randomizationComputer Networks, 2007
- Honeypots: why we need a dynamics honeypots?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Dynamic approaches to thwart adversary intelligence gatheringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A Computing Procedure for Quantification TheoryJournal of the ACM, 1960