{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T21:34:22Z","timestamp":1774042462378,"version":"3.50.1"},"reference-count":94,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100031213","name":"International Technology Center Pacific","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100031213","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.future.2026.108419","type":"journal-article","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T23:30:48Z","timestamp":1770507048000},"page":"108419","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["MTD in depth: Multi-phased moving target defense techniques against cyber-attacks based on cyber kill chain"],"prefix":"10.1016","volume":"181","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6161-7982","authenticated-orcid":false,"given":"Minjune","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5908-4662","authenticated-orcid":false,"given":"Jin-Hee","family":"Cho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9926-3913","authenticated-orcid":false,"given":"Hyuk","family":"Lim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7234-9127","authenticated-orcid":false,"given":"Tina","family":"Moghaddam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3279-2965","authenticated-orcid":false,"given":"Terrence J.","family":"Moore","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8641-384X","authenticated-orcid":false,"given":"Frederica F.","family":"Nelson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2605-187X","authenticated-orcid":false,"given":"Dan Dongseong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2026.108419_bib0001","unstructured":"M. Corporation, \u201cMITRE ATT&CK\u201d Accessed Jun. 11, 2023, 2023, https:\/\/attack.mitre.org\/."},{"key":"10.1016\/j.future.2026.108419_bib0002","article-title":"Toward a knowledge graph of cybersecurity countermeasures","author":"Kaloroumakis","year":"2021","journal-title":"Corporation, Editor"},{"key":"10.1016\/j.future.2026.108419_bib0003","series-title":"International Conference on Security and Privacy in Communication Systems","first-page":"310","article-title":"Random host mutation for moving target defense","author":"Al-Shaer","year":"2012"},{"key":"10.1016\/j.future.2026.108419_bib0004","series-title":"Proceedings of the 11Th ACM Conference on Computer and Communications Security","first-page":"298","article-title":"On the effectiveness of address-space randomization","author":"Shacham","year":"2004"},{"key":"10.1016\/j.future.2026.108419_bib0005","series-title":"Proceedings - 17Th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12Th IEEE International Conference on Big Data Science and Engineering, Trustcom\/BigDataSE 2018","first-page":"579","article-title":"FRVM: Flexible random virtual IP multiplexing in software-Defined networks","author":"Sharma","year":"2018"},{"key":"10.1016\/j.future.2026.108419_bib0006","series-title":"Proceedings of the Second ACM Workshop on Moving Target Defense","first-page":"37","article-title":"The SDN shuffle: creating a moving-Target defense using host-Based software-Defined networking","author":"MacFarland","year":"2015"},{"issue":"1","key":"10.1016\/j.future.2026.108419_bib0007","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"Hutchins","year":"2011","journal-title":"Lead. Iss. Inform. Warfare Secur. Res."},{"key":"10.1016\/j.future.2026.108419_bib0008","series-title":"Moving Target Defense","first-page":"131","article-title":"Introducing diversity and uncertainty to create moving attack surfaces for web services","author":"Huang","year":"2011"},{"key":"10.1016\/j.future.2026.108419_bib0009","series-title":"Moving Target Defense","first-page":"77","article-title":"Compiler-generated software diversity","author":"Jackson","year":"2011"},{"key":"10.1016\/j.future.2026.108419_bib0010","series-title":"National Symposium on Moving Target Research","article-title":"Artificial diversity as maneuvers in a control theoretic moving target defense","author":"Rowe","year":"2012"},{"issue":"1","key":"10.1016\/j.future.2026.108419_bib0011","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TDSC.2018.2882825","article-title":"Performance modeling of moving target defenses with reconfiguration limits","volume":"18","author":"Connell","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.future.2026.108419_bib0012","series-title":"Proceedings of the ACM Symposium on Applied