Moving target defense in cloud computing: A systematic mapping study
M Torquato, M Vieira - Computers & Security, 2020 - Elsevier
Abstract Moving Target Defense (MTD) consists of applying system reconfiguration (eg, VM
migration, IP shuffling) to dynamically change the available attack surface. MTD makes use …
migration, IP shuffling) to dynamically change the available attack surface. MTD makes use …
Assessing the effectiveness of moving target defenses using security models
Cyber crime is a developing concern, where criminals are targeting valuable assets and
critical infrastructures within networked systems, causing a severe socio-economic impact …
critical infrastructures within networked systems, causing a severe socio-economic impact …
Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud
Due to the lightweight features, the combination of container technology and microservice
architecture makes container-based cloud environment more efficient and agile than VM …
architecture makes container-based cloud environment more efficient and agile than VM …
Static versus dynamic data information fusion analysis using DDDAS for cyber security trust
E Blasch, Y Al-Nashif, S Hariri - Procedia Computer Science, 2014 - Elsevier
Abstract Information fusion includes signals, features, and decision-level analysis over
various types of data including imagery, te xt, and cyber security detection. With the maturity …
various types of data including imagery, te xt, and cyber security detection. With the maturity …
Stretch out and compact: Workflow scheduling with resource abundance
Resource abundance is apparent in today's multi-core era. Workflow applications common
in science and engineering can take great advantage of such ample resource capacity. Yet …
in science and engineering can take great advantage of such ample resource capacity. Yet …
Scalable security models for assessing effectiveness of moving target defenses
Moving Target Defense (MTD) changes the attack surface of a system that confuses
intruders to thwart attacks. Various MTD techniques are developed to enhance the security …
intruders to thwart attacks. Various MTD techniques are developed to enhance the security …
DDDAS for attack detection and isolation of control systems
LF Combita, JA Giraldo, AA Cardenas… - Handbook of Dynamic …, 2018 - Springer
In the last decade, the security of control systems has become a research priority. Attack
detection, isolation and reconfiguration are necessary to maintain a control system safe …
detection, isolation and reconfiguration are necessary to maintain a control system safe …
Trust metrics in information fusion
E Blasch - Machine Intelligence and Bio-inspired Computation …, 2014 - spiedigitallibrary.org
Trust is an important concept for machine intelligence and is not consistent across many
applications. In this paper, we seek to understand trust from a variety of factors: humans …
applications. In this paper, we seek to understand trust from a variety of factors: humans …
Design and modeling of moving target defense in workflow-based applications
This paper analyzes the tradeoffs between performance and resilience against cyber attacks
of applications organized as workflows. The static nature of current workflows is a major …
of applications organized as workflows. The static nature of current workflows is a major …
A dynamic data-driven decision support for aquaculture farm closure
MS Shahriar, J McCulluch - Procedia Computer Science, 2014 - Elsevier
We present a dynamic data-driven decision support for aquaculture farm closure. In decision
support, we use machine learning techniques in predicting closures of a shellfish farm. As …
support, we use machine learning techniques in predicting closures of a shellfish farm. As …