{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:52:04Z","timestamp":1730317924254,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UT-Battelle \/ Oak Ridge National Laboratory","award":["4000135337"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2808475.2808484","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"31-35","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Characterizing Network-Based Moving Target Defenses"],"prefix":"10.1145","author":[{"given":"Marc","family":"Green","sequence":"first","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"given":"Douglas C.","family":"MacFarland","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"given":"Doran R.","family":"Smestad","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"given":"Craig A.","family":"Shue","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.006"},{"first-page":"183","volume-title":"Symposium on Object-Oriented Real-Time Distributed Computing","year":"2003","author":"Atighetchi M.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018466"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"e_1_3_2_1_5_1","unstructured":"L. Ge W. Yu D. Shen G. Chen K. Pham E. Blasch and C. Lu. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD). In SPIE Defense L. Ge W. Yu D. Shen G. Chen K. Pham E. Blasch and C. Lu. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD). In SPIE Defense"},{"key":"e_1_3_2_1_6_1","unstructured":"Security pages 90850Q--90850Q. International Society for Optics and Photonics 2014. Security pages 90850Q--90850Q. International Society for Optics and Photonics 2014."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932214"},{"issue":"6","key":"e_1_3_2_1_9_1","first-page":"12","article-title":"Port knocking from the inside out","volume":"12","author":"Krzywinski M.","year":"2003","journal-title":"SysAdmin Magazine"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675011"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.137"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499926.2499928"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185376.2185386"},{"volume-title":"National Symposium on Moving Target Research","year":"2012","author":"Zhuang R.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.07.032"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the Second ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808475.2808484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T02:46:23Z","timestamp":1672973183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808475.2808484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":18,"alternative-id":["10.1145\/2808475.2808484","10.1145\/2808475"],"URL":"https:\/\/doi.org\/10.1145\/2808475.2808484","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}