T. R AndelL. N WhitehurstJ. T McDonald 2014 Software security and randomization through program partitioning and circuit variation Proceedings of the 1st ACM Workshop on Moving Target Defense ACM
E Barrantes 2003 Randomized instruction set emulation to disrupt binary code injection attacks Proceedings of the 10th ACM Conference on Computer and Communications Security ACM
C CadarP AkritidisM CostaJ MartinM Castro 2008 Data randomization MS Research. Available from http://research. microsoft.com/apps/pubs/default.aspx?id=70626 Sep 23 2014
M DunlopS GroatW UrbanskiR MarchanyJ Tront 2011 MT6D: A moving target IPv6 defense IEEE Military Communications Conference (MILCOM 2011 1321 1326
EOP NSTC 2011 Trustworthy cyberspace: strategic plan for the federal cybersecurity research and development program Available from http://www.whitehouse.gov/sites/default/ files/microsites/ostp/fed_cybersecurity_rd_strate gic_plan_2011.pdf March 19 2015
D JohnR SmithW TurkettD Canas, and E Fulp 2014 Evolutionary based moving target cyber defense Proceedings of the 2014 Conference Companion on Genetic and Evolutionary Computation Companion ACM 1261 1268
R. L Krutz 2005 Securing SCADA Systems New York Wiley Publishing
H ShachamM PageB PfaffE GohN ModaduguD Boneh 2004 On the effectiveness of address-space randomization Proceedings of the 11th ACM Conference on Computer and Comm Security ACM 298 307
M Yampolskiy 2015 A language for describing attacks on cyber-physical systems Int. J. Critical Infrastruct. Protection 8 40 52