{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:31Z","timestamp":1771699831266,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cns.2013.6682717","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:48:17Z","timestamp":1387309697000},"page":"278-286","source":"Crossref","is-referenced-by-count":32,"title":["A moving target defense mechanism for MANETs based on identity virtualization"],"prefix":"10.1109","author":[{"given":"Massimiliano","family":"Albanese","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"De Benedictis","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"family":"Kun Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"83","article-title":"A new routing attack in mobile ad hoc networks","volume":"11","author":"yi","year":"2005","journal-title":"International Journal of Information Technology"},{"key":"17","first-page":"150","article-title":"A reference model for security level evaluation: Policy and fuzzy techniques","volume":"11","author":"casola","year":"2005","journal-title":"Journal of Universal Computer Science"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.5120\/5682-7721"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3927"},{"key":"16","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3233\/JCS-2007-15201","article-title":"A policy-based methodology for security evaluation: A security metric for public key infrastructures","volume":"15","author":"casola","year":"2007","journal-title":"Journal of Computer Security"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019354"},{"key":"14","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1179586"},{"key":"3","year":"2011","journal-title":"Trustworthy Cyberspace Strategic Plan for the Federal Cybersecurity Research and Development Program"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0977-9","volume":"54","author":"jajodia","year":"2011","journal-title":"Advances in Information Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"7","first-page":"183","article-title":"Adaptive use of network-centric mechanisms in cyber-defense","author":"atighetchi","year":"0","journal-title":"Proceedings of the Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2003) May 2003"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932214"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2013.6642449"},{"key":"4","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","volume":"2429","author":"douceur","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.006"}],"event":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","location":"National Harbor, MD, USA","start":{"date-parts":[[2013,10,14]]},"end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6675898\/6682673\/06682717.pdf?arnumber=6682717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T21:37:37Z","timestamp":1564954657000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6682717\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cns.2013.6682717","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}