{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:32:25Z","timestamp":1763458345392,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T00:00:00Z","timestamp":1506384000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DUE- 1344369"],"award-info":[{"award-number":["DUE- 1344369"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,26]]},"DOI":"10.1145\/3011883.3011889","type":"proceedings-article","created":{"date-parts":[[2016,12,15]],"date-time":"2016-12-15T13:03:54Z","timestamp":1481807034000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["I'm not sure if we're okay"],"prefix":"10.1145","author":[{"suffix":"II","given":"Mark E.","family":"Fioravanti","sequence":"first","affiliation":[{"name":"Florida Institute of Technology"}]},{"given":"Matt","family":"Bishop","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[{"name":"Florida Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2016,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.284.5418.1318"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278940.1278948"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2009.08.019"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0147314"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999405"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2958.2003.03688.x"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2601662"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.56"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.502225"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrmicro1557"},{"key":"e_1_3_2_1_15_1","volume-title":"Persister cells. Annual review of Microbiology, 64:357--372","author":"Lewis K.","year":"2010","unstructured":"K. Lewis. Persister cells. Annual review of Microbiology, 64:357--372, 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"Unrestricted warfare","author":"Liang Q.","year":"1999","unstructured":"Q. Liang and W. Xiangsui. Unrestricted warfare. PLA Literature and Arts Publishing House Beijing, 1999."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1128\/JB.01231-09"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WITS.1994.513922"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-genet-102108-134304"},{"key":"e_1_3_2_1_20_1","volume-title":"Microsoft Corp.","author":"Oram M.","year":"2012","unstructured":"M. Oram. Determined Adversaries and Targeted Attacks. Technical report, Microsoft Corp., Redmond, WA, USA, June 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073289"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1101\/cshperspect.a012427"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2509941"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0030-4387(00)00018-1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2180-6-53"},{"key":"e_1_3_2_1_27_1","volume-title":"Mexico","author":"Spengler B.","year":"2003","unstructured":"B. Spengler. Pax: The guaranteed end of arbitrary code execution. G-Con2: Mexico City, Mexico, 2003."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1050957"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"M. van Dijk A. Juels A. Oprea and R. L. Rivest. Flipit: The game of \"stealthy takeover\". Cryptology ePrint Archive Report 2012\/103 2012.","DOI":"10.1007\/s00145-012-9134-5"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.006"}],"event":{"name":"NSPW '16: New Security Paradigms Workshop 2016","sponsor":["ACSA Applied Computing Security Assoc","The National Science Foundation","DELL","CISCO"],"location":"Granby Colorado USA","acronym":"NSPW '16"},"container-title":["Proceedings of the 2016 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3011883.3011889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3011883.3011889","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3011883.3011889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:20:01Z","timestamp":1763457601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3011883.3011889"}},"subtitle":["uncertainty for attackers and defenders"],"short-title":[],"issued":{"date-parts":[[2016,9,26]]},"references-count":30,"alternative-id":["10.1145\/3011883.3011889","10.1145\/3011883"],"URL":"https:\/\/doi.org\/10.1145\/3011883.3011889","relation":{},"subject":[],"published":{"date-parts":[[2016,9,26]]},"assertion":[{"value":"2016-09-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}