{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:38:09Z","timestamp":1776443889375,"version":"3.51.2"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,28]]},"DOI":"10.1109\/vcc60689.2023.10474660","type":"proceedings-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T19:50:45Z","timestamp":1711482645000},"page":"31-36","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity Defense via Agile Virtual Infrastructure Deception"],"prefix":"10.1109","author":[{"given":"Andre","family":"Slonopas","sequence":"first","affiliation":[{"name":"American Public University Sysytem (APUS), School of Security and Global Studies (SSGS),Department of Cybersecurity,Charles Town,WV"}]},{"given":"Stephanie","family":"Travis","sequence":"additional","affiliation":[{"name":"Virginia Tech, National Security Institute,Intelligent Systems Division,Arlington,VA"}]},{"given":"Warren","family":"Thompson","sequence":"additional","affiliation":[{"name":"Dakota State University, The Beacom College of Computer and Cyber Sciences,Madison,SD"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.005"},{"key":"ref2","article-title":"Spread spectrum-secret military technology to 3G","author":"Malik","year":"2001","journal-title":"IEEE History of Telecommunications Contest"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2715824"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITAP.2011.6006307"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2889842"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633032"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.19"},{"issue":"5","key":"ref8","first-page":"128","article-title":"Cybersecurity enhancement via software-defined pseudo-random private IP address hopping","volume":"16","author":"Slonopas","journal-title":"World Academy of Science, Engineering and Technology, Open Science Index 185, International Journal of Computer and Information Engineering"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41579-2_31"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316229"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.136"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258787"},{"key":"ref13","article-title":"Geolite free geo IP database","volume-title":"Geolocate an IP address using Databases"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380830"},{"key":"ref15","volume-title":"GEODIST: Stata module to compute geographical distances","author":"Picard","year":"2019"},{"key":"ref16","journal-title":"A Methodology to Select Topology Generators for WANET Simulations (Extended Version)"},{"key":"ref17","first-page":"3571","article-title":"Asymptotic equivalence of Bayes cross validation and widely applicable information criterion in singular learning theory","volume":"11","author":"Watanabe","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-016-9696-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2009.2019430"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2008.2003324"}],"event":{"name":"2023 IEEE Virtual Conference on Communications (VCC)","location":"NY, USA","start":{"date-parts":[[2023,11,28]]},"end":{"date-parts":[[2023,11,30]]}},"container-title":["2023 IEEE Virtual Conference on Communications (VCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10474593\/10474603\/10474660.pdf?arnumber=10474660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T20:20:57Z","timestamp":1711657257000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10474660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,28]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/vcc60689.2023.10474660","relation":{},"subject":[],"published":{"date-parts":[[2023,11,28]]}}}