Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
Moving target defense techniques: A survey
C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …
moving target defense research has become one of the hot spots. In order to gain better …
SoK: Automated software diversity
P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …
currently deployed defenses and the transition to online software distribution (the" App store" …
Missing the point (er): On the effectiveness of code pointer integrity
I Evans, S Fingeret, J Gonzalez… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Memory corruption attacks continue to be a major vector of attack for compromising modern
systems. Numerous defenses have been proposed against memory corruption attacks, but …
systems. Numerous defenses have been proposed against memory corruption attacks, but …
Moving target defense: state of the art and characteristics
G Cai, B Wang, W Hu, T Wang - Frontiers of Information Technology & …, 2016 - Springer
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the
asymmetric situation between attacks and defenses in cyber-security. Numerous related …
asymmetric situation between attacks and defenses in cyber-security. Numerous related …
Information leaks without memory disclosures: Remote side channel attacks on diversified code
J Seibert, H Okhravi, E Söderström - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Code diversification has been proposed as a technique to mitigate code reuse attacks,
which have recently become the predominant way for attackers to exploit memory corruption …
which have recently become the predominant way for attackers to exploit memory corruption …
[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
A survey on the moving target defense strategies: An architectural perspective
As the complexity and the scale of networks continue to grow, the management of the
network operations and security defense has become a challenging task for network …
network operations and security defense has become a challenging task for network …
Mimic defense: a designed‐in cybersecurity defense framework
H Hu, J Wu, Z Wang, G Cheng - IET Information Security, 2018 - Wiley Online Library
In recent years, both academia and industry in cyber security have tried to develop
innovative defense technologies, expecting that to change the rules of the game between …
innovative defense technologies, expecting that to change the rules of the game between …
A survey on cyber-resilience approaches for cyber-physical systems
M Segovia-Ferreira, J Rubio-Hernan, A Cavalli… - ACM Computing …, 2024 - dl.acm.org
Concerns for the resilience of Cyber-Physical Systems (CPS) s in critical infrastructure are
growing. CPS integrate sensing, computation, control, and networking into physical objects …
growing. CPS integrate sensing, computation, control, and networking into physical objects …