{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:34Z","timestamp":1771699834906,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/iccnc.2016.7440635","type":"proceedings-article","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T16:20:24Z","timestamp":1458836424000},"page":"1-6","source":"Crossref","is-referenced-by-count":29,"title":["Frequency-minimal moving target defense using software-defined networking"],"prefix":"10.1109","author":[{"given":"Saptarshi","family":"Debroy","sequence":"first","affiliation":[]},{"given":"Prasad","family":"Calyam","sequence":"additional","affiliation":[]},{"given":"Minh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Allen","family":"Stage","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Georgiev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.35"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623770"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/SECPRI.2002.1004377","article-title":"Automated generation and analysis of attack graphs","author":"sheyner","year":"2002","journal-title":"Security and Privacy 2002 Proceedings 2002 IEEE Symposium on"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2007.4419720"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2352260"},{"key":"ref18","article-title":"The beta reputation system","author":"commerce","year":"2002","journal-title":"Proceedings of the 15th Bled Electronic Commerce Conference"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SC.Companion.2012.341"},{"key":"ref3","first-page":"284","article-title":"A new approach to intrusion detection system","volume":"36","author":"kartit","year":"2012"},{"key":"ref6","article-title":"NSF GENI Infrastructure","year":"0"},{"key":"ref5","article-title":"Openflow switch specification","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.03.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883401"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon.2012.6189438"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883418"}],"event":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","location":"Kauai, HI, USA","start":{"date-parts":[[2016,2,15]]},"end":{"date-parts":[[2016,2,18]]}},"container-title":["2016 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7430154\/7440540\/7440635.pdf?arnumber=7440635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T05:16:14Z","timestamp":1498281374000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7440635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2016.7440635","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}