{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:34Z","timestamp":1771699834082,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319047164","type":"print"},{"value":"9783319047171","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-04717-1_14","type":"book-chapter","created":{"date-parts":[[2014,2,17]],"date-time":"2014-02-17T16:53:51Z","timestamp":1392656031000},"page":"299-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices"],"prefix":"10.1007","author":[{"given":"Valentina","family":"Casola","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"De Benedictis","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,18]]},"reference":[{"key":"14_CR1","unstructured":"Executive Office of the President, National Science and Technology Council: Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program. http:\/\/www.whitehouse.gov\/. Accessed Dec 2011"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Ghosh, A.K., Subrahmanian, V.S., Swarup, V., Wang, C., Wang, X.S. (eds.): Moving target defense II: Application of game theory and adversarial modeling. 1st edn. Advances in Information Security, vol. 100, Springer, Berlin (2013)","DOI":"10.1007\/978-1-4614-5416-8"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.): Moving target defense: Creating asymmetric uncertainty for cyber threats. 1st edn. Advances in Information Security, vol. 54, Springer, Berlin (2011)","DOI":"10.1007\/978-1-4614-0977-9"},{"issue":"3","key":"14_CR4","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MNET.2006.1637932","volume":"20","author":"Q. Wang","year":"2006","unstructured":"Wang, Q., Zhu, Y., Cheng, L.: Reprogramming wireless sensor networks: challenges and approaches. IEEE Netw. 20(3), 48\u201355 (2006)","journal-title":"IEEE Netw."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Casola, V., De Benedictis, A., Albanese, M.: A moving target defense approach for protecting resource-constrained distributed devices. In: Proceedings of the 14th IEEE International Conference on Information Reuse and Integration (IEEE IRI 2013), San Francisco, CA, Aug\u00a02013","DOI":"10.1109\/IRI.2013.6642449"},{"issue":"3","key":"14_CR6","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TSE.2010.60","volume":"37","author":"P.K. Manadhata","year":"2011","unstructured":"Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Software Eng. 37(3), 371\u2013386 (2011)","journal-title":"IEEE Trans. Software Eng."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Evans, D., Nguyen-Tuong, A., Knight, J.C.: Effectiveness of moving target defenses. In: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, pp. 29\u201348. Springer, New York (2011)","DOI":"10.1007\/978-1-4614-0977-9_2"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: Proceedings of the 10th ACM conference on Computer and communications security. CCS \u201903, ACM, New York. pp. 272\u2013280 (2003)","DOI":"10.1145\/948109.948146"},{"key":"14_CR9","unstructured":"Cadar, C., Akritidis, P., Costa, M., Martin, J.P., Castro, M.: Data randomization. Technical report, Microsoft Research (2008)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Jackson, T., Salamat, B., Homescu, A., Manivannan, K., Wagner, G., Gal, A., Brunthaler, S., Wimmer, C., Franz, M.: Compiler-generated software diversity. In: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, pp. 77\u201398. Springer, New York (2011)","DOI":"10.1007\/978-1-4614-0977-9_4"},{"issue":"12","key":"14_CR11","doi-asserted-by":"crossref","first-page":"3471","DOI":"10.1016\/j.comnet.2007.02.006","volume":"51","author":"S. Antonatos","year":"2007","unstructured":"Antonatos, S., Akritidis, P., Markatos, E.P., Anagnostakis, K.G.: Defending against hitlist worms using network address space randomization. Comput. Netw. 51(12), 3471\u20133490 (2007)","journal-title":"Comput. Netw."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Atighetchi, M., Pal, P., Webber, F., Jones, C.: Adaptive use of network-centric mechanisms in cyber-defense. In: Proceedings of the Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2003), pp. 183\u2013192 May 2003","DOI":"10.1109\/ISORC.2003.1199253"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Kewley, D., Fink, R., Lowry, J., Dean, M.: Dynamic approaches to thwart adversary intelligence gathering. In: Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX 2011). Vol. 1, pp. 176\u2013185. Anaheim, CA, June 2011","DOI":"10.1109\/DISCEX.2001.932214"},{"issue":"12","key":"14_CR14","doi-asserted-by":"publisher","first-page":"3471","DOI":"10.1016\/j.comnet.2007.02.006","volume":"51","author":"S Antonatos","year":"2007","unstructured":"Antonatos, S., Akritidis, P., Markatos, E., Anagnostakis, K.: Defending against hitlist worms using network address space randomization. Comput. Netw. 51(12), 3471\u20133490 (2007)","journal-title":"Comput. Netw."