1.
F. H. Abbasi, R. J. Harris, G. Moretti, A. Haider, and N. Anwar. Classification of malicious network streams using honeynets. In
Proceedings of the IEEE Conference on Global Communications (GLOBECOM 2012), pages 891–897, Anaheim, CA, USA, December 2012. IEEE.
2.
M. Albanese, S. Jajodia, A. Pugliese, and V. S. Subrahmanian. Scalable analysis of attack scenarios. In
Proceedings of the 16th European Symposium on Research in Computer Security (ESORICS 2011), pages 416–433, Leuven, Belgium, September 2011. Springer.
3.
M. Albanese, A. De Benedictis, S. Jajodia, and K. Sun. A moving target defense mechanism for manets based on identity virtualization. In
Proceedings of the 1st IEEE Conference on Communications and Network Security (IEEE CNS 2013), pages 278–286, Washington, DC, USA, October 2013. IEEE.
4.
M. Albanese, E. Battista, S. Jajodia, and V. Casola. Manipulating the attacker’s view of a system’s attack surface. In
Proceedings of the 2nd IEEE Conference on Communications and Network Security (IEEE CNS 2014), pages 472–480, San Francisco, CA, USA, October 2014.
5.
M. Albanese, E. Battista, and S. Jajodia. A deception based approach for defeating OS and service fingerprinting. In
Proceedings of the 3rd IEEE Conference on Communications and Network Security (IEEE CNS 2015), pages 253–261, Florence, Italy, September 2015.
6.
P. Auffret. SinFP, unification of active and passive operating system fingerprinting.
Journal in Computer Virology, 6(3):197–205, August 2010.
8.
V. Casola, A. De Benedictis, and M. Albanese. A moving target defense approach for protecting resource-constrained distributed devices. In
Proceedings of the 14th International Conference on Information Reuse and Integration (IEEE IRI 2013), pages 22–29, San Francisco, CA, USA, August 2013.
9.
V. Casola, A. De Benedictis, and M. Albanese.
Integration of Reusable Systems, chapter A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices. Advances in Intelligent and Soft Computing. Springer, 2013.
10.
C.-M. Chen, S.-T. Cheng, and R.-Y. Zeng. A proactive approach to intrusion detection and malware collection.
Security and Communication Networks, 6(7):844–853, July 2013.
11.
Q. Duan, E. Al-Shaer, and H. Jafarian. Efficient random route mutation considering flow and network constraints. In
Proceedings of the 1st IEEE Conference on Communications and Network Security (IEEE CNS 2013), pages 260–268, Washington, DC, USA, October 2013. IEEE.
12.
M. Dunlop, S. Groat, R. Marchany, and J. Tront. Implementing an IPv6 moving target defense on a live network. In
Proceedings of the National Moving Target Research Symposium, Annapolis, MD, USA, June 2012.
13.
Executive Office of the President, National Science and Technology Council. Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program.
http://www.whitehouse.gov/, December 2011.
15.
J. H. Jafarian, E. Al-Shaer, and Q. Duan. OpenFlow random host mutation: Transparent moving target defense using software defined networking. In
Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks (HotSDN 2012), pages 127–132, Helsinki, Finland, August 2012. ACM.
16.
S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, editors.
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, volume 54 of
Advances in Information Security. Springer, 1st edition, 2011.
17.
G. F. Lyon.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure, 2009.
18.
P. K. Manadhata and J. M. Wing. An attack surface metric.
IEEE Transactions on Software Engineering, 37(3):371–386, May 2011.
20.
G. Shu and D. Lee. Network protocol system fingerprinting - a formal approach. In
Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM 2006). IEEE, April 2006.
21.
C. Trowbridge. An overview of remote operating system fingerprinting. SANS Institute InfoSec Reading Room, July 2003.
22.
D. Watson, M. Smart, G. R. Malan, and F. Jahanian. Protocol scrubbing: Network security through transparent flow modification.
IEEE/ACM Transactions on Networking, 12(2): 261–273, April 2004.