Injecting heterogeneity through protocol randomization (2007)

by Li Zhuang , J. Doug Tygar , Rachna Dhamija , Computer Science Division
Venue:0. We obtain Ui = M − c . Because c− bc � � pL = bc b − pL
Citations:2 - 0 self

Documents Related by Co-Citation

20 Towards Security in an Open Systems Federation – John A. Bull, Li Gong, Karen R. Sollins - 1992
12 Cyberinsecurity: The cost of monopoly. How the dominance of Microsoft’s products poses a risk to society, 2003. Available from Computer & Communications Industry Association at http://www. – D Geer, C Pfleeger, B Schneier, J Quarterman, P Metzger, R Bace, P Gutmann
5 Nearly one in four computer users have lost content to blackouts, viruses and hackers according to new national survey, 2001. site.zhtml?ticker=iom&script=410&layout= -6&item_id=163653 – Bruskin Research
4 The “I Love You” computer virus and the financial services industry – S Malphrus - 2000
2 Online safety study, October 2004. Available at: downloads/safety_study_v04.pdf – AOLNSCA
2 On software diversification, correlated failures and risk management – P Chen, G Kataria, R Krishnan - 2006
17 Near rationality and competitive equilibria in networked systems – Nicolas Christin, Jens Grossklags, John Chuang - 2004
10 Do we detect and exploit mixed strategy play by opponents – Jason Shachat, J. Todd Swarthout - 2004
14 The economics of resisting censorship – G DANEZIS, R ANDERSON
12 Returns to information security investment: The effect of alternative security breach functions on optimal investment and sensitivity to vulnerability", Information Systems Front, Vol 8 – K Hausken - 2006
14 An experiment on learning with limited information: Nonconvergence, experimentation cascades, and the advantage of being slow – Eric Friedman, Mikhael Shor, Scott Shenker, Barry Sopher
28 On achieving software diversity for improved network security using distributed coloring algorithms – Adam J. O’donnell - 2004
54 The economics of information security – Ross Anderson, Tyler Moore - 2006
12 T.: Network software security and user incentives – Terrence August, Tunay I. Tunca, Sunil Kumar, Howard Kunreuther, Haim Mendelson, Jim Patell, Hal Varian, Larry Wein, Jin Whang, Muhamet Yildiz - 2006
135 2002a) “The Economics of Information Security Investment – L A Gordon, M P Loeb
66 System Reliability and Free Riding – Hal R. Varian
24 Economics of alliances: The lessons for collective action – Todd Sandler, Keith Hartley - 2001
76 The ghost in the browser: Analysis of web-based malware – Niels Provos, Dean Mcnamee, Panayiotis Mavrommatis, Ke Wang, Nagendra Modadugu, Google Inc - 2007
88 An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants – J Franklin, V Paxson, A Perrig, S Savage - 2007