An Autonomic Framework for Integrating Security and Quality of Service Support in Databases, 2012 IEEE Sixth International Conference on Software Security and Reliability, pp.51-60, 2012. ,
DOI : 10.1109/SERE.2012.15
SQLrand: Preventing SQL Injection Attacks, Proceedings of the 2nd International Conference on Applied Cryptography and Network Security, pp.292-302, 2004. ,
DOI : 10.1007/978-3-540-24852-1_21
URL : http://www1.cs.columbia.edu/~angelos/Papers/sqlrand.pdf
Analysis of network address shuffling as a moving target defense, 2014 IEEE International Conference on Communications (ICC), pp.701-706, 2014. ,
DOI : 10.1109/ICC.2014.6883401
Reduced Recursive Inclusion-exclusion Principle for the probability of union events, 2014 IEEE International Conference on Industrial Engineering and Engineering Management, pp.11-13, 2014. ,
DOI : 10.1109/IEEM.2014.7058590
Quantification of moving target cyber defenses, Proceedings of SPIE Defense + Security 2015, 2015. ,
DOI : 10.1117/12.2182176
Writing Secure Code, 2002. ,
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers, Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, pp.69-78, 2014. ,
DOI : 10.1109/PADS.2005.24
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security, 2011. ,
DOI : 10.1007/978-1-4614-0977-9
Managing Cyber Threats: Issues, Approaches, and Challenges, Massive Computing Topological Analysis of Network Attack Vulnerability, pp.247-266, 2005. ,
Nonlinear optimization using the generalized reduced gradient method, Revue fran??aise d'automatique, informatique, recherche op??rationnelle. Recherche op??rationnelle, vol.8, issue.V3, pp.73-103, 1974. ,
DOI : 10.1051/ro/197408V300731
Survey of cyber moving targets, 2013. ,
On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.298-307, 2004. ,
DOI : 10.1145/1030083.1030124
Quantifying & minimizing attack surfaces containing moving target defenses, 2015 Resilience Week (RWS), 2015. ,
DOI : 10.1109/RWEEK.2015.7287449
An Attack Graph-Based Probabilistic Security Metric, Proceedings of the 22nd IFIP Annual Conference on Data and Applications Security and Privacy, pp.283-296, 2008. ,
DOI : 10.1007/11805588_9
URL : http://people.cis.ksu.edu/~halmohri/files/An Attack Graph-Based Probabilistic Security Metric.pdf
A Quantitative Framework for Moving Target Defense Effectiveness Evaluation, Proceedings of the Second ACM Workshop on Moving Target Defense, MTD '15, pp.3-10, 2015. ,
DOI : 10.1145/2663474.2663481