{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:31:23Z","timestamp":1740148283129,"version":"3.37.3"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/tnsm.2020.3047649","type":"journal-article","created":{"date-parts":[[2020,12,28]],"date-time":"2020-12-28T20:46:31Z","timestamp":1609188391000},"page":"3154-3169","source":"Crossref","is-referenced-by-count":3,"title":["Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8785-8437","authenticated-orcid":false,"given":"Qisheng","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5908-4662","authenticated-orcid":false,"given":"Jin-Hee","family":"Cho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3279-2965","authenticated-orcid":false,"given":"Terrence J.","family":"Moore","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1657-6728","authenticated-orcid":false,"given":"Ing-Ray","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70802"},{"journal-title":"Improving ICS cyber resilience through optimal diversification of network resources","year":"2018","author":"li","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.23"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.129"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.102"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.05.021"},{"journal-title":"SNAP Datasets Stanford large network dataset collection","year":"2014","author":"leskovec","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2527788"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5373747"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.05.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2013.6682816"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","article-title":"Error and attack tolerance of complex networks","volume":"406","author":"albert","year":"2000","journal-title":"Nature"},{"year":"2020","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.48"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2433252"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.73"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.32"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443790"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.08.081"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"ref51","first-page":"43","article-title":"COTS diversity based intrusion detection and application to Web servers","author":"totel","year":"2005","journal-title":"Proc Int Workshop Recent Adv Intrusion Detect"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2005.855663"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508177"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2516916"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.04.011"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374640"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s100219900062"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.07.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/0608033"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2000.884700"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2005.852335"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.852183"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.055103"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.10.016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.7.00A162"},{"year":"2020","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900550"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/BFb0092620","article-title":"Percolation and disordered systems","volume":"1665","author":"grimmett","year":"1997","journal-title":"Lecture Notes in Mathematics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"ref3","first-page":"149","article-title":"On the implementation of N-version programming for software fault tolerance during execution","author":"avizienis","year":"1977","journal-title":"Proc Comput Soc Comput Softw Appl Conf (COMPSAC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/18\/6\/001"},{"journal-title":"Network Science","year":"2016","author":"barab\u00e1si","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.601"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2503335"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2197227"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/PBSE010E_ch12"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030101"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"ref48","article-title":"A specialization toolkit to increase the diversity of operating systems","author":"pu","year":"1996","journal-title":"Proc ICMAS Workshop Immunity Based Syst"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/app9112256"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2601009"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4614-0977-9_1","article-title":"A Formal Model for a System&#x2019;s Attack Surface","volume":"54","author":"manadhata","year":"2011","journal-title":"Moving Target Defense Ser Advances in Information Security"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/12.45203"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.61.5678"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9530845\/09309362.pdf?arnumber=9309362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:51Z","timestamp":1652194371000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9309362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":58,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2020.3047649","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2021,9]]}}}