{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:18Z","timestamp":1740148878243,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:00:00Z","timestamp":1611964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:00:00Z","timestamp":1611964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12083-021-01084-8","type":"journal-article","created":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T13:02:49Z","timestamp":1612011769000},"page":"1207-1217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cost-effective migration-based dynamic platform defense technique: a CTMDP approach"],"prefix":"10.1007","volume":"14","author":[{"given":"Yipin","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-8857","authenticated-orcid":false,"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Vojislav B.","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Yutong","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,30]]},"reference":[{"key":"1084_CR1","doi-asserted-by":"crossref","unstructured":"Jajodia S, Ghosh AK, Swarup V, Wang C, Wang XS (eds) (2011) Moving target defense: creating asymmetric uncertainty for cyber threats, vol 54, Springer Science & Business Media","DOI":"10.1007\/978-1-4614-0977-9"},{"issue":"2","key":"1084_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2013.137","volume":"12","author":"H Okhravi","year":"2013","unstructured":"Okhravi H, Hobson T, Bigelow D, Streilein W (2013) Finding focus in the blur of moving-target techniques. IEEE Security & Privacy 12(2):16\u201326","journal-title":"IEEE Security & Privacy"},{"key":"1084_CR3","doi-asserted-by":"crossref","unstructured":"Xu J, Guo P, Zhao M, Erbacher RF, Zhu M, Liu P (2014) Comparing different moving target defense techniques. In Proceedings of the First ACM Workshop on Moving Target. Defense:97\u2013107","DOI":"10.1145\/2663474.2663486"},{"key":"1084_CR4","doi-asserted-by":"publisher","unstructured":"Chang X, Shi Y, Zhang Z, Xu Z, Trivedi K (2020) Job Completion Time under Migration-based Dynamic Platform Technique. IEEE Transactions on Services Computing. https:\/\/doi.org\/10.1109\/TSC.2020.2989215","DOI":"10.1109\/TSC.2020.2989215"},{"key":"1084_CR5","doi-asserted-by":"publisher","first-page":"11437","DOI":"10.1109\/ACCESS.2020.2965090","volume":"8","author":"Z Chen","year":"2020","unstructured":"Chen Z, Chang X, Han Z, Yang Y (2020) Numerical Evaluation of Job Finish Time Under MTD Environment. IEEE Access 8:11437\u201311446","journal-title":"IEEE Access"},{"key":"1084_CR6","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1016\/j.future.2019.05.032","volume":"100","author":"J Shin","year":"2019","unstructured":"Shin J, Choi SH, Liu P, Choi YH (2019) Unsupervised multi-stage attack detection framework without details on single-stage attacks. Future Generation Computer Systems 100:811\u2013825","journal-title":"Future Generation Computer Systems"},{"issue":"12","key":"1084_CR7","doi-asserted-by":"publisher","first-page":"7920","DOI":"10.1109\/TIE.2015.2482119","volume":"62","author":"K Zheng","year":"2015","unstructured":"Zheng K, Meng H, Chatzimisios P, Lei L, Shen X (2015) An SMDP-based resource allocation in vehicular cloud computing systems. IEEE Transactions on Industrial Electronics 62(12):7920\u20137928","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"1084_CR8","doi-asserted-by":"crossref","unstructured":"Peng, W., Li, F., Huang, C. T., & Zou, X. (2014). A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces. In 2014 IEEE International Conference on Communications (ICC) (pp. 804\u2013809). IEEE","DOI":"10.1109\/ICC.2014.6883418"},{"key":"1084_CR9","doi-asserted-by":"crossref","unstructured":"Nguyen, M., Samanta, P., & Debroy, S. (2018). Analyzing moving target defense for resilient campus private cloud. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 114\u2013121). IEEE","DOI":"10.1109\/CLOUD.2018.00022"},{"key":"1084_CR10","doi-asserted-by":"crossref","unstructured":"Yang, R., Chang, X., Misic, J., Misic, V. B., Chen, Z., & Liu, B. (2019). Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1\u20136). IEEE","DOI":"10.1109\/GLOBECOM38437.2019.9013921"},{"key":"1084_CR11","doi-asserted-by":"crossref","unstructured":"Okhravi, H., Riordan, J., & Carter, K. (2014). Quantitative evaluation of dynamic platform techniques as a defensive mechanism. In International Workshop on Recent Advances in Intrusion Detection (pp. 405\u2013425). Springer, Cham","DOI":"10.1007\/978-3-319-11379-1_20"},{"key":"1084_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen, Q. L., & Sood, A. (2016). Improving Security Level via Velocity of Moving Target Defense. In 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 418\u2013419). IEEE","DOI":"10.1109\/QRS-C.2016.70"},{"key":"1084_CR13","doi-asserted-by":"crossref","unstructured":"Qi, X., Shen, S., & Wang, Q. (2020). A Moving Target Defense Technology Based on SCIT. In 2020 International Conference on Computer Engineering and Application (ICCEA) (pp. 454\u2013457). IEEE","DOI":"10.1109\/ICCEA50009.2020.00104"},{"issue":"1","key":"1084_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.ijcip.2012.01.002","volume":"5","author":"H Okhravi","year":"2012","unstructured":"Okhravi H, Comella A, Robinson E, Haines J (2012) Creating a cyber moving target for critical infrastructure applications using platform diversity. International Journal of Critical Infrastructure Protection 5(1):30\u201339","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"1084_CR15","doi-asserted-by":"crossref","unstructured":"Tozer, B., Mazzuchi, T., & Sarkani, S. (2015). Optimizing attack surface and configuration diversity using multi-objective reinforcement learning. In 2015 ieee 14th international conference on machine learning and applications (icmla) (pp. 144\u2013149). IEEE","DOI":"10.1109\/ICMLA.2015.144"},{"key":"1084_CR16","doi-asserted-by":"crossref","unstructured":"Hu Z, Zhu M, Liu P (2017) Online algorithms for adaptive cyber defense on bayesian attack graphs. In Proceedings of the 2017 Workshop on moving target. defense:99\u2013109","DOI":"10.1145\/3140549.3140556"},{"key":"1084_CR17","doi-asserted-by":"crossref","unstructured":"Zheng, J., & Namin, A. S. (2019). Enforcing Optimal Moving Target Defense Policies. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 1, pp. 753\u2013759). IEEE","DOI":"10.1109\/COMPSAC.2019.00112"},{"key":"1084_CR18","doi-asserted-by":"crossref","unstructured":"Carter KM, Riordan JF, Okhravi H (2014) A game theoretic approach to strategy determination for dynamic platform defenses. In Proceedings of the first ACM workshop on moving target. defense:21\u201330","DOI":"10.1145\/2663474.2663478"},{"key":"1084_CR19","doi-asserted-by":"crossref","unstructured":"Maleki H, Valizadeh S, Koch W, Bestavros A, Van Dijk M (2016) Markov modeling of moving target defense games. In Proceedings of the 2016 ACM Workshop on Moving Target. Defense:81\u201392","DOI":"10.1145\/2995272.2995273"},{"key":"1084_CR20","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/ACCESS.2016.2633983","volume":"5","author":"C Lei","year":"2017","unstructured":"Lei C, Ma DH, Zhang HQ (2017) Optimal strategy selection for moving target defense based on Markov game. IEEE Access 5:156\u2013169","journal-title":"IEEE Access"},{"key":"1084_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.cose.2019.04.013","volume":"85","author":"JL Tan","year":"2019","unstructured":"Tan JL, Lei C, Zhang HQ, Cheng YQ (2019) Optimal strategy selection approach to moving target defense based on Markov robust game. Computers & Security 85:63\u201376","journal-title":"Computers & Security"},{"key":"1084_CR22","unstructured":"Puterman, M. L. (2014). Markov decision processes: discrete stochastic dynamic programming. John Wiley & Sons"},{"key":"1084_CR23","doi-asserted-by":"crossref","unstructured":"El Zant, B., & Gagnaire, M. (2015). Performance and price analysis for cloud service providers. In 2015 Science and Information Conference (SAI) (pp. 816\u2013822). IEEE","DOI":"10.1109\/SAI.2015.7237238"},{"key":"1084_CR24","doi-asserted-by":"crossref","unstructured":"Sourour D, Chen T, Feng Y, Wang G (2019) Platform Moving Target Defense Strategy Based on Trusted Dynamic Logical Heterogeneity System. In Proceedings of the 2019 International Conference on Artificial Intelligence and Computer. Science:643\u2013648","DOI":"10.1145\/3349341.3349483"},{"key":"1084_CR25","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez, R. J., Chang, X., Li, X., & Trivedi, K. S. (2016). Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack. In International Workshop on Graphical Models for Security (pp. 134\u2013149). Springer","DOI":"10.1007\/978-3-319-46263-9_9"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01084-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01084-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01084-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T12:40:29Z","timestamp":1618404029000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01084-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,30]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["1084"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01084-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,1,30]]},"assertion":[{"value":"5 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No potential conflict of interest was reported by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}