{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:19:43Z","timestamp":1771467583595,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIP-1266147"],"award-info":[{"award-number":["IIP-1266147"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Sciences and Engineering Research Council of Canada Discovery","award":["N01035"],"award-info":[{"award-number":["N01035"]}]},{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["60NANB14D060"],"award-info":[{"award-number":["60NANB14D060"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["60NANB15D091"],"award-info":[{"award-number":["60NANB15D091"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-15-1-2007"],"award-info":[{"award-number":["N00014-15-1-2007"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421"],"award-info":[{"award-number":["W911NF-13-1-0421"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/tifs.2016.2516916","type":"journal-article","created":{"date-parts":[[2016,1,12]],"date-time":"2016-01-12T20:46:36Z","timestamp":1452631596000},"page":"1071-1086","source":"Crossref","is-referenced-by-count":108,"title":["Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks"],"prefix":"10.1109","volume":"11","author":[{"given":"Mengyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lingyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Anoop","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Automated attacker correlation for malicious code","author":"dullien","year":"2010","journal-title":"Proc NATO RTO Inf Assurance Cyber Defence"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"ref33","first-page":"171","article-title":"Identifying redundancy in source code using fingerprints","volume":"1","author":"johnson","year":"1993","journal-title":"Proc Conf Centre Adv Stud Collaborative Res Softw Eng"},{"key":"ref32","article-title":"Simulation-based approaches to studying effectiveness of moving-target network defense","author":"zhuang","year":"2012","journal-title":"Proc of the National Symposium on Moving Target Research"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_5"},{"key":"ref30","year":"2015","journal-title":"CVE for Ubuntu 11 04"},{"key":"ref37","article-title":"BitShred: Fast, scalable malware triage","author":"jang","year":"2010"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.19"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-009-9074-y"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1145\/1287624.1287698","article-title":"Efficient token based clone detection with flexible tokenization","author":"basit","year":"2007","journal-title":"The Joint Meeting of European Softw Eng and ACM SIGSOFT Symp Found of Softw Eng"},{"key":"ref28","author":"gaitanis","year":"2013","journal-title":"Openbayes 0 1 0"},{"key":"ref27","year":"2008","journal-title":"National Vulnerability Database"},{"key":"ref29","year":"2015","journal-title":"Penetration Testing Virtual Labs"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_26"},{"key":"ref1","article-title":"W32.stuxnet dossier","author":"falliere","year":"2011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263942"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"ref25","article-title":"Topological analysis of network attack vulnerability","author":"jajodia","year":"2003","journal-title":"Managing Cyber Threats Issues Approaches and Challenges"},{"key":"ref50","first-page":"149","article-title":"On the implementation of N-version programming for software fault tolerance during execution","author":"avizienis","year":"1977","journal-title":"Proc IEEE COMPSAC"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004589"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848142"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279531"},{"key":"ref56","first-page":"43","article-title":"COTS diversity based intrusion detection and application to Web servers","author":"totel","year":"2005","journal-title":"Proc RAID"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.1"},{"key":"ref54","year":"2015","journal-title":"PaX Address Space Layout Randomization"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146277"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/384192.384195"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0977-9","author":"jajodia","year":"2011","journal-title":"Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.01.011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374640"},{"key":"ref13","article-title":"Would diversity really increase the robustness of the routing infrastructure against software defects?","author":"caballero","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref14","first-page":"494","article-title":"Modeling network diversity for evaluating the robustness of networks against zero-day attacks","author":"wang","year":"2014","journal-title":"Proc ESORICS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7214-9"},{"key":"ref16","author":"pielou","year":"1975","journal-title":"Ecological diversity"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/1934352"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1890\/10-2402.1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/35012234"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_2"},{"key":"ref3","article-title":"N-variant systems: A secretless framework for security through diversity","author":"cox","year":"2006","journal-title":"Proc 15th Conf USENIX Secur Symp"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958251"},{"key":"ref5","first-page":"287","article-title":"Diverse replication for single-machine Byzantine-fault tolerance","author":"chun","year":"2008","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref7","first-page":"105","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","author":"bhatkar","year":"2003","journal-title":"Proc 12th USENIX Secur Symp"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_38"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.24"},{"key":"ref45","first-page":"573","article-title":"k-zero day safety: Measuring the security risk of networks against unknown attacks","author":"wang","year":"2010","journal-title":"Proc European Symp Research in Computer Security (ESORICS)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.66"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73538-0_9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.61"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624046"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1314257.1314273"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/10206\/7419279\/7378495-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7419279\/07378495.pdf?arnumber=7378495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:49Z","timestamp":1649443909000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7378495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":58,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2516916","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5]]}}}