نتایج جستجو برای: moving target detector mtd

تعداد نتایج: 550611  

2011
J. M. Kantor S. K. Davis

Journal: :Journal of Systems Architecture 2022

Memory corruption attacks such as code injection, reuse, and non-control data have become widely popular for compromising safety-critical Cyber–Physical Systems (CPS). Moving target defense (MTD) techniques instruction set randomization (ISR), address space (ASR), (DSR) can be used to protect systems against attacks. CPS often use time-triggered architectures guarantee predictable reliable oper...

Journal: :IEEE Access 2021

Crossfire is an indirect target area link-flooding Distributed Denial of Service (DDoS) attack determined to affect the neighbors real target. Currently, DDoS attacks are acquiring impetus because their indistinguishability and undetectability. SDN (Software Defined Networking) a progressing technique its adaptability programmability. Moving Target Defense (MTD) arising security strategy counte...

2015
Bradley Schmerl Javier Camara Gabriel Moreno David Garlan Andrew O. Mellinger Javier Cámara Gabriel A. Moreno Andrew Mellinger

The fundamental premise behind Moving Target Defense (MTD) is to create a dynamic and shifting system that is more difficult to attack than a static system because a constantly changing attack surface at least reduces the chance of an attacker finding and exploiting the weakness. However, MTD approaches are typically chosen without regard to other qualities of the system, such as performance or...

2004
Gert Brunekreeft

Driven by fear of underinvestment in network assets, merchant investment in electricity transmission networks (MTI) is now legally allowed. Given that MTI is a real possibility, regulators face a new set of questions. After classifying different types of MTI, the paper raises and analyses regulatory questions, concentrating on the effect on competition, ownership questions, third-party-access r...

2017
Sailik Sengupta

Modern day technology has found its way into every aspect of our lives– be it the server storing our social information, the hand-held smartphones, the home security systems or a remotely monitored pacemaker. Unfortunately, this also increases the opportunity for agents with malicious intent to violate the privacy, availability or integrity of these applications. In fact, with the advancement o...

Journal: :IET cyber-physical systems 2021

A cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined. The authors demonstrate that it feasible use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), offer effective security. At the cyber layer, proposed solution based on...

Journal: :Remote Sensing 2021

Video synthetic aperture radar (VideoSAR) can detect and identify a moving target based on its shadow. A slowly has shadow with distinct features, but it cannot be detected by state-of-the-art difference-based algorithms because of minor variations between adjacent frames. Furthermore, the detection boxes generated often contain such defects as misalignments fracture. In light these problems, t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید