skip to main content
10.1145/2660267.2660385acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
tutorial

MTD 2014: First ACM Workshop on Moving Target Defense

Published: 03 November 2014 Publication History

Abstract

Moving Target Defense (MTD) is emerging as a game changing approach consisting in a number of mechanisms that automatically change one or more system attributes in order to make a system's attack surface unpredictable to adversaries. The main objective of the First ACM Workshop on Moving Target Defense (MTD 2014) is to address the challenges of developing new MTD techniques and evaluating the effectiveness of MTD techniques with theoretical analysis and experimental results. This workshop aims to bring together researchers from academia, government, and industry to report on the latest research efforts on moving target defense,and to have productive discussion and constructive debate on this topic.

Cited By

View all
  • (2022)Moving Target Defense Techniques for the IoTIntelligent Security Management and Control in the IoT10.1002/9781394156030.ch11(267-292)Online publication date: Jul-2022
  • (2021)An evaluation method of internal network security defense ability based on device traffic2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)10.1109/ICPECA51329.2021.9362650(238-244)Online publication date: 22-Jan-2021
  • (2017)The Proactive Defense of Energy Internet Terminals Edge-Access Using the Network Topology AutoassociationIEEE Journal on Emerging and Selected Topics in Circuits and Systems10.1109/JETCAS.2017.27026457:3(432-446)Online publication date: Sep-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
November 2014
1592 pages
ISBN:9781450329576
DOI:10.1145/2660267
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2014

Check for updates

Author Tags

  1. algorithms
  2. design
  3. reliability
  4. security
  5. theory

Qualifiers

  • Tutorial

Conference

CCS'14
Sponsor:

Acceptance Rates

CCS '14 Paper Acceptance Rate 114 of 585 submissions, 19%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)2
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Moving Target Defense Techniques for the IoTIntelligent Security Management and Control in the IoT10.1002/9781394156030.ch11(267-292)Online publication date: Jul-2022
  • (2021)An evaluation method of internal network security defense ability based on device traffic2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)10.1109/ICPECA51329.2021.9362650(238-244)Online publication date: 22-Jan-2021
  • (2017)The Proactive Defense of Energy Internet Terminals Edge-Access Using the Network Topology AutoassociationIEEE Journal on Emerging and Selected Topics in Circuits and Systems10.1109/JETCAS.2017.27026457:3(432-446)Online publication date: Sep-2017
  • (2015)A Quantitative Framework for Moving Target Defense Effectiveness EvaluationProceedings of the Second ACM Workshop on Moving Target Defense10.1145/2808475.2808476(3-10)Online publication date: 12-Oct-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media