},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks. HotSDN \u201912, pp. 127\u2013132. ACM, New York (2012)","DOI":"10.1145\/2342441.2342467"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Albanese, M., De Benedictis, A., Jajodia, S., Sun, K.: A moving target defense mechanism for MANETs based on identity virtualization. In: Proceedings of the First IEEE Conference on Communications and Network Security (IEEE CNS 2013), Washington, DC, Oct 2013","DOI":"10.1109\/CNS.2013.6682717"},{"issue":"2","key":"14_CR17","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3233\/JCS-2007-15201","volume":"15","author":"V Casola","year":"2007","unstructured":"Casola, V., Mazzeo, A., Mazzocca, N., Vittorini, V.: A policy-based methodology for security evaluation: a security metric for public key infrastructures. J. Comput. Secur. 15(2), 197\u2013229 (2007)","journal-title":"J. Comput. Secur."},{"key":"14_CR18","unstructured":"Common criteria project: Common criteria for information technology security evaluation 2.1. Technical report, US NIST (1999)"},{"key":"14_CR19","unstructured":"Trusted computer system evaluation criteria. Technical Report DoD 5200.28-STD, US Department Of, Defense (1985)"},{"issue":"1","key":"14_CR20","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TDSC.2008.75","volume":"8","author":"X Li","year":"2011","unstructured":"Li, X., Parker, T.P., Xu, S.: A stochastic model for quantitative security analyses of networked systems. IEEE Trans. Dependable Sec. Comput. 8(1), 28\u201343 (2011)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"issue":"4","key":"14_CR21","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/TDSC.2011.42","volume":"9","author":"A Barth","year":"2012","unstructured":"Barth, A., Rubinstein, B.I.P., Sundararajan, M., Mitchell, J.C., Song, D., Bartlett, P.L.: A learning-based approach to reactive security. IEEE Trans. Dependable Sec. Comput. 9(4), 482\u2013493 (2012)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Ahmed, M.S., Al-Shaer, E., Khan, L.: A novel quantitative approach for measuring network security. In: INFOCOM. pp. 1957\u20131965 (2008)","DOI":"10.1109\/INFOCOM.2008.260"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Pamula, J., Jajodia, S., Ammann, P., Swarup, V.: A weakest-adversary security metric for network configuration security analysis. In: QoP. pp. 31\u201338 A novel quantitative approach for measuring network security. In: INFOCOM. 1957\u20131965 (2008)","DOI":"10.1145\/1179494.1179502"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: NIST IR 7435: The common vulnerability scoring system (CVSS) and its applicability to federal agency systems, Aug (2007)","DOI":"10.6028\/NIST.IR.7435"},{"issue":"1","key":"14_CR25","first-page":"150","volume":"11","author":"V Casola","year":"2005","unstructured":"Casola, V., Preziosi, R., Rak, M., Troiano, L.: A reference model for security level evaluation: policy and fuzzy techniques. J. Univers. Comput. Sci. 11(1), 150\u2013174 (2005)","journal-title":"J. Univers. Comput. Sci."},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Foley, S.N., Fitzgerald, W., Bistarelli, S., OSullivan, B., Foghl, M.: Principles of secure network configuration: towards a formal basis for self-configuration. Lecture Notes in Computer Science, vol. 4268. Springer, Berlin Heidelberg (2006)","DOI":"10.1007\/11908852_15"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Casola, V., De Benedictis, A., Drago, A., Mazzocca, N.: Analysis and comparison of security protocols in wireless sensor networks. In: Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops (SRDSW 2011), pp. 52\u201356. Madrid, Spain (Oct 2011)","DOI":"10.1109\/SRDSW.2011.27"},{"key":"14_CR28","unstructured":"Wang, H., Sheng, B., Tan, C., Li, Q.: WM-ECC: An elliptic curve cryptography suite on sensor motes. Technical Report WMCS-2007-11, College of William and Mary (Oct 2007)"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Xiong, X., Wong, D.S., Deng, X.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2010), Apr 2010","DOI":"10.1109\/WCNC.2010.5506580"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Hui, J.W., Culler, D.: The dynamic behavior of a data dissemination protocol for network programming at scale. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 81\u201394. Baltimore, MD (2004)","DOI":"10.1145\/1031495.1031506"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Dutta, P.K., Hui, J.W., Chu, D.C., Culler, D.E.: Securing the deluge network programming system. In: Proceedings of the Fifth International Conference on Information Processing in Sensor Networks (IPSN 2006), pp. 326\u2013333. Apr 2006","DOI":"10.1145\/1127777.1127826"}],"container-title":["Advances in Intelligent Systems and Computing","Integration of Reusable Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04717-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T21:37:08Z","timestamp":1746135428000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-04717-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319047164","9783319047171"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04717-1_14","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 February 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}