Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
Moving target defense: state of the art and characteristics
G Cai, B Wang, W Hu, T Wang - Frontiers of Information Technology & …, 2016 - Springer
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the
asymmetric situation between attacks and defenses in cyber-security. Numerous related …
asymmetric situation between attacks and defenses in cyber-security. Numerous related …
[HTML][HTML] Dynamic defenses in cyber security: Techniques, methods and challenges
Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022 - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other
emerging technologies, the connotation of cyberspace is constantly expanding and …
emerging technologies, the connotation of cyberspace is constantly expanding and …
Attack graph-based moving target defense in software-defined networks
Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …
A survey on the moving target defense strategies: An architectural perspective
As the complexity and the scale of networks continue to grow, the management of the
network operations and security defense has become a challenging task for network …
network operations and security defense has become a challenging task for network …
Mimic defense: a designed‐in cybersecurity defense framework
H Hu, J Wu, Z Wang, G Cheng - IET Information Security, 2018 - Wiley Online Library
In recent years, both academia and industry in cyber security have tried to develop
innovative defense technologies, expecting that to change the rules of the game between …
innovative defense technologies, expecting that to change the rules of the game between …
Resource-aware detection and defense system against multi-type attacks in the cloud: Repeated bayesian stackelberg game
Cloud-based systems are subject to various attack types launched by Virtual Machines
(VMs) manipulated by attackers having different goals and skills. The existing detection and …
(VMs) manipulated by attackers having different goals and skills. The existing detection and …
DIVERGENCE: Deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework
Reinforcement learning (RL) is a promising approach for intelligent agents to protect a given
system under highly hostile environments. RL allows the agent to adaptively make …
system under highly hostile environments. RL allows the agent to adaptively make …
Attack surface definitions: A systematic literature review
Abstract Context Michael Howard conceptualized the attack surface of a software system as
a metaphor for risk assessment during the development and maintenance of software. While …
a metaphor for risk assessment during the development and maintenance of software. While …
A network coding and DES based dynamic encryption scheme for moving target defense
Unlike prior efforts in cybersecurity research, a dynamic defense theory, called moving target
defense, increases the complexity and costs for attacks by effectively restricting the …
defense, increases the complexity and costs for attacks by effectively restricting the …