{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:02:17Z","timestamp":1725620537236},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-11-C-0179"],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1038366, 1018703"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-12-1-0106"],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,8]]},"DOI":"10.1145\/2459976.2460040","type":"proceedings-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T19:39:39Z","timestamp":1364845179000},"page":"1-4","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Mission-oriented moving target defense based on cryptographically strong network dynamics"],"prefix":"10.1145","author":[{"given":"Justin","family":"Yackoski","sequence":"first","affiliation":[{"name":"Intelligent Automation, Inc., Rockville, MD"}]},{"given":"Jason","family":"Li","sequence":"additional","affiliation":[{"name":"Intelligent Automation, Inc., Rockville, MD"}]},{"given":"Scott A.","family":"DeLoach","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS"}]},{"given":"Xinming","family":"Ou","sequence":"additional","affiliation":[{"name":"Kansas State University, Manhattan, KS"}]}],"member":"320","published-online":{"date-parts":[[2013,1,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sept.","author":"National Cyber Leap Year Summit 2009 co-chairs' report","year":"2009","unstructured":"National Cyber Leap Year Summit 2009 co-chairs' report , networking and information technology research and development. Technical report , Sept. 2009 . National Cyber Leap Year Summit 2009 co-chairs' report, networking and information technology research and development. Technical report, Sept. 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-007-9019-4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127498"},{"key":"e_1_3_2_1_4_1","volume-title":"National Symposium on Moving Target Research","author":"Zhuang R.","year":"2012","unstructured":"R. Zhuang , S. Zhang , S. A. DeLoach , X. Ou , and A. Singhal . Simulation-based approaches to studying effectiveness of moving-target network defense . In National Symposium on Moving Target Research , 2012 . R. Zhuang, S. Zhang, S. A. DeLoach, X. Ou, and A. Singhal. Simulation-based approaches to studying effectiveness of moving-target network defense. In National Symposium on Moving Target Research, 2012."}],"event":{"name":"CSIIRW '13: Cyber Security and Information Intelligence","sponsor":["Los Alamos National Labs Los Alamos National Labs","Sandia National Labs Sandia National Laboratories","DOE Department of Energy","Oak Ridge National Laboratory","Lawrence Livermore National Lab. Lawrence Livermore National Laboratory","BERKELEYLAB Lawrence National Berkeley Laboratory","Argonne Natl Lab Argonne National Lab","Idaho National Lab. Idaho National Laboratory","Pacific Northwest National Laboratory","Nevada National Security Site Nevada National Security Site"],"location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '13"},"container-title":["Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2459976.2460040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T16:46:26Z","timestamp":1673541986000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2459976.2460040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,8]]},"references-count":4,"alternative-id":["10.1145\/2459976.2460040","10.1145\/2459976"],"URL":"https:\/\/doi.org\/10.1145\/2459976.2460040","relation":{},"subject":[],"published":{"date-parts":[[2013,1,8]]},"assertion":[{"value":"2013-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}