{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T19:58:16Z","timestamp":1778788696602,"version":"3.51.4"},"reference-count":174,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009917","name":"Naval Research Laboratory","doi-asserted-by":"publisher","award":["N00173-15-G017"],"award-info":[{"award-number":["N00173-15-G017"]}],"id":[{"id":"10.13039\/100009917","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009917","name":"Naval Research Laboratory","doi-asserted-by":"publisher","award":["N0017319-1-G002"],"award-info":[{"award-number":["N0017319-1-G002"]}],"id":[{"id":"10.13039\/100009917","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-18-1-0067"],"award-info":[{"award-number":["FA9550-18-1-0067"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000104","name":"National Aeronautics and Space Administration","doi-asserted-by":"publisher","award":["NNX17AD06G"],"award-info":[{"award-number":["NNX17AD06G"]}],"id":[{"id":"10.13039\/100000104","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2892"],"award-info":[{"award-number":["N00014-16-1-2892"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2442"],"award-info":[{"award-number":["N00014-18-1-2442"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-12840"],"award-info":[{"award-number":["N00014-18-12840"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000082","name":"NSF U.S.","doi-asserted-by":"publisher","award":["DGE-1723440"],"award-info":[{"award-number":["DGE-1723440"]}],"id":[{"id":"10.13039\/100000082","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000082","name":"NSF U.S.","doi-asserted-by":"publisher","award":["OAC-1642031"],"award-info":[{"award-number":["OAC-1642031"]}],"id":[{"id":"10.13039\/100000082","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000082","name":"NSF U.S.","doi-asserted-by":"publisher","award":["SaTC-1528099"],"award-info":[{"award-number":["SaTC-1528099"]}],"id":[{"id":"10.13039\/100000082","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000082","name":"NSF U.S.","doi-asserted-by":"publisher","award":["1723440"],"award-info":[{"award-number":["1723440"]}],"id":[{"id":"10.13039\/100000082","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSF China","doi-asserted-by":"publisher","award":["61628201"],"award-info":[{"award-number":["61628201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSF China","doi-asserted-by":"publisher","award":["61571375"],"award-info":[{"award-number":["61571375"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"JP Morgan AI Research Faculty Award"},{"DOI":"10.13039\/100000185","name":"DARPA CHASE","doi-asserted-by":"publisher","award":["W912CG-19-C-0003"],"award-info":[{"award-number":["W912CG-19-C-0003"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IBM Ph.D. Fellowship"},{"DOI":"10.13039\/501100002403","name":"a scholarship from Taibah University through Saudi Arabian Cultural Mission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002403","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/comst.2020.2982955","type":"journal-article","created":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T19:49:44Z","timestamp":1585252184000},"page":"1909-1941","source":"Crossref","is-referenced-by-count":228,"title":["A Survey of Moving Target Defenses for Network Security"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6059-7967","authenticated-orcid":false,"given":"Sailik","family":"Sengupta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7131-067X","authenticated-orcid":false,"given":"Ankur","family":"Chowdhary","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6373-3584","authenticated-orcid":false,"given":"Abdulhakim","family":"Sabur","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1520-5485","authenticated-orcid":false,"given":"Adel","family":"Alshamrani","sequence":"additional","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Subbarao","family":"Kambhampati","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref172","author":"frahim","year":"2014","journal-title":"Cisco ASA All-in-One Next-Generation Firewall IPS and VPN Services"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"},{"key":"ref174","article-title":"Towards micro-segmentation in 5G network security","author":"m\u00e4mmel\u00e4","year":"2016","journal-title":"Proc Eur Conf Netw Commun Workshop Netw Manag Qual Service Security 5G Netw (EuCNC)"},{"key":"ref173","year":"2018","journal-title":"Palo Alto Next Generation Firewall"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_18"},{"key":"ref169","first-page":"473","article-title":"S3: A DFW-based scalable security state analysis framework for large-scale data center networks","author":"sabur","year":"2019","journal-title":"Proc 20th Int Symp Res Attacks Intrusions Defenses (RAID)"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263942"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3268966.3268971"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.54"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00020"},{"key":"ref30","author":"szegedy","year":"2013","journal-title":"Intriguing properties of neural networks"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.39"},{"key":"ref36","first-page":"186","article-title":"Foundations of attack trees","volume":"3935","author":"mauw","year":"2005","journal-title":"Proc ICISC"},{"key":"ref35","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb&#x2019;s J"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.08.023"},{"key":"ref28","article-title":"Cowrie Honeypot","author":"oosterhof","year":"2014","journal-title":"Security Intelligence"},{"key":"ref27","article-title":"Honeypot-based forensics","author":"pouget","year":"2004","journal-title":"Proc AusCERT Asia&#x2013;Pac Inf Technol Security Conf"},{"key":"ref29","year":"2013","journal-title":"Intrusion detection evasion How attackers get past the burglar alarm"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2011.66"},{"key":"ref22","author":"rehman","year":"2003","journal-title":"Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort Apache MySQL PHP and ACID"},{"key":"ref21","first-page":"383","article-title":"A brief study and comparison of snort and bro open source network intrusion detection systems","volume":"1","author":"mehra","year":"2012","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-014-0277-7"},{"key":"ref101","author":"valizadeh","year":"2019","journal-title":"Toward a theory of cyber attacks"},{"key":"ref26","article-title":"The NetFilter framework in Linux 2.4","author":"welte","year":"2000","journal-title":"Linux-Kongress"},{"key":"ref100","first-page":"709","article-title":"Dynamic