Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
MTD, where art thou? A systematic review of moving target defense techniques for IoT
Context: Internet-of-Things (IoT) systems are increasingly deployed in the real world, but
their security lags behind the state of the art of non-IoT systems. Moving target defense …
their security lags behind the state of the art of non-IoT systems. Moving target defense …
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes
Abstract Moving Target Defense (MTD) has emerged as a game changer to reverse the
asymmetric situation between attackers and defenders, and as one of the most effective …
asymmetric situation between attackers and defenders, and as one of the most effective …
Moving target defense in cloud computing: A systematic map** study
Abstract Moving Target Defense (MTD) consists of applying system reconfiguration (eg, VM
migration, IP shuffling) to dynamically change the available attack surface. MTD makes use …
migration, IP shuffling) to dynamically change the available attack surface. MTD makes use …
A survey on moving target defense: Intelligently affordable, optimized and self-adaptive
R Sun, Y Zhu, J Fei, X Chen - Applied Sciences, 2023 - mdpi.com
Represented by reactive security defense mechanisms, cyber defense possesses a static,
reactive, and deterministic nature, with overwhelmingly high costs to defend against ever …
reactive, and deterministic nature, with overwhelmingly high costs to defend against ever …
[HTML][HTML] A hierarchical modeling and analysis framework for availability and security quantification of IoT infrastructures
TA Nguyen, D Min, E Choi - Electronics, 2020 - mdpi.com
Modeling a complete Internet of Things (IoT) infrastructure is crucial to assess its availability
and security characteristics. However, modern IoT infrastructures often consist of a complex …
and security characteristics. However, modern IoT infrastructures often consist of a complex …
A Systematic Analysis of Security Metrics for Industrial Cyber–Physical Systems
Nowadays, as the cyber-threat landscape is evolving and digital assets are proliferating and
becoming more and more interconnected with the internet and heterogeneous devices, it is …
becoming more and more interconnected with the internet and heterogeneous devices, it is …
A cost-effective shuffling method against ddos attacks using moving target defense
Moving Target Defense (MTD) has emerged as a newcomer into the asymmetric field of
attack and defense, and shuffling-based MTD has been regarded as one of the most …
attack and defense, and shuffling-based MTD has been regarded as one of the most …
Dynamic security metrics for software-defined network-based moving target defense
We propose a suite of dynamic security metrics that timely, dynamically, and adaptively
assess the effectiveness of the software-defined network (SDN)-based moving target …
assess the effectiveness of the software-defined network (SDN)-based moving target …
[HTML][HTML] Graph4: A security monitoring architecture based on data plane anomaly detection metrics calculated over attack graphs
The correct and efficient measurement of security properties is key to the deployment of
effective cyberspace protection strategies. In this work, we propose GRAPH4, which is a …
effective cyberspace protection strategies. In this work, we propose GRAPH4, which is a …