[1] Cybersecurity Game-Change Research & Development Recommendations. NITRD CSIA IWG[EB/OL]. http://www.nitrd.gov/pubs/CSIA_IWG_Cybersecurity_GameChange_RD_Recommendations_20100513.pdf. [2] Pratyusa K.Manadhata, Jeannette M.Wing. A Formal Model for a System’s Attack Surface. S.Jajodia et al. (eds.). Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats[J]. Advances in Information Security 54,doi:10.1007/978-1-4614-0977-9_1, Springer Science+Business Media,LLC 2011. pp1-28. [3] Shacham, H., Page, M., Pfaff, B. On the Effectiveness of Address-Space Randomization[C]. Proceedings of the 11th ACM conference on Computer and communications security, pp 298-307, 2004. [4] Todd Jackson, Babak Salamat, Andrei Homescu, ea al. Compiler-Generated Software Diversity. S.Jajodia et al. (eds.). Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats[J]. Advances in Information Security 54,doi:10.1007/978-1-4614-0977-9_1, Springer Science+Business Media,LLC 2011. pp77-98. [5] Mihai Christodorescu, Matthew Fredrikson, Somesh Jha, ea al. End-to-End Software Diversification of Internet Services. S.Jajodia et al. (eds.). Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats[J]. Advances in Information Security 54,doi:10.1007/978-1-4614-0977-9_1, Springer Science+Business Media,LLC 2011. pp117-130. [6] Justin Yackoski, Harry Bullen, Xiang Yu, ea al. Applying Self-Shielding Dynamics to the Network Architecture. S.Jajodia et al. (eds.).Moving Target Defense II: Application of Game Theory and Adversarial Modeling[J]. Advances in Information Security 100,doi:10.1007/978-1-4614-5416-8_6, Springer Science+Business Media New York 2013. pp 97-116. |