{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:16:41Z","timestamp":1749010601896,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319312941"},{"type":"electronic","value":"9783319312958"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31295-8_2","type":"book-chapter","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T09:54:21Z","timestamp":1464342861000},"page":"21-34","source":"Crossref","is-referenced-by-count":0,"title":["Simulation Driven Policy Recommendations for Code Diversity"],"prefix":"10.1007","author":[{"given":"Brady","family":"Tello","sequence":"first","affiliation":[]},{"given":"Michael","family":"Winterrose","sequence":"additional","affiliation":[]},{"given":"George","family":"Baah","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Zhivich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,28]]},"reference":[{"key":"2_CR1","unstructured":"Data Breach FAQ, Target. Inc. Available from: https:\/\/corporate.target.com\/about\/shopping-experience\/payment-card-issue-faq (07 Oct 2014)"},{"key":"2_CR2","unstructured":"The Home Depot Provides Update on Breach Investigation, The Home Depot, Inc. Available from: https:\/\/corporate.homedepot.com\/mediacenter\/pages\/statement1.aspx , 8 Sept 2014"},{"key":"2_CR3","unstructured":"Greenwald, G., MacAskill, E., Poitras, L.: (2013) Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations, The Guardian. Available from: http:\/\/www.theguardian.com\/world\/2013\/jun\/09\/edward-snowden-nsa-whistleblower-surveillance , 9 Oct 2014"},{"key":"2_CR4","unstructured":"Bumiller, E.: Army leak suspect is turned in, by Ex-Hacker. The New York Times. Available from: http:\/\/www.nytimes.com\/2010\/06\/08\/world\/08leaks.html?_r=0 , 09 Oct 2014"},{"key":"2_CR5","unstructured":"CVE-2014-0160 2014, MITRE Corporation. 2014. Available from: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0160 , 09 Oct 2014"},{"key":"2_CR6","unstructured":"Data Execution Prevention: Frequently Asked Questions n.d. Microsoft Corporation. Available from: http:\/\/windows.microsoft.com\/en-us\/windows-vista\/data-execution-prevention-frequently-asked-questions , 09 Oct 2014"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity: principles, implementations, and applications. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, 9 Oct 2014 (2005)","DOI":"10.1145\/1102120.1102165"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Okhravi, H., Hobson, T., Bigelow, D., Streilein, W.: Finding focus in the blur of moving target techniques. IEEE Secur Priv 12(2), 16\u201326 (2014)","DOI":"10.1109\/MSP.2013.137"},{"key":"2_CR9","unstructured":"Cox, B., Evans, D., Filipi, A., Rowanhill, J.: N-variant systems a secretless framework for security through diversity. In: Proceedings from the 15th Usenix Security Symposium. Available from: http:\/\/www.cs.virginia.edu\/nvariant\/ (2006)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Franz, M.: E Unibus Pluram: massive-scale software diversity as a defense mechanism. In: Proceedings of the 2010 Workshop on New Security Paradigms, pp. 7\u201316. Available from: ACM Portal: ACM Digital Library (2010)","DOI":"10.1145\/1900546.1900550"},{"key":"2_CR11","unstructured":"Priest, B., Vuksani, E., Wagner, N., Tello, B., Carter, K., Streilein, W.: Agent-based simulation in support of moving target cyber defense technology development and evaluation. In: Proceedings of the ACM Spring Simulation Multi-Conference (SpringSim\u201915) (2015)"},{"issue":"2","key":"2_CR12","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MSP.2013.133","volume":"12","author":"P Pal","year":"2014","unstructured":"Pal, P., Schantz, R., Paulos, A., Benyo, B.: Managed execution environment as a moving-target defense infrastructure. IEEE Secur. Priv. 12(2), 51\u201359 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"2_CR13","unstructured":"Alfred, G.B., Gray, E.H. (1998) Data farming: A metatechnique for research in the 21st century. Maneuver Warfare Science, pp. 93\u201399"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Barry, P., Koehler, M.: Simulation in context: using data farming for decision support. In: Proceedings of the 2004 Winter Simulation Conference. vol. 1. pp. 814\u2013819. Available from: IEEE XPlore Digital Library (2004)","DOI":"10.1109\/WSC.2004.1371394"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium on Security and Privacy. Available from: IEEE Xplore Digital Library (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Homescu, A., Neisius, S., Larsen, P., Brunthaler, S., Franz, M.: Profile-guided automated software diversity. In: Proceedings of the 2013 International Symposium on Code Generation and Optimization, pp 204\u2013214. Available from: IEEE Xplore Digital Library (2013)","DOI":"10.1109\/CGO.2013.6494997"},{"key":"2_CR17","unstructured":"Corelan Team n.d, Corelan ROPdb. Available from: https:\/\/www.corelan.be\/index.php\/security\/corelan-ropdb\/ , 23 Oct 2014"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Sharpe, W.F.: Mutual fund performance. J. Bus. 39, 119\u2013138 (1966)","DOI":"10.1086\/294846"},{"key":"2_CR19","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3927.001.0001","volume-title":"An Introduction to Genetic Algorithms","author":"M Mitchell","year":"1996","unstructured":"Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1996)"},{"key":"2_CR20","unstructured":"Holland, J.: Adaptation in Natural and Artificial Systems: An Introductory Analysis With Applications to Biology, Control, and Artificial Intelligence. University of Michigan Press, Arbor (1975)"},{"issue":"2","key":"2_CR21","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"58","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science (New Series) 58(2), 671\u2013680 (1983)","journal-title":"Science (New Series)"}],"container-title":["Advances in Intelligent Systems and Computing","Simulation and Modeling Methodologies, Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31295-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T19:46:41Z","timestamp":1748980001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31295-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312941","9783319312958"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31295-8_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}