Abstract | ||
---|---|---|
Moving-target technologies can significantly raise the bar for attackers even without requiring that the distribution of vulnerabilities in the underlying systems be reduced. These techniques should be essential tools for every system architect. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/MSP.2014.29 | IEEE Security & Privacy |
Keywords | Field | DocType |
Special issues and sections,Target tracking,Tracking,Visual databases,Computer architecture,Computer security,Computer crashes,Cyberspace,Computer crime | World Wide Web,Computer science,Computer security,System Architect,Cyberspace,Vulnerability | Journal |
Volume | Issue | ISSN |
12 | 2 | 1540-7993 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Luanne Goldrich | 1 | 2 | 0.92 |
Carl E. Landwehr | 2 | 2783 | 406.03 |