Computing","first-page":"1180","article-title":"Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms","author":"Mendon\u00e7a","year":"2020"},{"key":"10.1016\/j.future.2026.108419_bib0013","series-title":"2014 44Th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks","first-page":"264","article-title":"Catch me if you can: a cloud-enabled DDos defense","author":"Jia","year":"2014"},{"key":"10.1016\/j.future.2026.108419_bib0014","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/TDSC.2013.45","article-title":"Evaluation of web security mechanisms using vulnerability & attack injection","volume":"11","author":"Fonseca","year":"2014","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.future.2026.108419_bib0015","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/3338468.3356824","article-title":"A cost-effective shuffling method against DDos attacks using moving target defense","author":"Zhou","year":"2019","journal-title":"Proc. 6th ACM Workshop Mov. Target Defense"},{"key":"10.1016\/j.future.2026.108419_bib0016","series-title":"2013 6Th International Symposium on Resilient Control Systems (ISRCS)","first-page":"162","article-title":"Investigating the application of moving target defenses to network security","author":"Zhuang","year":"2013"},{"key":"10.1016\/j.future.2026.108419_bib0017","article-title":"Security and performance assessment of IP multiplexing moving target defence in software defined networks","author":"Dishington","year":"2019","journal-title":"2019 IEEE Int. Conf. Trust, Secur. Priv. Comput. Commun."},{"key":"10.1016\/j.future.2026.108419_bib0018","series-title":"Proceedings of the 5Th ACM Workshop on Moving Target Defense","first-page":"11","article-title":"Comprehensive security assessment of combined MTD techniques for the cloud","author":"Alavizadeh","year":"2018"},{"key":"10.1016\/j.future.2026.108419_bib0019","series-title":"IFIP International Conference on ICT Systems Security and Privacy Protection","first-page":"124","article-title":"A framework for moving target defense quantification","author":"Connell","year":"2017"},{"key":"10.1016\/j.future.2026.108419_bib0020","series-title":"International Conference on Decision and Game Theory for Security","first-page":"246","article-title":"Game-theoretic approach to feedback-driven multi-stage moving target defense","author":"Zhu","year":"2013"},{"key":"10.1016\/j.future.2026.108419_bib0021","series-title":"Proceedings of the 6Th Annual Symposium on Hot Topics in the Science of Security","first-page":"1","article-title":"Learning APT chains from cyber threat intelligence","author":"Husari","year":"2019"},{"issue":"1","key":"10.1016\/j.future.2026.108419_bib0022","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/COMST.2019.2963791","article-title":"Toward proactive, adaptive defense: a survey on moving target defense","volume":"22","author":"Cho","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"11","key":"10.1016\/j.future.2026.108419_bib0023","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1631\/FITEE.1601321","article-title":"Moving target defense: state of the art and characteristics","volume":"17","author":"Cai","year":"2016","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"10.1016\/j.future.2026.108419_bib0024","doi-asserted-by":"crossref","DOI":"10.1155\/2018\/3759626","article-title":"Moving target defense techniques: a survey","volume":"2018","author":"Lei","year":"2018","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"10.1016\/j.future.2026.108419_bib0025","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.1109\/COMST.2020.2982955","article-title":"A survey of moving target defenses for network security","volume":"22","author":"Sengupta","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.future.2026.108419_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2023.100544","article-title":"A survey: when moving target defense meets game theory","volume":"48","author":"Tan","year":"2023","journal-title":"Comput. Sci. Rev."},{"issue":"12","key":"10.1016\/j.future.2026.108419_bib0027","doi-asserted-by":"crossref","first-page":"3471","DOI":"10.1016\/j.comnet.2007.02.006","article-title":"Defending against hitlist worms using network address space randomization","volume":"51","author":"Antonatos","year":"2007","journal-title":"Comput. Netw."