共 11 条
[1]
Alhebaishi Nawaf., 2016, INT S FDN PRACTICE S, P302
[2]
Ansiry Zakaria Wira Zanoramy, 2012, Proceedings of the 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT), P696
[3]
Chisnall David., 2008, DEFINITIVE GUIDE XEN
[4]
Franklin J, 2014, NISTIR7946
[5]
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
[J].
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN),
2014,
:515-526
[6]
Peng W, 2014, IEEE ICC, P804, DOI 10.1109/ICC.2014.6883418
[7]
Ristenpart T, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P199
[9]
Sun K., 2014, Protecting Enterprise Networks through Attack Surface Expansion, P29
[10]
Szefer J, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P401