{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:00:14Z","timestamp":1729612814935,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275907","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"1975-1981","source":"Crossref","is-referenced-by-count":7,"title":["Exploiting curse of diversity for improved network security"],"prefix":"10.1109","author":[{"given":"Ghanshyam S.","family":"Bopche","sequence":"first","affiliation":[]},{"given":"Babu M.","family":"Mehtre","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-70542-0_1","article-title":"Data space randomization","author":"bhatkar","year":"2008","journal-title":"Proceedings of the 5th International Conference on Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref12","article-title":"Survey of cyber moving target techniques","author":"okhravi","year":"0","journal-title":"Tech Rep"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1007\/978-3-319-11212-1_28","article-title":"Modeling network diversity for evaluating the robustness of networks against zeroday attacks","volume":"8713","author":"wang","year":"2014","journal-title":"Computer Security - ESORICS 2014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663479"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720656"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2011.27"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0977-9","author":"jajodia","year":"2011","journal-title":"Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats"},{"article-title":"W32.stuxnet dossier, symantec security response","year":"2011","author":"falliere","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.18"},{"volume":"54","journal-title":"Moving Target Defense","year":"2011","key":"ref5"},{"key":"ref8","first-page":"105","article-title":"Address obfuscation: an efficient approach to combat a broad range of memory error exploits","volume":"120","author":"bhatkar","year":"2003","journal-title":"Proceedings of the 12th USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958251"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.24"},{"article-title":"The pax address space layout randomization","year":"2015","author":"team","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13841-1_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/32.815323"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.61"},{"key":"ref21","first-page":"26","article-title":"Cluster security research involving the modeling of network exploitations using exploitation graphs","volume":"2","author":"li","year":"2006","journal-title":"Sixth IEEE International Symposium on Cluster Computing and the Grid 2006 CCGRID 06"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602117"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"volume":"6345","journal-title":"Computer Security - ESORICS 2010","year":"2010","key":"ref25"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275907.pdf?arnumber=7275907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T22:09:25Z","timestamp":1567202965000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275907\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275907","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}