},{"key":"10.1016\/j.future.2026.108419_bib0028","series-title":"Proceedings of the 10Th ACM Conference on Computer and Communications Security","first-page":"272","article-title":"Countering code-injection attacks with instruction-set randomization","author":"Kc","year":"2003"},{"issue":"1","key":"10.1016\/j.future.2026.108419_bib0029","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSP.2009.11","article-title":"It monoculture security risks and defenses","volume":"7","author":"Lala","year":"2009","journal-title":"IEEE Secur. Priv."},{"key":"10.1016\/j.future.2026.108419_bib0030","first-page":"127","article-title":"Openflow random host mutation: transparent moving target defense using software defined networking","author":"Jafarian","year":"2012","journal-title":"... Topic. Softw. Defined Netw."},{"key":"10.1016\/j.future.2026.108419_bib0031","series-title":"2013 22Nd International Conference on Computer Communication and Networks (ICCCN)","first-page":"1","article-title":"Motag: moving target defense against internet denial of service attacks","author":"Jia","year":"2013"},{"key":"10.1016\/j.future.2026.108419_bib0032","series-title":"Proc. 11Th Int. Conf. Cyber Warfare Security (ICCWS)","first-page":"21","article-title":"Attacker skill defender strategies and the effectiveness of migration-based moving target defense in cyber systems","author":"Ben-Asher","year":"2016"},{"key":"10.1016\/j.future.2026.108419_bib0033","series-title":"2014IEEE International Conference on Communications (ICC)","first-page":"701","article-title":"Analysis of network address shuffling as a moving target defense","author":"Carroll","year":"2014"},{"key":"10.1016\/j.future.2026.108419_bib0034","series-title":"Technical Report","article-title":"Survey of cyber moving targets second edition","author":"Ward","year":"2018"},{"key":"10.1016\/j.future.2026.108419_bib0035","article-title":"Bio-inspired formal model for space\/time virtual machine randomization and diversification","author":"Ahmed","year":"2020","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.future.2026.108419_bib0036","series-title":"2013IEEE Conference on Communications and Network Security (CNS)","first-page":"55","article-title":"Nomad: towards non-intrusive moving-target defense against web bots","author":"Vikram","year":"2013"},{"key":"10.1016\/j.future.2026.108419_bib0037","series-title":"2014IEEE Symposium on Security and Privacy","first-page":"276","article-title":"SoK: Automated software diversity","author":"Larsen","year":"2014"},{"key":"10.1016\/j.future.2026.108419_bib0038","series-title":"Proceedings of the 2016ACM Workshop on Moving Target Defense","first-page":"59","article-title":"Mayflies: a moving target defense framework for distributed systems","author":"Ahmed","year":"2016"},{"key":"10.1016\/j.future.2026.108419_bib0039","series-title":"Proceedings of the 30Th European Safety and Reliability Conference (ESREL2020) and the 15Th Probabilistic Safety Assessment and Management Conference (PSAM15)","article-title":"Assessing dependability of web services under moving target defense techniques","author":"Distefano","year":"2020"},{"key":"10.1016\/j.future.2026.108419_bib0040","series-title":"2022IEEE 27Th Pacific Rim International Symposium on Dependable Computing (PRDC)","first-page":"119","article-title":"Performance and security evaluation of a moving target defense based on a software-Defined networking environment","author":"Kim","year":"2022"},{"key":"10.1016\/j.future.2026.108419_bib0041","series-title":"MILCOM 2015-2015 IEEE Military Communications Conference","first-page":"966","article-title":"Operational cost of deploying moving target defenses defensive work factors","author":"Van Leeuwen","year":"2015"},{"key":"10.1016\/j.future.2026.108419_bib0042","series-title":"IFIP Annual Conference on Data and Applications Security and Privacy","first-page":"110","article-title":"Knowledge mining in cybersecurity: from attack to defense","author":"Akbar","year":"2022"},{"key":"10.1016\/j.future.2026.108419_bib0043","series-title":"2022IEEE 22Nd International Conference on Software Quality, Reliability and Security (QRS)","first-page":"276","article-title":"Evaluating performance and security of a hybrid moving target defense in SDN environments","author":"Kim","year":"2022"},{"key":"10.1016\/j.future.2026.108419_bib0044","series-title":"Ndss","article-title":"Noncespaces: using randomization to enforce information flow tracking and thwart cross-Site scripting attacks","author":"Van Gundy","year":"2009"},{"key":"10.1016\/j.future.2026.108419_bib0045","series-title":"2006 22Nd Annual Computer Security Applications Conference (ACSAC\u201906)","first-page":"339","article-title":"Address