{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:03Z","timestamp":1766298303447,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/iri.2013.6642449","type":"proceedings-article","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T20:13:22Z","timestamp":1383164002000},"page":"22-29","source":"Crossref","is-referenced-by-count":45,"title":["A moving target defense approach for protecting resource-constrained distributed devices"],"prefix":"10.1109","author":[{"given":"Valentina","family":"Casola","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"De Benedictis","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1109\/WCNC.2010.5506580","article-title":"TinyPairing: Afast and lightweight pairing-based cryptographic library forwireless sensor networks","author":"xiong","year":"2010","journal-title":"Proc IEEE Wireless Communications and Networking Conference (WCNC"},{"journal-title":"WM-ECC An Ellipticcurve Cryptography Suite on Sensor Motes","year":"2007","author":"wang","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637932"},{"key":"15","first-page":"176","article-title":"Dynamic approachesto thwart adversary intelligence gathering","author":"kewley","year":"2011","journal-title":"Proceedingsof the DARPA Information Survivability Conference& Exposition (DISCEX 2011) Volume 1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"journal-title":"Moving Target DefenseII Application of Game Theory and Adversarial Modeling Volume 100 of Advances in Information Security","year":"2013","author":"jajodia","key":"13"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0977-9","author":"jajodia","year":"2011","journal-title":"Moving Target Defense Creating AsymmetricUncertainty for Cyber Threats Volume 54 of Advancesin Information Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031506"},{"key":"12","first-page":"77","article-title":"Moving target defense: Creating asymmetric uncertaintyfor cyber threats","author":"jackson","year":"2011","journal-title":"Chapter Compiler-Generated SoftwareDiversity"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2003.1199253"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.006"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682717"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"7","first-page":"326","article-title":"Securingthe deluge network programming system","author":"dutta","year":"0","journal-title":"Proceedings Ofthe Fifth International Conference on Information Processingin Sensor Networks (IPSN 2006)"},{"key":"6","first-page":"150","article-title":"A referencemodel for security level evaluation: Policy and fuzzy techniques","volume":"11","author":"casola","year":"2005","journal-title":"Journal of Universal Computer Science"},{"key":"5","first-page":"197","article-title":"Apolicy-based methodology for security evaluation: A securitymetric for public key infrastructures","volume":"15","author":"casola","year":"2007","journal-title":"The Computer J"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SRDSW.2011.27"},{"journal-title":"Executive Office of the President National Science AndTechnology Council Trustworthy Cyberspace","year":"2011","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-1-4614-0977-9_2","article-title":"Moving targetdefense: Creating asymmetric uncertainty for cyberthreats","author":"evans","year":"2011","journal-title":"Chapter Effectiveness of Moving Target Defenses"}],"event":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","start":{"date-parts":[[2013,8,14]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 IEEE 14th International Conference on Information Reuse &amp; Integration (IRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621630\/6642428\/06642449.pdf?arnumber=6642449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T14:41:39Z","timestamp":1564584099000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6642449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iri.2013.6642449","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}