{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:32:24Z","timestamp":1725607944416},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/ccta41146.2020.9206360","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:39:12Z","timestamp":1601426352000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks"],"prefix":"10.1109","author":[{"given":"Zhentian","family":"Qian","sequence":"first","affiliation":[]},{"given":"Jie","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Quanyan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403457"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2627033"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"year":"0","key":"ref30","article-title":"Common Vulnerability Scoring System SIG"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v24i1.7638","article-title":"Complexity of computing optimal Stackelberg strategies in security resource allocation games","author":"korzhyk","year":"2010","journal-title":"Twenty-Fourth AAAI Conference on Artificial Intelligence"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-20568-4_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024623"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281598"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3338468.3356830"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443790"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwz218"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2924130"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2019.2962316"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101660"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33432-1_10"},{"journal-title":"Virtual Honeypots From Botnet Tracking to Intrusion Detection","year":"2007","author":"provos","key":"ref3"},{"journal-title":"Attack Trees","year":"2007","author":"schneier","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19751-2_6"},{"key":"ref8","article-title":"HARMs: Hierarchical Attack Representation Models for Network Security Analysis","author":"hong","year":"2012","journal-title":"Australian Information Security Management Conference SRI Security Research Institute Edith Cowan University"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443790"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32699-3"},{"journal-title":"Network lateral movement from an attacker&#x2019;s perspective","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2982955"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_14"},{"key":"ref21","first-page":"75","article-title":"Quantitative evaluation of attack defense trees using stochastic timed automata","author":"hansen","year":"2017","journal-title":"International workshop on Graphical Models for Security"},{"journal-title":"Principles of Model Checking (Represen-tation and Mind Series)","year":"2008","author":"baier","key":"ref24"},{"key":"ref23","first-page":"80","article-title":"Foundations of attack-defense trees","author":"kordy","year":"2010","journal-title":"International Workshop on Formal Aspects in Security and Trust"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8_27"},{"key":"ref25","first-page":"364","article-title":"Synthesis of Reactive(1)Designs","author":"piterman","year":"2006","journal-title":"Verification Model Checking and Abstract Interpretation ser Lecture Notes in Computer Science"}],"event":{"name":"2020 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2020,8,24]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,8,26]]}},"container-title":["2020 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200884\/9206152\/09206360.pdf?arnumber=9206360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T06:20:11Z","timestamp":1669011611000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9206360\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ccta41146.2020.9206360","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}