{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:32Z","timestamp":1771699832416,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642248634","type":"print"},{"value":"9783642248641","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24864-1_8","type":"book-chapter","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T16:34:47Z","timestamp":1318869287000},"page":"107-123","source":"Crossref","is-referenced-by-count":9,"title":["Creating a Cyber Moving Target for Critical Infrastructure Applications"],"prefix":"10.1007","author":[{"given":"Hamed","family":"Okhravi","sequence":"first","affiliation":[]},{"given":"Adam","family":"Comella","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Robinson","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Yannalfo","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Michaleas","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Haines","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/DEPEND.2009.15","volume-title":"Proceedings of the Second International Conference on Dependability","author":"A. Bangalore","year":"2009","unstructured":"A. Bangalore and A. Sood, Securing web servers using self cleansing intrusion tolerance (SCIT), Proceedings of the Second International Conference on Dependability, pp. 60\u201365, 2009."},{"issue":"9","key":"8_CR2","first-page":"24","volume":"10","author":"S. Blackmon","year":"2001","unstructured":"S. Blackmon and J. Nguyen, Storage: High-availability file server with heartbeat, System Administration, vol. 10(9), pp. 24\u201332, 2001.","journal-title":"System Administration"},{"issue":"10","key":"8_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/966049.781513","volume":"38","author":"G. Bronevetsky","year":"2003","unstructured":"G. Bronevetsky, D. Marques, K. Pingali and P. Stodghill, Automated application-level checkpointing of MPI programs, ACM SIGPLAN Notices, vol. 38(10), pp. 84\u201394, 2003.","journal-title":"ACM SIGPLAN Notices"},{"key":"8_CR4","unstructured":"R. Brown, Stuxnet worm causes industry concern for security firms, Mass High Tech, Boston, Massachusetts (www.masshightech.com\/stories \/2010\/10\/18\/daily19-Stuxnet-worm-causes-industry-concern-for-security-firms.html), October 19, 2010."},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G. Carl","year":"2006","unstructured":"G. Carl, G. Kesidis, R. Brooks and S. Rai, Denial-of-service attack detection techniques, IEEE Internet Computing, vol. 10(1), pp. 82\u201389, 2006.","journal-title":"IEEE Internet Computing"},{"key":"8_CR6","first-page":"33","volume-title":"Proceedings of the ACM\/IEEE Conference on Supercomputing","author":"Y. Chen","year":"1997","unstructured":"Y. Chen, K. Li and J. Plank, CLIP: A checkpointing tool for message passing parallel programs, Proceedings of the ACM\/IEEE Conference on Supercomputing, p. 33, 1997."},{"key":"8_CR7","first-page":"273","volume":"2","author":"C. Clark","year":"2005","unstructured":"C. Clark, K. Fraser, S. Hand, J. Hansen, E. Jul, C. Limpach, I. Pratt and A. Warfield, Live migration of virtual machines, Proceedings of the Second Conference on Symposium on Networked Systems Design and Implementation , vol. 2, pp. 273\u2013286, 2005.","journal-title":"Proceedings of the Second Conference on Symposium on Networked Systems Design and Implementation"},{"key":"8_CR8","unstructured":"I. Habib, Virtualization with KVM, Linux Journal (www.linuxjournal.com\/article\/9764), February 1, 2008."},{"key":"8_CR9","unstructured":"HDF Group, HDF4 Reference Manual, Champaign, Illinois (ftp.hdfgroup.org\/HDF\/Documentation\/HDF4.2.5\/HDF425_RefMan.pdf), 2010."},{"key":"8_CR10","first-page":"21","volume-title":"Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid","author":"Y. Huang","year":"2006","unstructured":"Y. Huang, D. Arsenault and A. Sood, Closing cluster attack windows through server redundancy and rotations, Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid, p. 21, 2006."},{"issue":"5","key":"8_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4304\/jnw.1.5.21-30","volume":"1","author":"Y. Huang","year":"2006","unstructured":"Y. Huang, D. Arsenault and A. Sood, Incorruptible self cleansing intrusion tolerance and its application to DNS security, Journal of Networks, vol. 1(5), pp. 21\u201330, 2006.","journal-title":"Journal of Networks"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/NCA.2009.37","volume-title":"Proceedings of the Eighth IEEE International Symposium on Network Computing and Applications","author":"Y. Huang","year":"2009","unstructured":"Y. Huang and A. Ghosh, Automating intrusion response via virtualization for realizing uninterruptible web services, Proceedings of the Eighth IEEE International Symposium on Network Computing and Applications, pp. 114\u2013117, 2009."