space layout permutation (ASLP): towards fine-grained randomization of commodity software","author":"Kil","year":"2006"},{"key":"10.1016\/j.future.2026.108419_bib0046","series-title":"Aamas","first-page":"178","article-title":"A game theoretic approach to strategy generation for moving target defense in web applications","volume":"1","author":"Sengupta","year":"2017"},{"key":"10.1016\/j.future.2026.108419_bib0047","series-title":"Proceedings of the 5Th Annual Symposium and Bootcamp on Hot Topics in the Science of Security","first-page":"1","article-title":"Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems","author":"Potteiger","year":"2018"},{"key":"10.1016\/j.future.2026.108419_bib0048","series-title":"IFIP International Information Security Conference","first-page":"388","article-title":"Incentive compatible moving target defense against vm-colocation attacks in clouds","author":"Zhang","year":"2012"},{"key":"10.1016\/j.future.2026.108419_bib0049","series-title":"2013 International Conference on Information Reuse & Integration (IRI)","first-page":"22","article-title":"A moving target defense approach for protecting resource-constrained distributed devices","author":"Casola","year":"2013"},{"key":"10.1016\/j.future.2026.108419_bib0050","series-title":"Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014","first-page":"1","article-title":"SDN-Based solutions for moving target defense network protection","author":"Kampanakis","year":"2014"},{"key":"10.1016\/j.future.2026.108419_bib0051","series-title":"Pacific-Asia Workshop on Intelligence and Security Informatics","first-page":"295","article-title":"Port and address hopping for active cyber-defense","author":"Shi","year":"2007"},{"key":"10.1016\/j.future.2026.108419_bib0052","series-title":"IEEE 60Th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004","first-page":"3291","article-title":"Port hopping for resilient networks","volume":"5","author":"Lee","year":"2004"},{"key":"10.1016\/j.future.2026.108419_bib0053","series-title":"2015IEEE Trustcom\/BigDataSE\/ISPA","first-page":"263","article-title":"RPAH: Random port and address hopping for thwarting internal and external adversaries","volume":"1","author":"Luo","year":"2015"},{"key":"10.1016\/j.future.2026.108419_bib0054","series-title":"Proceedings of the 2017 Workshop on Moving Target Defense","first-page":"3","article-title":"U-TRI: Unlinkability through random identifier for SDN network","author":"Wang","year":"2017"},{"issue":"12","key":"10.1016\/j.future.2026.108419_bib0055","doi-asserted-by":"crossref","first-page":"3471","DOI":"10.1016\/j.comnet.2007.02.006","article-title":"Defending against hitlist worms using network address space randomization","volume":"51","author":"Antonatos","year":"2007","journal-title":"Comput. Netw."},{"key":"10.1016\/j.future.2026.108419_bib0056","series-title":"Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX\u201901","first-page":"176","article-title":"Dynamic approaches to thwart adversary intelligence gathering","volume":"1","author":"Kewley","year":"2001"},{"issue":"1","key":"10.1016\/j.future.2026.108419_bib0057","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TNSM.2018.2889842","article-title":"Fast IP hopping randomization to secure hop-by-hop access in SDN","volume":"16","author":"Chang","year":"2018","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.future.2026.108419_bib0058","series-title":"2011-MILCOM 2011 Military Communications Conference","first-page":"1321","article-title":"Mt6d: a moving target ipv6 defense","author":"Dunlop","year":"2011"},{"key":"10.1016\/j.future.2026.108419_bib0059","series-title":"Proceedings of the 2016ACM Workshop on Moving Target Defense","first-page":"69","article-title":"Moving target defense: a journey from idea to product","author":"Li","year":"2016"},{"key":"10.1016\/j.future.2026.108419_bib0060","series-title":"2019 49Th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks\u2013Supplemental Volume (DSN-S)","first-page":"15","article-title":"SDN-Based IP shuffling moving target defense with multiple SDN controllers","author":"Narantuya","year":"2019"},{"key":"10.1016\/j.future.2026.108419_bib0061","series-title":"International Conference on Decision and Game Theory for Security","first-page":"3","article-title":"A game-theoretic approach to IP address randomization in decoy-based cyber defense","author":"Clark","year":"2015"},{"key":"10.1016\/j.future.2026.108419_bib0062","series-title":"NOMS 