{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T08:31:16Z","timestamp":1768897876358,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research Program of China","award":["2016YFB0800101"],"award-info":[{"award-number":["2016YFB0800101"]}]},{"name":"National Key Research Program of China","award":["2016YF0800100"],"award-info":[{"award-number":["2016YF0800100"]}]},{"name":"Innovative Research Groups of the National Natural Science Foundation of China","award":["61521003"],"award-info":[{"award-number":["61521003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11265-019-01473-6","type":"journal-article","created":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T12:02:26Z","timestamp":1586952146000},"page":"169-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A Framework for Mimic Defense System in Cyberspace"],"prefix":"10.1007","volume":"93","author":[{"given":"Guangsong","family":"Li","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6784-0221","authenticated-orcid":false,"given":"Keke","family":"Gai","sequence":"additional","affiliation":[]},{"given":"Yazhe","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Benchao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xueming","family":"Si","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,15]]},"reference":[{"issue":"5","key":"1473_CR1","doi-asserted-by":"publisher","first-page":"2431","DOI":"10.1109\/TSG.2017.2664043","volume":"8","author":"K Gai","year":"2017","unstructured":"Gai, K., Qiu, M., Ming, Z., Zhao, H., Qiu, L. (2017). Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Transactions on Smart Grid, 8(5), 2431\u20132439.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"1473_CR2","unstructured":"House, W. (2016). Federal cybersecurity research and development strategic plan."},{"issue":"16","key":"1473_CR3","doi-asserted-by":"publisher","first-page":"3049","DOI":"10.1002\/sec.1224","volume":"9","author":"K Gai","year":"2016","unstructured":"Gai, K., Qiu, M., Tao, L., Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), 3049\u20133058.","journal-title":"Security and Communication Networks"},{"key":"1473_CR4","unstructured":"Adams, M., Hitefield, S., Hoy, B., Fowler, M., Clancy, T. (2013). Application of cybernetics and control theory for a new paradigm in cybersecurity. arXiv:1311.0257."},{"issue":"8","key":"1473_CR5","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/TII.2017.2780885","volume":"14","author":"K Gai","year":"2017","unstructured":"Gai, K., & Qiu, M. (2017). Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Transactions on Industrial Informatics, 14(8), 3590\u20133598.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1-2","key":"1473_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10207-004-0060-x","volume":"4","author":"K Lye","year":"2005","unstructured":"Lye, K., & Wing, J. (2005). Game strategies in network security. International Journal of Information Security, 4(1-2), 71\u201386.","journal-title":"International Journal of Information Security"},{"key":"1473_CR7","unstructured":"Mahimkar, A., & Shmatikov, V. (2005). Game-based analysis of denial-of-service prevention protocols. In 18th IEEE computer security foundations workshop (CSFW\u201905) (pp. 287\u2013301): IEEE."},{"key":"1473_CR8","unstructured":"Bencs\u00e1th, B., Vajda, I., Butty\u00e1n, L. (2003). A game based analysis of the client puzzle approach to defend against dos attacks. In Proceedings of SoftCOM, (Vol. 11 pp. 763\u2013767)."},{"issue":"2","key":"1473_CR9","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/TC.2003.1176986","volume":"52","author":"J Xu","year":"2003","unstructured":"Xu, J., & Lee, W. (2003). Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers, 52(2), 195\u2013208.","journal-title":"IEEE Transactions on Computers"},{"key":"1473_CR10","unstructured":"Browne, R. (2000). C4i defensive infrastructure for survivability against multi-mode attacks. In MILCOM 2000 Proceedings. 21st century military communications. Architectures and technologies for information superiority (cat. no. 00CH37155), (Vol. 1 pp. 417\u2013424): IEEE."},{"key":"1473_CR11","unstructured":"Kim, J., & Bentley, P. (2002). Towards an artificial immune system for network intrusion detection An investigation of dynamic clonal selection. In Proceedings of the 2002 Congress on Evolutionary Computation. CEC\u201902 (Cat. No. 02TH8600), (Vol. 2 pp. 1015\u20131020)."},{"key":"1473_CR12","unstructured":"Kim, J., & Bentley, P. (2002). Immune memory in the dynamic clonal selection algorithm. In Proceedings of the first international conference on artificial immune systems ICARIS (pp. 59\u201367): Citeseer."},{"issue":"4","key":"1473_CR13","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., & Forrest, S. (2000). Architecture for an artificial immune system. Evolutionary computation, 8(4), 443\u2013473.","journal-title":"Evolutionary computation"},{"key":"1473_CR14","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.inffus.2019.02.002","volume":"50","author":"H Qiu","year":"2019","unstructured":"Qiu, H., Qiu, M., Lu, Z., Memmi, G. (2019). An efficient key distribution system for data fusion in v2x heterogeneous networks. Information Fusion, 50, 212\u2013220.","journal-title":"Information Fusion"},{"key":"1473_CR15","doi-asserted-by":"crossref","unstructured":"Qiu, H., Noura, H., Qiu, M., Ming, Z., Memmi, G. (2019). A user-centric data protection method for cloud storage based on invertible dwt. IEEE Transactions on Cloud Computing, p 1\u20131.","DOI":"10.1109\/TCC.2019.2911679"},{"key":"1473_CR16","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.future.2019.01.059","volume":"96","author":"C Zhang","year":"2019","unstructured":"Zhang, C., & Zheng, Z. (2019). Task migration for mobile edge computing using deep reinforcement learning. Future Generation Computer Systems, 96, 111\u2013118.","journal-title":"Future Generation Computer Systems"},{"issue":"99","key":"1473_CR17","first-page":"1","volume":"PP","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, Z., Qiu, M., Shen, M. (2019). Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Transactions on Industrial Informatics, PP(99), 1.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"99","key":"1473_CR18","first-page":"1","volume":"PP","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y. (2019). Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, PP(99), 1.","journal-title":"IEEE Internet of Things Journal"},{"key":"1473_CR19","unstructured":"National Science and Technology Council. (2011). Trustworthy cyberspace: strategic plan for the federal cybersecurity research and development program."},{"issue":"3","key":"1473_CR20","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1049\/iet-ifs.2017.0086","volume":"12","author":"H Hu","year":"2017","unstructured":"Hu, H., Wu, J., Wang, Z., Cheng, G. (2017). Mimic defense: a designed-in cybersecurity defense framework. IET Information Security, 12(3), 226\u2013237.","journal-title":"IET Information Security"},{"key":"1473_CR21","unstructured":"Wu, J. (2017). Introduction to cyberspace mimic defense. Science Press."},{"key":"1473_CR22","unstructured":"House, W. (2011). Trustworthy cyberspace: Strategic plan for the federal cyber security research and development program. Report of the National Science and Technology Council, Executive Office of the President."},{"key":"1473_CR23","unstructured":"Lu, K., Song, C., Lee, B., Chung, S., Kim, T., Lee, W. (2015). Aslr-guard: Stopping address space leakage for code reuse attacks. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (pp. 280\u2013291): ACM."},{"key":"1473_CR24","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing. In European symposium on research in computer security (pp. 355\u2013370): Springer."},{"key":"1473_CR25","unstructured":"Neti, S., Somayaji, A., Locasto, M. (2012). Software diversity: Security, entropy and game theory. In Proceeding of HotSec (pp. 5\u201310)."},{"key":"1473_CR26","unstructured":"Zhuang, R., DeLoach, S., Ou, X. (2014). A model for analyzing the effect of moving target defenses on enterprise networks. In Proceedings of the 9th annual cyber and information security research conference (pp. 73\u201376): ACM."},{"key":"1473_CR27","unstructured":"Zhuang, R., Bardas, A., DeLoach, S., Ou, X. (2015). A theory of cyber attacks: a step towards analyzing mtd systems. In Proceedings of the second ACM workshop on moving target defense (pp. 11\u201320): ACM."},{"key":"1473_CR28","unstructured":"Carter, K., Riordan, J., Okhravi, H. (2014). A game theoretic approach to strategy determination for dynamic platform defenses. In Proceedings of the first ACM workshop on moving target defense (pp. 21\u201330): ACM."},{"key":"1473_CR29","doi-asserted-by":"crossref","unstructured":"Cybenko, G., & Hughes, J. (2014). No free lunch in cyber security. In MTD @ CCS (pp. 1\u201312).","DOI":"10.1145\/2663474.2663475"},{"issue":"2","key":"1473_CR30","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TDSC.2015.2443790","volume":"13","author":"J Hong","year":"2016","unstructured":"Hong, J., & Kim, D. (2016). Assessing the effectiveness of moving target defenses using security models. IEEE Transactions on Dependable and Secure Computing, 13(2), 163\u2013177.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1473_CR31","volume-title":"Fault-tolerant computer system design, Vol. 132","author":"D Pradhan","year":"1996","unstructured":"Pradhan, D., & et al. (1996). Fault-tolerant computer system design Vol. 132. Englewood Cliffs: Prentice-Hall."},{"issue":"4","key":"1473_CR32","first-page":"883","volume":"28","author":"Q Tong","year":"2017","unstructured":"Tong, Q., Zhang, Z., Zhang, W., Wu, J. (2017). Design and implementation of mimic defense web server. Journal of Software, 28(4), 883\u2013897.","journal-title":"Journal of Software"},{"issue":"1","key":"1473_CR33","first-page":"13","volume":"2","author":"Z Zhang","year":"2017","unstructured":"Zhang, Z., Ma, B., WU, J. (2017). The test and analysis of prototype of mimic defense in web servers. Journal of Cyber Security, 2(1), 13\u201328.","journal-title":"Journal of Cyber Security"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-019-01473-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-019-01473-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-019-01473-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T09:54:48Z","timestamp":1618480488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-019-01473-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":33,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["1473"],"URL":"https:\/\/doi.org\/10.1007\/s11265-019-01473-6","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"13 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}