programming for partially observable stochastic games","volume":"4","author":"hansen","year":"2004","journal-title":"Proc AAAI"},{"key":"ref25","first-page":"386","article-title":"Intrusion prevention system design","author":"zhang","year":"2004","journal-title":"Proc IEEE CIT"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39218-4_25"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995274"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6391502"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995281"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2726066"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00087"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168675"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808480"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_11"},{"key":"ref147","first-page":"527","article-title":"Network simulations with the ns-3 simulator","volume":"14","author":"henderson","year":"2008","journal-title":"SIGCOMM Demonstration"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.66"},{"key":"ref149","first-page":"693","article-title":"NetHide: Secure and practical network topology obfuscation","author":"meier","year":"2018","journal-title":"Proc 27th USENIX Security Symp (USENIX Security)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3132114.3132127"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3137571"},{"key":"ref57","first-page":"892","article-title":"Deceiving cyber adversaries: A game theoretic approach","author":"schlenker","year":"2018","journal-title":"Proc 7th Int Conf Auton Agents Multiagent Syst"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1560594"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.108"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682717"},{"key":"ref52","first-page":"310","article-title":"Random host mutation for moving target defense","author":"al-shaer","year":"2012","journal-title":"Proc Int Conf Secur Privacy Commun Syst"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.54"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663486"},{"key":"ref165","first-page":"246","article-title":"Simulation-based approaches to studying effectiveness of moving-target network defense","author":"zhuang","year":"2012","journal-title":"Proc of the National Symposium on Moving Target Research"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_7"},{"key":"ref163","volume":"1","author":"mell","year":"2007","journal-title":"A Complete Guide to the Common Vulnerability Scoring System Version 2 0"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443790"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1002\/sec.299"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21236\/ADA591804"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.35"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"ref8","first-page":"94560l","article-title":"Quantification of moving target cyber defenses","volume":"9456","author":"farris","year":"2015","journal-title":"Proc Sensors Command Control Commun Intell (C3I) Technol Homeland Security Defense Law Enforcement XIV"},{"key":"ref49","first-page":"8","article-title":"MULVAL: A logic-based network security analyzer","author":"ou","year":"2005","journal-title":"Proc Usenix Security Symp"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.137"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860466"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1607877"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1601321"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_17"},{"key":"ref45","first-page":"344","article-title":"Tools for generating and analyzing attack graphs","author":"sheyner","year":"2003","journal-title":"Proc Symp Formal Methods for Components and Objects"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.09.001"},{"key":"ref42","article-title":"From attack graphs to automated configuration management&#x2014;An iterative approach","author":"homer","year":"2008"},{"key":"ref41","first-page":"1","article-title":"Scalable attack graph for risk assessment","author":"lee","year":"2009","journal-title":"Proc IEEE Int Conf Inf Netw (ICOIN)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076738"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_2"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460040"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_6"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995282"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.037"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3040992.3040998"},{"key":"ref72","article-title":"Moving target defense using live migration of Docker containers","author":"bohara","year":"2017"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795481"},{"key":"ref71","article-title":"Improving the diversity defense of genetic algorithm-based moving target approaches","author":"crouse","year":"2012","journal-title":"Proc of the National Symposium on Moving Target Research"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127498"},{"key":"ref70","first-page":"5","article-title":"Software diversity: Security, entropy and game theory","author":"neti","year":"2012","journal-title":"Proc USENIX Conf Hot Topics Secur"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995280"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808476"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_19"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25594-1_1"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2012.6378159"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614155"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.383"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32430-8_29"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"ref79","article-title":"Markov game modeling of moving target defense for strategic detection of threats in cloud networks","author":"chowdhary","year":"2019","journal-title":"Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"ref135","first-page":"446","article-title":"A study on NSL-KDD dataset for intrusion detection system based on classification algorithms","volume":"4","author":"dhanabal","year":"2015","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_9"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4862"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2633983"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762291"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_1"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663479"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_15"},{"key":"ref64","first-page":"178","article-title":"A