Moving target defense in cloud computing: A systematic mapping study

M Torquato, M Vieira - Computers & Security, 2020 - Elsevier
Abstract Moving Target Defense (MTD) consists of applying system reconfiguration (eg, VM
migration, IP shuffling) to dynamically change the available attack surface. MTD makes use …

Assessing the effectiveness of moving target defenses using security models

JB Hong, DS Kim - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Cyber crime is a developing concern, where criminals are targeting valuable assets and
critical infrastructures within networked systems, causing a severe socio-economic impact …

Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud

H Jin, Z Li, D Zou, B Yuan - IEEE Transactions on Dependable …, 2019 - ieeexplore.ieee.org
Due to the lightweight features, the combination of container technology and microservice
architecture makes container-based cloud environment more efficient and agile than VM …

Static versus dynamic data information fusion analysis using DDDAS for cyber security trust

E Blasch, Y Al-Nashif, S Hariri - Procedia Computer Science, 2014 - Elsevier
Abstract Information fusion includes signals, features, and decision-level analysis over
various types of data including imagery, te xt, and cyber security detection. With the maturity …

Stretch out and compact: Workflow scheduling with resource abundance

YC Lee, AY Zomaya - … Symposium on Cluster, Cloud, and Grid …, 2013 - ieeexplore.ieee.org
Resource abundance is apparent in today's multi-core era. Workflow applications common
in science and engineering can take great advantage of such ample resource capacity. Yet …

Scalable security models for assessing effectiveness of moving target defenses

JB Hong, DS Kim - 2014 44th Annual IEEE/IFIP International …, 2014 - ieeexplore.ieee.org
Moving Target Defense (MTD) changes the attack surface of a system that confuses
intruders to thwart attacks. Various MTD techniques are developed to enhance the security …

DDDAS for attack detection and isolation of control systems

LF Combita, JA Giraldo, AA Cardenas… - Handbook of Dynamic …, 2018 - Springer
In the last decade, the security of control systems has become a research priority. Attack
detection, isolation and reconfiguration are necessary to maintain a control system safe …

Trust metrics in information fusion

E Blasch - Machine Intelligence and Bio-inspired Computation …, 2014 - spiedigitallibrary.org
Trust is an important concept for machine intelligence and is not consistent across many
applications. In this paper, we seek to understand trust from a variety of factors: humans …

Design and modeling of moving target defense in workflow-based applications

S Alhozaimy, DA Menascé, M Albanese - Cluster Computing, 2024 - Springer
This paper analyzes the tradeoffs between performance and resilience against cyber attacks
of applications organized as workflows. The static nature of current workflows is a major …

A dynamic data-driven decision support for aquaculture farm closure

MS Shahriar, J McCulluch - Procedia Computer Science, 2014 - Elsevier
We present a dynamic data-driven decision support for aquaculture farm closure. In decision
support, we use machine learning techniques in predicting closures of a shellfish farm. As …