The Community for Technology Leaders
Green Image
Issue No. 02 - Mar.-Apr. (vol. 12)
ISSN: 1540-7993

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2

Masthead (PDF)

pp. 5

Moving Target [Guest editors' introduction] (HTML)

Luanne Goldrich , Johns Hopkins University Applied Physics Laboratory
Carl E. Landwehr , George Washington University
pp. 14-15

Finding Focus in the Blur of Moving-Target Techniques (Abstract)

Hamed Okhravi , MIT Lincoln Laboratory
Thomas Hobson , MIT Lincoln Laboratory
David Bigelow , MIT Lincoln Laboratory
William Streilein , MIT Lincoln Laboratory
pp. 16-26

Security through Diversity: Are We There Yet? (Abstract)

Per Larsen , University of California, Irvine
Stefan Brunthaler , University of California, Irvine
Michael Franz , University of California, Irvine
pp. 28-35

Defense on the Move: Ant-Based Cyber Defense (Abstract)

Glenn A. Fink , Pacific Northwest National Laboratory
Jereme N. Haack , Pacific Northwest National Laboratory
A. David McKinnon , Pacific Northwest National Laboratory
Errin W. Fulp , Wake Forest University
pp. 36-43

Countering Intelligent Jamming with Full Protocol Stack Agility (Abstract)

Cherita Corbett , Johns Hopkins University Applied Physics Laboratory
Jason Uher , Johns Hopkins University Applied Physics Laboratory
Jarriel Cook , Johns Hopkins University Applied Physics Laboratory
Angela Dalton , Johns Hopkins University Applied Physics Laboratory
pp. 44-50

Managed Execution Environment as a Moving-Target Defense Infrastructure (Abstract)

Partha Pal , Raytheon BBN Technologies
Richard Schantz , Raytheon BBN Technologies
Aaron Paulos , Raytheon BBN Technologies
Brett Benyo , Raytheon BBN Technologies
pp. 51-59

Authenticated Encryption: Toward Next-Generation Algorithms (Abstract)

Diana Maimut , École Normale Supérieure
Reza Reyhanitabar , École Polytechnique Fédérale de Lausanne
pp. 70-72

Moving-Target Defenses for Computer Networks (Abstract)

Marco Carvalho , Florida Institute of Technology
Richard Ford , Florida Institute of Technology
pp. 73-76

Caller ID: Whose Privacy? (Abstract)

Michael Lesk , Rutgers University
pp. 77-79

Metadata = Surveillance (HTML)

Bruce Schneier , Co3 Systems
pp. 84
92 ms
(Ver 3.3 (11022016))