game theoretic approach to strategy generation for moving target defense in Web applications","author":"sengupta","year":"2017","journal-title":"Proc 16th Conf Auton Agents MultiAgent Syst"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663478"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2421391"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2014.6900086"},{"key":"ref142","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 13th Syst Admin Conf LISA"},{"key":"ref67","first-page":"188","article-title":"Software defined stochastic model for moving target defense","author":"el mir","year":"2016","journal-title":"Proc Int Afro Eur Conf Ind Adv"},{"key":"ref143","first-page":"231","article-title":"The Folk theorem with imperfect public information","author":"fudenberg","year":"2009","journal-title":"A Long-Run Collaboration On Long-Run Games"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440635"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623770"},{"key":"ref2","author":"panetta","year":"2016","journal-title":"Gartner's Top 10 Security Predictions 2016"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808483"},{"key":"ref145","first-page":"157","article-title":"NESSi2 simulator for large-scale DDoS attack analysis","author":"kosowski","year":"2011","journal-title":"Proc IEEE Perspective Technol Methods MEMS Design"},{"key":"ref1","year":"2018","journal-title":"Gartner Identifies the Top 10 Trends Impacting Infrastructure and Operations for 2019"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.32"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2864873"},{"key":"ref108","year":"2018","journal-title":"Cryptotrap TRAPX"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808482"},{"key":"ref107","year":"2018","journal-title":"Deceptiongrid TRAPX"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995273"},{"key":"ref106","year":"2018","journal-title":"Moving Target Defense Redefining the Power of Defense"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685647"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"ref91","first-page":"1377","article-title":"Moving target defense for Web applications using Bayesian Stackelberg games","author":"vadlamudi","year":"2016","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406221"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774775"},{"key":"ref103","author":"sherry","year":"2012","journal-title":"A survey of enterprise middlebox deployments"},{"key":"ref102","article-title":"Spatial&#x2013;temporal moving target defense: A Markov Stackelberg game model","author":"li","year":"2020"},{"key":"ref111","first-page":"3","article-title":"U-TRI: Unlinkability through random identifier for SDN network","author":"wang","year":"2017","journal-title":"Proceedings of the First ACM Workshop on Moving Target Defense"},{"key":"ref112","year":"2017","journal-title":"RYU SDN Controller"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918985"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2943151"},{"key":"ref99","author":"russell","year":"2016","journal-title":"Artificial Intelligence A Modern Approach"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.39.10.1953"},{"key":"ref97","volume":"3","author":"osborne","year":"2004","journal-title":"An Introduction to Game Theory"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3759626"},{"key":"ref11","first-page":"4","article-title":"Open source vulnerability database (OSVDB)","author":"kouns","year":"2008","journal-title":"The Open Source Business Resource"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-51"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"ref15","author":"martin","year":"2017","journal-title":"Cyber Kill Chain"},{"key":"ref118","author":"scherfke","year":"2019","journal-title":"Simpy Testbed"},{"key":"ref16","year":"2013","journal-title":"APT1 Exposing One of China&#x2019;s Cyber Espionage Units"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.15"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140550"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.09.006"},{"key":"ref81","first-page":"19","article-title":"From physical security to cybersecurity","volume":"1","author":"sinha","year":"2015","journal-title":"Cybersecurity"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/sym6040997"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885853"},{"key":"ref119","first-page":"36","article-title":"Introducing CloudLab: Scientific infrastructure for advancing cloud architectures and applications","volume":"39","author":"ricci","year":"2014","journal-title":"Proc Mag USENIX SAGE"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7298r1"},{"key":"ref83","first-page":"485","article-title":"Optimal randomized classification in adversarial settings","author":"vorobeychik","year":"2014","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref114","first-page":"15","article-title":"The LLVM compiler framework and infrastructure tutorial","author":"lattner","year":"2004","journal-title":"Proc Int Workshop Lang Compilers Parallel Comput"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2433252"},{"key":"ref116","article-title":"Content management system","author":"baxter","year":"2002"},{"key":"ref80","first-page":"479","article-title":"MTDeep: Boosting the security of deep neural nets against adversarial attacks with moving target defense","author":"sengupta","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140555"},{"key":"ref120","article-title":"Moving target defense for securing smart grid communications: Architectural design, implementation and evaluation","author":"pappa","year":"2016"},{"key":"ref89","author":"lyon","year":"2009","journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning"},{"key":"ref121","year":"2018","journal-title":"Moving Target Defense"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.5120\/8738-2991"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995283"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3659167"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180473"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9739\/9173582\/9047923-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9173582\/09047923.pdf?arnumber=9047923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:58:58Z","timestamp":1651078738000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9047923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":174,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2020.2982955","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}