2018-2018 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"DDoS defense using MTD and SDN","author":"Steinberger","year":"2018"},{"key":"10.1016\/j.future.2026.108419_bib0063","series-title":"2017IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","first-page":"1","article-title":"Moving target defense for securing smart grid communications: architecture, implementation & evaluation","author":"Pappa","year":"2017"},{"key":"10.1016\/j.future.2026.108419_bib0064","series-title":"2017 Resilience Week (RWS)","first-page":"163","article-title":"A symmetric address translation approach for a network layer moving target defense to secure power grid networks","author":"Ulrich","year":"2017"},{"issue":"12","key":"10.1016\/j.future.2026.108419_bib0065","doi-asserted-by":"crossref","first-page":"2562","DOI":"10.1109\/TIFS.2015.2467358","article-title":"An effective address mutation approach for disrupting reconnaissance attacks","volume":"10","author":"Jafarian","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2026.108419_bib0066","series-title":"Proceedings of the 8Th ACM CCS International Workshop on Managing Insider Security Threats","first-page":"57","article-title":"Cyber deception: virtual networks to defend insider reconnaissance","author":"Achleitner","year":"2016"},{"issue":"4","key":"10.1016\/j.future.2026.108419_bib0067","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/TNSM.2017.2724239","article-title":"Deceiving network reconnaissance using SDN-based virtual topologies","volume":"14","author":"Achleitner","year":"2017","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.future.2026.108419_bib0068","series-title":"2017IEEE 36Th Symposium on Reliable Distributed Systems (SRDS)","first-page":"234","article-title":"Optimal network reconfiguration for software defined networks using shuffle-based online MTD","author":"Hong","year":"2017"},{"key":"10.1016\/j.future.2026.108419_bib0069","series-title":"Proceedings of the 9Th ACM Conference on Security & Privacy in Wireless and Mobile Networks","first-page":"15","article-title":"Defeating MAC address randomization through timing attacks","author":"Matte","year":"2016"},{"key":"10.1016\/j.future.2026.108419_bib0070","series-title":"2013IEEE Conference on Communications and Network Security (CNS)","first-page":"260","article-title":"Efficient random route mutation considering flow and network constraints","author":"Duan","year":"2013"},{"key":"10.1016\/j.future.2026.108419_bib0071","series-title":"Proceedings of the 2010 New Security Paradigms Workshop","first-page":"7","article-title":"E unibus pluram: massive-scale software diversity as a defense mechanism","author":"Franz","year":"2010"},{"key":"10.1016\/j.future.2026.108419_bib0072","series-title":"Proceedings of the 2005 Workshop on New Security Paradigms","first-page":"11","article-title":"Diversity as a computer defense mechanism","author":"Taylor","year":"2005"},{"key":"10.1016\/j.future.2026.108419_bib0073","series-title":"International Conference on Security Technology","first-page":"228","article-title":"Diversity-based approaches to software systems security","author":"Gherbi","year":"2011"},{"key":"10.1016\/j.future.2026.108419_bib0074","series-title":"2015IEEE International Conference on Information Reuse and Integration","first-page":"510","article-title":"Toward a moving target defense for web applications","author":"Taguinod","year":"2015"},{"key":"10.1016\/j.future.2026.108419_bib0075","series-title":"Proceedings of the Second ACM Workshop on Moving Target Defense","first-page":"49","article-title":"Adaptive just-in-time code diversification","author":"Jangda","year":"2015"},{"key":"10.1016\/j.future.2026.108419_bib0076","series-title":"Hotsec","article-title":"Software diversity: security, entropy and game theory","author":"Neti","year":"2012"},{"issue":"1","key":"10.1016\/j.future.2026.108419_bib0077","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.ijcip.2012.01.002","article-title":"Creating a cyber moving target for critical infrastructure applications using platform diversity","volume":"5","author":"Okhravi","year":"2012","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.future.2026.108419_bib0078","series-title":"7Th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","first-page":"241","article-title":"Chameleonsoft: a moving target defense system","author":"Azab","year":"2011"},{"key":"10.1016\/j.future.2026.108419_bib0079","series-title":"2014 7Th International Symposium on Resilient Control Systems (ISRCS)","first-page":"1","article-title":"Multiple OS rotational environment an implemented moving target defense","author":"Thompson","year":"2014"},{"key":"10.1016\/j.future.2026.108419_bib0080","unstructured":"K.M. Carter, H. Okhravi, J. Riordan, Quantitative analysis of active cyber defenses based on temporal platform diversity, arXiv preprint arXiv: 1401.8255(2014)."