{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:32Z","timestamp":1771699832438,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":22,"publisher":"Springer New York","isbn-type":[{"value":"9781461454151","type":"print"},{"value":"9781461454168","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T00:00:00Z","timestamp":1345680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-5416-8_5","type":"book-chapter","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T22:16:40Z","timestamp":1347920200000},"page":"87-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cyber Maneuver Against External Adversaries and Compromised Nodes"],"prefix":"10.1007","author":[{"given":"Don","family":"Torrieri","sequence":"first","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,23]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, Springer Advances in Information Security Series, vol. 54, 2011.","DOI":"10.1007\/978-1-4614-0977-9"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"P. Beraud, A. Cruz, S. Hassell, and S. Meadows, \u201cUsing cyber maneuver to improve network resiliency,\u201d Proc. IEEE Military Commun.Conf. (MILCOM). The work of Sushil Jajodia was performed while he was a Visiting Researcher at the US Army Research Laboratory, 2011.","DOI":"10.1109\/MILCOM.2011.6127449"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"J. V. Merwe, D. Dawoud, and S. McDonald, \u201cA survey on peer-to-peer key management for mobile ad hoc networks,\u201d ACM Computing Surveys, vol. 39, pp. 1\u201345, 2007.","DOI":"10.1145\/1216370.1216371"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"M. Nogueira, E. D. Silva, A. Santos, and L. C. P. Albini, \u201cSurvivable key management on WANETs,\u201d IEEE Wireless Commun., pp. 82\u201388, Dec. 2011.","DOI":"10.1109\/MWC.2011.6108337"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"D. Torrieri, Principles of Spread-Spectrum Communication Systems, 2nd ed., Springer, 2011.","DOI":"10.1007\/978-1-4419-9595-7"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"D. J. Torrieri, \u201cFundamental limitations on repeater jamming of frequency-hopping communications\u201d, IEEE J. Select. Areas Commun., vol. 7, pp. 569\u2013575, May 1989.","DOI":"10.1109\/49.17721"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, \u201cDenial of service Attacks in wireless networks: the case of jammers,\u201d IEEE Commun. Surveys Tuts, vol. 13, 2nd quarter, pp. 245\u2013257, 2011.","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Y.-S. Shiu, \u201cPhysical layer security in wireless networks: a tutorial,\u201d IEEE Wireless Commun., pp. 66\u201374, April 2011.","DOI":"10.1109\/MWC.2011.5751298"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"L. Lazos and M. Krunz, \u201cSelective jamming\/dropping insider attacks in wireless mesh networks,\u201d IEEE Network, Jan.\/Feb. 2011.","DOI":"10.1109\/MNET.2011.5687950"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, \u201cA survey on jamming and countermeasures in WSNs,\u201d IEEE Commun. Surveys Tuts., vol. 11, pp. 42\u201356, 4th quarter, 2009.","DOI":"10.1109\/SURV.2009.090404"},{"key":"5_CR11","unstructured":"W. Xu, K. Ma, W. Trappe, and Y. Zhang, \u201cJamming sensor networks: Attacks and defense strategies,\u201d IEEE Network, May\/June 2006."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"C. Popper, M. Strasser, S. Capkun, \u201cAnti-jamming broadcast communication using uncoordinated spread spectrum,\u201d IEEE J. Sel. Areas Commun., vol. 28, pp. 703\u2013715, June 2010.","DOI":"10.1109\/JSAC.2010.100608"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"J. T. Chiang and Y.-C. Hu, \u201cCross-layer jamming detection and mitigation in wireless broadcast networks,\u201d IEEE\/ACM Trans. Networking, vol. 19, pp. 286\u2013298, Feb. 2011.","DOI":"10.1109\/TNET.2010.2068576"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, et al., \u201cBroadcast anti-jamming systems,\u201d Elsevier Computer Networks, 2001.","DOI":"10.1016\/S1389-1286(00)00169-9"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"X. Jiang, W. Hu, S. Zhu, and G. Cao, \u201cCompromise-resilient anti-jamming for wireless sensor networks,\u201d Proc. Twelfth Intern. Conf. Inform. and Commun. Security (ICICS), 2010.","DOI":"10.1007\/978-3-642-17650-0_11"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"M. \u00c7akiro\u01e7lu, A. T. \u00d6zcerit, \u201cJamming detection mechanisms for wireless sensor networks,\u201d Proc. Third Intern. Conf. Scalable Inform. Systems, pp. 4:1\u20134:8, 2008.","DOI":"10.4108\/ICST.INFOSCALE2008.3484"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"M. Li, I. Koutsopoulos, R. Poovendran, \u201cOptimal jamming attacks and network defense policies in wireless sensor networks,\u201d Proc. 26th IEEE Intern. Conf. Computer Commun., pp. 1307\u20131315, 2007.","DOI":"10.1109\/INFCOM.2007.155"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"S. Misra, R. Singh, S. V. R. Mohan, \u201cInformation warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system,\u201d Sensors, vol. 10, pp. 3444\u20133479, 2010.","DOI":"10.3390\/s100403444"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"K. Pelechrinis, I. Koutsopoulos, I. Broustis, and S. V. Krishnamurthy, \u201cLightweight jammer localization in wireless networks: system design and implementation,\u201d Proc. Globecom Conf., 2009.","DOI":"10.1109\/GLOCOM.2009.5425405"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"D. Torrieri and K. Bakhru, \u201cDirection finding for spread-spectrum systems with adaptive arrays,\u201d Proc. IEEE Military Commun. Conf., 2006.","DOI":"10.1109\/MILCOM.2006.302469"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"H. Nguyen, T. Pongthawornkamol, and K. Nahrstedt, \u201cA novel approach to identify insider-based jamming attacks in multi-channel wireless networks,\u201d Proc. IEEE Military Commun.Conf. (MILCOM), 2009.","DOI":"10.1109\/MILCOM.2009.5379934"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"S. Reidt, M. Srivatsa, and S. Balfe, \u201cThe fable of the bees: Incentivizing robust revocation decision making in ad hoc networks,\u201d Proc. ACM Conf. Computer and Commun. Security (CCS), 2009.","DOI":"10.1145\/1653662.1653698"}],"container-title":["Advances in Information Security","Moving Target Defense II"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-5416-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T07:09:28Z","timestamp":1674112168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-5416-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,23]]},"ISBN":["9781461454151","9781461454168"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-5416-8_5","relation":{},"ISSN":["1568-2633"],"issn-type":[{"value":"1568-2633","type":"print"}],"subject":[],"published":{"date-parts":[[2012,8,23]]},"assertion":[{"value":"23 August 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}