ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
5
views
10
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,258
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Effectiveness of Moving Target Defenses
other
Author(s):
David Evans
,
Anh Nguyen-Tuong
,
John Knight
Publication date
(Online):
August 5 2011
Publisher:
Springer New York
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Special feature: Decolonising the School Curriculum
Most cited references
10
Record
: found
Abstract
: not found
Conference Proceedings
: not found
On the effectiveness of address-space randomization
Hovav Shacham
,
Matthew Page
,
Ben Pfaff
…
(2004)
0
comments
Cited
44
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Randomized instruction set emulation to disrupt binary code injection attacks
Trek Palmer
,
Dino Zovi
,
Darko Stefanovic
…
(2003)
0
comments
Cited
15
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Randomized instruction set emulation
Elena Barrantes
,
Darko Stefanovic
,
Stephanie Forrest
…
(2005)
0
comments
Cited
11
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2011
Publication date (Online):
August 5 2011
Pages
: 29-48
DOI:
10.1007/978-1-4614-0977-9_2
SO-VID:
30d0a0f6-444a-4761-b6f3-10a1f9b1397a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
A Formal Model for a System’s Attack Surface
pp. 29
Effectiveness of Moving Target Defenses
pp. 49
Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution
pp. 77
Compiler-Generated Software Diversity
pp. 99
Symbiotes and defensive Mutualism: Moving Target Defense
pp. 109
Manipulating Program Functionality to Eliminate Security Vulnerabilities
pp. 117
End-to-End Software Diversification of Internet Services
pp. 131
Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services
pp. 153
Toward Network Configuration Randomization for Moving Target Defense
pp. 161
Configuration Management Security in Data Center Environments
Similar content
4,258
Disorganized attachment and defense: exploring John Bowlby’s unpublished reflections
Authors:
Samantha Reisz
,
Robbie Duschinsky
,
Daniel Siegel
Grapevine Stimulation: A Multidisciplinary Approach to Investigate the Effects of Biostimulants and a Plant Defense Stimulator.
Authors:
Enora Bodin
,
Anthony Bellée
,
Marie-Cécile Dufour
…
Real‐time magnetic resonance imaging in pediatric radiology—new approach to movement and moving children
Authors:
FW Hirsch
,
J. FRAHM
,
I Sorge
…
See all similar
Cited by
7
Moving Target Defense Techniques: A Survey
Authors:
Xiao‐Hu Liu
,
Cheng Lei
,
Hong-Qi Zhang
…
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds
Authors:
Yulong Zhang
,
Min Li
,
Kun Bai
…
Defense on the Move: Ant-Based Cyber Defense
Authors:
Errin W. Fulp
,
A. David McKinnon
,
Jereme N. Haack
…
See all cited by