Abstract is missing.
- Session details: Session 1: Evaluation of MTD Techniques [doi]
- Session details: Session 2: Novel MTD Frameworks and Techniques [doi]
- Session details: Session 3: Protection of Critical Services against Advanced Threats [doi]
- Session details: Keynote [doi]
- Quantifying the Effectiveness of Software Diversity using Near-Duplicate Detection AlgorithmsJoel Coffman, Aurin Chakravarty, Joshua A. Russo, Andrew S. Gearhart. 1-10 [doi]
- Comprehensive Security Assessment of Combined MTD Techniques for the CloudHooman Alavizadeh, Jin B. Hong, Julian Jang-Jaccard, Dong Seong Kim. 11-20 [doi]
- Analysis of Concurrent Moving Target DefensesWarren Connell, Luan Huy Pham, Samuel Philip. 21-30 [doi]
- Catch Me If You Can: Dynamic Concealment of Network EntitiesDaniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten. 31-39 [doi]
- Cloxy: A Context-aware Deception-as-a-Service Reverse Proxy for Web ServicesDaniel Fraunholz, Daniel Reti, Simon Duque Antón, Hans Dieter Schotten. 40-47 [doi]
- A Security SLA-Driven Moving Target Defense Framework to Secure Cloud ApplicationsValentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano. 48-56 [doi]
- Dynamic Defense against Adaptive and Persistent AdversariesRadha Poovendran. 57-58 [doi]
- A Secure Hash Commitment Approach for Moving Target Defense of Security-critical ServicesDieudonne Mulamba, Athith Amarnath, Bruhadeshwar Bezawada, Indrajit Ray. 59-68 [doi]
- Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent ThreatsZhan Shu, Guanhua Yan. 69-79 [doi]
- In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS AttacksFida Gillani, Ehab Al-Shaer, Qi Duan. 80-89 [doi]