{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T11:25:19Z","timestamp":1770722719922,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/tetc.2022.3155272","type":"journal-article","created":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T21:24:01Z","timestamp":1647293041000},"page":"1772-1788","source":"Crossref","is-referenced-by-count":16,"title":["Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0033-6706","authenticated-orcid":false,"given":"Hooman","family":"Alavizadeh","sequence":"first","affiliation":[{"name":"UNSW Institute for Cyber Security, University of New South Wales, Canberra, Campbell, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5870-9253","authenticated-orcid":false,"given":"Samin","family":"Aref","sequence":"additional","affiliation":[{"name":"Department of Mechanical and Industrial Engineering, University of Torontor, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2605-187X","authenticated-orcid":false,"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Information Technology and Electrical Engineering, University of Queensland, St Lucia, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1002-057X","authenticated-orcid":false,"given":"Julian","family":"Jang-Jaccard","sequence":"additional","affiliation":[{"name":"Cybersecurity Laboratory, Massey University, Auckland, New Zealand"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Return on security investment (ROSI)- A practical quantitative model","volume":"38","author":"sonnenreich","year":"2006","journal-title":"J Res Pract Inf Technol"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24864-1_8"},{"key":"ref32","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SecTech.2014.9"},{"key":"ref37","author":"sahner","year":"2012","journal-title":"Performance and Reliability Analysis of Computer Systems An Example-Based Approach Using the SHARPE Software Package"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/sec.299"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2012.06.002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.23"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18214-4_6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2015.84"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16825-3_2"},{"key":"ref12","first-page":"155","article-title":"Using centrality measures to rank the importance of the components of a complex network infrastructure","author":"cadini","year":"2008","journal-title":"Proc Int Conf Crit Informat Infrastructures Secur"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1601321"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2963791"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_9"},{"key":"ref16","article-title":"Evaluating information security investments from attackers perspective: The return-on-attack (ROA)","author":"cremonini","year":"2005","journal-title":"Proc Workshop Econ Informat Secur"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076759"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00867-2_15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102091"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614155"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3268966.3268967"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.009"},{"key":"ref29","author":"krutz","year":"2001","journal-title":"The CISSP Prep Guide Mastering the Ten Domains of Computer Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00087"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247115"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.006"},{"key":"ref2","first-page":"150","article-title":"An automated security analysis framework and implementation for MTD techniques on cloud","author":"alavizadeh","year":"2019","journal-title":"Proc Int Conf Inf Secur Cryptol"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/13623079.2011.587206"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.2988007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663480"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663479"},{"key":"ref22","first-page":"74","article-title":"HARMs: Hierarchical attack representation models for network security analysis","author":"hong","year":"2012","journal-title":"Proc 10th Australian Informat Secur Manag Conf"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465479"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75268-6_7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682692"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443790"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2467358"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2016.88"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542597"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9970409\/09733785.pdf?arnumber=9733785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:14:28Z","timestamp":1672082068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9733785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2022.3155272","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}