{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:53:51Z","timestamp":1753181631183,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_32","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T11:19:11Z","timestamp":1512645551000},"page":"539-548","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0033-6706","authenticated-orcid":false,"given":"Hooman","family":"Alavizadeh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2605-187X","authenticated-orcid":false,"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1359-3813","authenticated-orcid":false,"given":"Jin B.","family":"Hong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1002-057X","authenticated-orcid":false,"given":"Julian","family":"Jang-Jaccard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-1-4614-0977-9_9","volume-title":"Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats","author":"E Al-Shaer","year":"2011","unstructured":"Al-Shaer, E.: Toward network configuration randomization for moving target defense. In: Jajodia, S., Ghosh, A., Swarup, V., Wang, C., Wang, X. (eds.) Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, vol. 54, pp. 153\u2013159. Springer, New York (2011). https:\/\/doi.org\/10.1007\/978-1-4614-0977-9_9"},{"doi-asserted-by":"crossref","unstructured":"Chatfield, B., Haddad, R.: Moving Target Defense Intrusion Detection System for IPv6 based smart grid advanced metering infrastructure. In: Proceedings of the IEEE SoutheastCon 2017, pp. 1\u20137, March 2017","key":"32_CR2","DOI":"10.1109\/SECON.2017.7925307"},{"doi-asserted-by":"crossref","unstructured":"He, M., Pang, S., Lavrov, D., Lu, D., Zhang, Y., Sarrafzadeh, A.: Reverse Replication of Virtual Machines (rRVM) for mow latency and high availability services. In: Proceedings of the 9th International Conference on Utility and Cloud Computing (UCC 2016), pp. 118\u2013127. ACM (2016)","key":"32_CR3","DOI":"10.1145\/2996890.2996894"},{"key":"32_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-642-39218-4_25","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"JB Hong","year":"2013","unstructured":"Hong, J.B., Kim, D.S.: Performance analysis of scalable attack representation models. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 330\u2013343. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_25"},{"doi-asserted-by":"crossref","unstructured":"Hong, J.B., Kim, D.S.: Scalable security analysis in hierarchical attack representation model using centrality measures. In: Proceedings of the 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W 2013), pp. 1\u20138 (2013)","key":"32_CR5","DOI":"10.1109\/DSNW.2013.6615507"},{"issue":"2","key":"32_CR6","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/TDSC.2015.2443790","volume":"13","author":"JB Hong","year":"2016","unstructured":"Hong, J.B., Kim, D.S.: Assessing the effectiveness of moving target defenses using security models. IEEE Trans. Dependable Secure Comput. 13(2), 163\u2013177 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Hong, J.B., Kim, D.S.: Towards scalable security analysis using multi-layered security models. J. Netw. Comput. Appl. 75(C), 156\u2013168 (2016)","key":"32_CR7","DOI":"10.1016\/j.jnca.2016.08.024"},{"doi-asserted-by":"crossref","unstructured":"Jafarian, J., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks (HotSDN 2012), pp. 127\u2013132. ACM, New York (2012)","key":"32_CR8","DOI":"10.1145\/2342441.2342467"},{"doi-asserted-by":"crossref","unstructured":"Jia, Q., Wang, H., Fleck, D., Li, F., Stavrou, A., Powell, W.: Catch me if you can: a cloud-enabled DDoS defense. In: Proceedings of the Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2014), pp. 264\u2013275 (2014)","key":"32_CR9","DOI":"10.1109\/DSN.2014.35"},{"issue":"5","key":"32_CR10","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/TDSC.2015.2423682","volume":"13","author":"K Kaynar","year":"2016","unstructured":"Kaynar, K., Sivrikaya, F.: Distributed attack graph generation. IEEE Trans. Dependable Secure Comput. 13(5), 519\u2013532 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Peng, W., Li, F., Huang, C., Zou, X.: A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces. In: Proceedings of the IEEE International Conference on Communications (ICC 2014), pp. 804\u2013809 (2014)","key":"32_CR11","DOI":"10.1109\/ICC.2014.6883418"},{"key":"32_CR12","volume-title":"Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package","author":"R Sahner","year":"2012","unstructured":"Sahner, R., Trivedi, K., Puliafito, A.: Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Springer, US (2012)"},{"doi-asserted-by":"crossref","unstructured":"Zhang, L., Shetty, S., Liu, P., Jing, J.: Rootkitdet: practical end-to-end defense against kernel rootkits in a cloud environment. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS 2014), pp. 475\u2013493 (2014)","key":"32_CR13","DOI":"10.1007\/978-3-319-11212-1_27"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Li, M., Bai, K., Yu, M., Zang, W.: Incentive compatible moving target defense against VM-colocation attacks in clouds. In: Proceedings of the 27th IFIP Information Security and Privacy Conference (SEC 2012), pp. 388\u2013399 (2012)","key":"32_CR14","DOI":"10.1007\/978-3-642-30436-1_32"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T13:17:03Z","timestamp":1570454223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}