{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:15:35Z","timestamp":1743056135614,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319744995"},{"type":"electronic","value":"9783319745008"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74500-8_22","type":"book-chapter","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T00:20:32Z","timestamp":1521505232000},"page":"242-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Game Theoretic Approach for Cloud Computing Security Assessment Using Moving Target Defense Mechanisms"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5321-887X","authenticated-orcid":false,"given":"Iman","family":"El Mir","sequence":"first","affiliation":[]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[]},{"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Xu, J., Guo, P., Zhao, M., Erbacher, R.F., Zhu, M., Liu, P.: Comparing different moving target defense techniques. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 97\u2013107. ACM (2014)","DOI":"10.1145\/2663474.2663486"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Carter, K.M., Riordan, J.F., Okhravi, H.: A game theoretic approach to strategy determination for dynamic platform defenses. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 21\u201330. ACM (2014)","DOI":"10.1145\/2663474.2663478"},{"issue":"2","key":"22_CR3","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2013.137","volume":"12","author":"H Okhravi","year":"2014","unstructured":"Okhravi, H., Hobson, T., Bigelow, D., Streilein, W.: Finding focus in the blur of moving-target techniques. IEEE Secur. Priv. 12(2), 16\u201326 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Zhuang, R., DeLoach, S.A., Ou, X.: Towards a theory of moving target defense. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 31\u201340. ACM (2014)","DOI":"10.1145\/2663474.2663479"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 127\u2013132. ACM (2012)","DOI":"10.1145\/2342441.2342467"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"El Kafhali, S., Salah, K.: Stochastic modelling and analysis of cloud computing data center. In: Proceedings of 20th Conference on Innovations in Clouds, Internet and Networks, pp. 122\u2013126. IEEE (2017)","DOI":"10.1109\/ICIN.2017.7899401"},{"issue":"12-supp","key":"22_CR7","doi-asserted-by":"crossref","first-page":"1804","DOI":"10.1287\/mnsc.1040.0270","volume":"50","author":"JC Harsanyi","year":"2004","unstructured":"Harsanyi, J.C.: Games with incomplete information played by Bayesian players, III: part I. The basic model. Manage. Sci. 50(12-supp), 1804\u20131817 (2004)","journal-title":"Manage. Sci."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Debroy, S., Calyam, P., Nguyen, M., Stage, A., Georgiev, V.: Frequency-minimal moving target defense using software-defined networking. In: Proceedings of the International Conference on Computing, Networking and Communications, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICCNC.2016.7440635"},{"key":"22_CR9","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.comcom.2014.03.009","volume":"46","author":"H Wang","year":"2014","unstructured":"Wang, H., Jia, Q., Fleck, D., Powell, W., Li, F., Stavrou, A.: A moving target DDoS defense mechanism. Comput. Commun. 46, 10\u201321 (2014)","journal-title":"Comput. Commun."},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Jia, Q., Wang, H., Fleck, D., Li, F., Stavrou, A., Powell, W.: Catch me if you can: a cloud-enabled DDoS defense. In: Proceedings of the 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 264\u2013275 (2014)","DOI":"10.1109\/DSN.2014.35"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Peng, W., Li, F., Huang, C.-T., Zou, X.: A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces. In: Proceedings of the International Conference on Communications (ICC), pp. 804\u2013809. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883418"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"El Mir, I., Chowdhary, A., Huang, D., Pisharody, S., Kim, D.S., Haqiq, A.: Software defined stochastic model for moving target defense. In: Proceedings of the Third International Afro-European Conference for Industrial Advancement, pp. 188\u2013197. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-60834-1_20"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Kampanakis, P., Perros, H., Beyene, T.: SDN-based solutions for moving target defense network protection. In: Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Zhuang, R., Zhang, S., Bardas, A., DeLoach, S.A., Ou, X., Singhal, A.: Investigating the application of moving target defenses to network security. In: Proceedings of the 6th International Symposium on Resilient Control Systems, pp. 162\u2013169. IEEE (2013)","DOI":"10.1109\/ISRCS.2013.6623770"},{"issue":"5","key":"22_CR15","first-page":"273","volume":"11","author":"I Mir El","year":"2016","unstructured":"El Mir, I., Kim, D.S., Haqiq, A.: Cloud computing security modeling and analysis based on a self-cleansing intrusion tolerance technique. J. Inf. Assur. Secur. 11(5), 273\u2013282 (2016)","journal-title":"J. Inf. Assur. Secur."},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"El Mir, I., Kim, D.S., Haqiq, A.: Security modeling and analysis of an intrusion tolerant cloud data center. In: Proceedings of the Third World Conference on Complex Systems (WCCS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/ICoCS.2015.7483264"},{"key":"22_CR17","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/ACCESS.2016.2633983","volume":"5","author":"C Lei","year":"2017","unstructured":"Lei, C., Ma, D.-H., Zhang, H.-Q.: Optimal strategy selection for moving target defense based on Markov game. IEEE Access 5, 156\u2013169 (2017)","journal-title":"IEEE Access"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Beckery, S., Seibert, J., Zage, D., Nita-Rotaru, C., Statey, R.: Applying game theory to analyze attack and defenses in virtual coordinate systems. In: IEEE\/IFIP Proceedings of the 41st International Conference on Dependable Systems & Networks, pp. 133\u2013144 (2011)","DOI":"10.1109\/DSN.2011.5958213"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Cai, G., Wang, B., Wang, X., Yuan, Y., Li, S.: An introduction to network address shuffling. In: Proceedings of the 18th International Conference on Advanced Communication Technology, pp. 185\u2013190. IEEE (2016)","DOI":"10.1109\/ICACT.2016.7423322"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Carroll, T.E., Crouse, M., Fulp, E.W., Berenhaut, K.S.: Analysis of network address shuffling as a moving target defense. In: Proceedings of the International Conference on Communications, pp. 701\u2013706. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883401"}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Smart Cities and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74500-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T00:23:16Z","timestamp":1570926196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74500-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319744995","9783319745008"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74500-8_22","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2018]]}}}