},{"key":"10.1016\/j.future.2026.108419_bib0081","series-title":"Proceedings of the 9Th International ACM Sigsoft Conference on Quality of Software Architectures","first-page":"33","article-title":"Architecture-based self-protecting software systems","author":"Yuan","year":"2013"},{"key":"10.1016\/j.future.2026.108419_bib0082","series-title":"Proceedings of the 19Th International Conference on Distributed Computing and Networking","first-page":"1","article-title":"Dolus: cyber defense using pretense against DDos attacks in cloud platforms","author":"Neupane","year":"2018"},{"key":"10.1016\/j.future.2026.108419_bib0083","series-title":"2014IEEE International Conference on Communications (ICC)","first-page":"592","article-title":"Morphing communications of cyber-physical systems towards moving-target defense","author":"Li","year":"2014"},{"key":"10.1016\/j.future.2026.108419_bib0084","unstructured":"T.O. Security, \u201cExploit Database\u201d Accessed Dec. 6, 2022, 2022, https:\/\/www.exploit-db.com."},{"key":"10.1016\/j.future.2026.108419_bib0085","article-title":"The threats to our products","volume":"33","author":"Kohnfelder","year":"1999","journal-title":"Microsoft Interface, Microsoft Corp."},{"key":"10.1016\/j.future.2026.108419_bib0086","unstructured":"O.N. Foundation, Open Network Operating System, 2021, Accessed 05 Feb 2021, https:\/\/opennetworking.org."},{"key":"10.1016\/j.future.2026.108419_bib0087","unstructured":"T.A.S. Foundation, \u201cApache HTTP server project\u201d Accessed Jun. 11, 2023, 2023, https:\/\/httpd.apache.org\/."},{"key":"10.1016\/j.future.2026.108419_bib0088","unstructured":"Netcraft Ltd, September 2022 Web Server Survey, 2022, [Online]. https:\/\/news.netcraft.com\/archives\/2022\/10\/18\/october-2022-web-server-survey.html. Accessed on 19\/10\/2022."},{"key":"10.1016\/j.future.2026.108419_bib0089","unstructured":"The Apache Software Foundation, ab - Apache HTTP server benchmarking tool, 2023, [Online]. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html. Accessed Jun. 11, 2023."},{"key":"10.1016\/j.future.2026.108419_bib0090","unstructured":"Lucas Souza, Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE), 2022, [Online]. https:\/\/www.exploit-db.com\/exploits\/50383. Accessed on 19\/10\/2022."},{"key":"10.1016\/j.future.2026.108419_bib0091","series-title":"2020 50Th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","first-page":"43","article-title":"Design and performance analysis of software defined networking based web services adopting moving target defense","author":"Kim","year":"2020"},{"key":"10.1016\/j.future.2026.108419_bib0092","article-title":"A bayesian nash equilibrium-based moving target defense against stealthy sensor attacks","author":"Umsonst","year":"2023","journal-title":"IEEE Trans. Automat. Contr."},{"issue":"6","key":"10.1016\/j.future.2026.108419_bib0093","doi-asserted-by":"crossref","first-page":"4719","DOI":"10.1109\/TDSC.2022.3232537","article-title":"WF-MTD: Evolutionary decision method for moving target defense based on wright-fisher process","volume":"20","author":"Tan","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"10.1016\/j.future.2026.108419_bib0094","article-title":"Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks","volume":"12","author":"Wang","year":"2017","journal-title":"PLoS ONE"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X26000531?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X26000531?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:53:49Z","timestamp":1774036429000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X26000531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":94,"alternative-id":["S0167739X26000531"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2026.108419","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"MTD in depth: Multi-phased moving target defense techniques against cyber-attacks based on cyber kill chain","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2026.108419","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108419"}}