{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:23:50Z","timestamp":1756311830229,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578785","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:25Z","timestamp":1377709885000},"page":"50-55","source":"Crossref","is-referenced-by-count":13,"title":["Moving target defense for adaptive adversaries"],"prefix":"10.1109","author":[{"given":"Richard","family":"Colbaugh","sequence":"first","affiliation":[]},{"given":"Kristin","family":"Glass","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Effectiveness of Moving Target Defense","year":"2011","author":"evans","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2012.6386855"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076787"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6283222"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984062"},{"key":"11","article-title":"Nash equilibria of static prediction games","author":"bruckner","year":"2009","journal-title":"Proc NIPS 2009"},{"key":"12","article-title":"Does coevolution in malware adaptation enable predictive analysis?","author":"colbaugh","year":"2010","journal-title":"IFA Workshop Exploring Malware Adaptation Patterns"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460019"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_32"},{"key":"22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1609\/aimag.v31i4.2311","article-title":"State of solving large incomplete information games, and application to poker","author":"sandholm","year":"2010","journal-title":"AI Magazine"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2150370"},{"key":"24","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1090\/psapm\/069\/2882634","article-title":"Deterministic evolutionary game theory","volume":"69","author":"hofbauer","year":"2011","journal-title":"Proc Symposium Applied Mathematics"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2008.931718"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-18"},{"year":"0","key":"27"},{"journal-title":"Proc 2012 IEEE International Conference on Intelligence and Security Informatics","year":"2012","key":"3"},{"journal-title":"Proc 2011 IEEE International Conference on Intelligence and Security Informatics","year":"2011","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2007.06.002"},{"journal-title":"Proc 2010 IEEE International Conference on Intelligence and Security Informatics","year":"2010","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143889"},{"key":"6","first-page":"555","article-title":"A minimax approach to classification","volume":"3","author":"lanckriet","year":"2002","journal-title":"J Machine Learning Research"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.037"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"8","article-title":"Convex learning with invariances","author":"teo","year":"2007","journal-title":"Proc NIPS 2007"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578785.pdf?arnumber=6578785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T09:22:43Z","timestamp":1563787363000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578785","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}