},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/DSNW.2010.5542597","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks Workshops","author":"Y. Huang","year":"2010","unstructured":"Y. Huang, A. Ghosh, T. Bracewell and B. Mastropietro, A security evaluation of a novel resilient web serving architecture: Lessons learned through industry\/academia collaboration, Proceedings of the International Conference on Dependable Systems and Networks Workshops, pp. 188\u2013193, 2010."},{"key":"8_CR14","unstructured":"Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), ICS-ALERT-10-301-01 \u2013 Control System Internet Accessibility, Department of Homeland Security, Washington, DC (www.us-cert.gov \/control_systems\/pdf\/ICS-Alert-10-301-01.pdf), October 28, 2010."},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/ACSAC.2009.21","volume-title":"Proceedings of the Annual Computer Security Applications Conference","author":"K. Ingols","year":"2009","unstructured":"K. Ingols, M. Chu, R. Lippmann, S. Webster and S. Boyer, Modeling modern network attacks and countermeasures using attack graphs, Proceedings of the Annual Computer Security Applications Conference, pp. 117\u2013126, 2009."},{"key":"8_CR16","unstructured":"K. Kolyshkin, Virtualization in Linux, OpenVZ (ftp.openvz.org\/doc\/open vz-intro.pdf), 2006."},{"key":"8_CR17","first-page":"539","volume-title":"Proceedings of the Sixteenth International Workshop on Languages and Compilers for Parallel Computing","author":"S. Lee","year":"2003","unstructured":"S. Lee, T. Johnson and R. Eigenmann, Cetus \u2013 An extensible compiler infrastructure for source-to-source transformation, Proceedings of the Sixteenth International Workshop on Languages and Compilers for Parallel Computing, pp. 539\u2013553, 2003."},{"key":"8_CR18","unstructured":"lxc Linux Containers, lxc man pages (lxc.sourceforge.net\/index.php\/about \/man)."},{"key":"8_CR19","unstructured":"National Security Council, Cybersecurity Progress after President Obama\u2019s Address, The White House, Washington, DC, July 14, 2010."},{"key":"8_CR20","unstructured":"Parallels, Clustering in Parallels Virtuozzo-Based Systems, White Paper, Renton, Washington, 2009."},{"key":"8_CR21","first-page":"178","volume-title":"Proceedings of the IEEE International Conference on Cluster Computing","author":"R. Rabbat","year":"2001","unstructured":"R. Rabbat, T. McNeal and T. Burke, A high-availability clustering architecture with data integrity guarantees, Proceedings of the IEEE International Conference on Cluster Computing, pp. 178\u2013182, 2001."},{"issue":"6","key":"8_CR22","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1002\/cpe.1541","volume":"22","author":"G. Rodriguez","year":"2010","unstructured":"G. Rodriguez, M. Martin, P. Gonzalez, J. Tourino and R. Doallo, CPPC: A compiler-assisted tool for portable checkpointing of message-passing applications, Concurrency and Computation: Practice and Experience, vol. 22(6), pp. 749\u2013766, 2010.","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"5","key":"8_CR23","first-page":"31","volume":"10","author":"E. Sarmiento","year":"2001","unstructured":"E. Sarmiento, Securing FreeBSD using Jail, System Administration, vol. 10(5), pp. 31\u201337, 2001.","journal-title":"System Administration"},{"key":"8_CR24","volume-title":"Cross-Platform GUI Programming with wxWidgets","author":"J. Smart","year":"2005","unstructured":"J. Smart, K. Hock and S. Csomor, Cross-Platform GUI Programming with wxWidgets, Prentice Hall, Upper Saddle River, New Jersey, 2005."},{"key":"8_CR25","volume-title":"Secure and Resilient Cyber Architectures Conference","author":"A. Sood","year":"2010","unstructured":"A. Sood, Intrusion tolerance to mitigate attacks that persist, presented at the Secure and Resilient Cyber Architectures Conference, 2010."},{"key":"8_CR26","first-page":"526","volume-title":"Proceedings of the Tenth International Parallel Processing Symposium","author":"G. Stellner","year":"1996","unstructured":"G. Stellner, CoCheck: Checkpointing and process migration for MPI, Proceedings of the Tenth International Parallel Processing Symposium, pp. 526\u2013531, 1996."},{"key":"8_CR27","unstructured":"U.S. Air Force Chief Scientist, Report on Technology Horizons: A Vision for Air Force Science and Technology During 2010\u20132030, Volume 1, Technical Report AF\/ST-TR-10-01-PR, Department of the Air Force, Washington, DC, 2010."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24864-1_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T11:40:40Z","timestamp":1620042040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24864-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642248634","9783642248641"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24864-1_8","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1861-2288","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}