{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:40:12Z","timestamp":1771702812628,"version":"3.50.1"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883401","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"701-706","source":"Crossref","is-referenced-by-count":71,"title":["Analysis of network address shuffling as a moving target defense"],"prefix":"10.1109","author":[{"given":"Thomas E.","family":"Carroll","sequence":"first","affiliation":[]},{"given":"Michael","family":"Crouse","sequence":"additional","affiliation":[]},{"given":"Errin W.","family":"Fulp","sequence":"additional","affiliation":[]},{"given":"Kenneth S.","family":"Berenhaut","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.006"},{"key":"2","article-title":"Implementing an IPv6 moving target defense on a live network","author":"dunlop","year":"2012","journal-title":"Proc of the National Symposium on Moving Target Research"},{"key":"10","author":"kotz","year":"2004","journal-title":"CRAWDAD Trace Dartmouth\/campus\/TCPdump\/fall03 (V 2004-11-09)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932214"},{"key":"7","author":"michalski","year":"2002","journal-title":"Final Report for the Network Security Mechanisms Utilizing Network Address Translation LDRD Project"},{"key":"6","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-1-4614-0977-9_2","article-title":"Effectiveness of moving target defenses","author":"evans","year":"2011","journal-title":"Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127449"},{"key":"4","first-page":"183","article-title":"Adaptive use of networkcentrick mechanisms in cyber-defense","author":"atighetchi","year":"2003","journal-title":"Proc IEEE Int l Symp Object-Oriented Real-Time Distributed Computing (ISORC)"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1201\/9781420059847","author":"mahmoud","year":"2008","journal-title":"Po?lya Urn Models"},{"key":"8","author":"crouse","year":"2012","journal-title":"Performance Analysis of Cyber Deception Using Probabilitistic Models"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","location":"Sydney, NSW","start":{"date-parts":[[2014,6,10]]},"end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883401.pdf?arnumber=6883401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T15:50:19Z","timestamp":1498146619000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883401","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}