{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:48:24Z","timestamp":1761648504830,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-13-1-0703"],"award-info":[{"award-number":["N00014-13-1-0703"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421 and W911NF-13-1-0317"],"award-info":[{"award-number":["W911NF-13-1-0421 and W911NF-13-1-0317"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-16-1-0030"],"award-info":[{"award-number":["FA9550-16-1-0030"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3140549.3140550","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"53-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Performance Modeling of Moving Target Defenses"],"prefix":"10.1145","author":[{"given":"Warren","family":"Connell","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Daniel A.","family":"Menasc\u00e9","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503226"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997517"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682717"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868630.1868634"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.15"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEPEND.2009.15"},{"key":"e_1_3_2_1_7_1","unstructured":"David Barroso Berrueta. 2003. A practical approach for defeating Nmap OS-Fingerprinting. (2003). http:\/\/nmap.org\/misc\/defeat-nmap-osdetect.html  David Barroso Berrueta. 2003. A practical approach for defeating Nmap OS-Fingerprinting. (2003). http:\/\/nmap.org\/misc\/defeat-nmap-osdetect.html"},{"key":"e_1_3_2_1_8_1","volume-title":"Keromytis","author":"Boyd Stephen W.","year":"2004","unstructured":"Stephen W. Boyd and Angelos D . Keromytis . 2004 . SQLrand: Preventing SQL Injection Attacks. In Proceedings of the 2nd International Conference on Applied Cryptography and Network Security (ACNS 2004) (Lecture Notes in Computer Science), Markus Jakobsson, Moti Yung, and Jianying Zhou (Eds.), Vol. 3089 . Springer , Yellow Mountain, China, 292--302. Stephen W. Boyd and Angelos D. Keromytis. 2004. SQLrand: Preventing SQL Injection Attacks. In Proceedings of the 2nd International Conference on Applied Cryptography and Network Security (ACNS 2004) (Lecture Notes in Computer Science), Markus Jakobsson, Moti Yung, and Jianying Zhou (Eds.), Vol. 3089. Springer, Yellow Mountain, China, 292--302."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2209-8_16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883401"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the IEEE Conference on Communications and Network Security (IEEE CNS","author":"Duan Qi","year":"2013","unstructured":"Qi Duan , Ehab Al-Shaer , and Haadi Jafarian . 2013 . Efficient Random Route Mutation Considering Flow and Network Constraints . In Proceedings of the IEEE Conference on Communications and Network Security (IEEE CNS 2013). IEEE, Washington, DC, USA, 260--268. Qi Duan, Ehab Al-Shaer, and Haadi Jafarian. 2013. Efficient Random Route Mutation Considering Flow and Network Constraints. In Proceedings of the IEEE Conference on Communications and Network Security (IEEE CNS 2013). IEEE, Washington, DC, USA, 260--268."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the National Moving Target Research Symposium","author":"Dunlop Matthew","year":"2012","unstructured":"Matthew Dunlop , Stephen Groat , Randy Marchany , and Joseph Tront . 2012 . Implementing an IPv6 Moving Target Defense on a Live Network . In Proceedings of the National Moving Target Research Symposium . Annapolis, MD, USA. Matthew Dunlop, Stephen Groat, Randy Marchany, and Joseph Tront. 2012. Implementing an IPv6 Moving Target Defense on a Live Network. In Proceedings of the National Moving Target Research Symposium. Annapolis, MD, USA."},{"key":"e_1_3_2_1_13_1","volume-title":"National Science and Technology Council","author":"President Executive Office","year":"2011","unstructured":"Executive Office of the President , National Science and Technology Council 2011 . Trustworthy Cyberspace : Strategic Plan for the Federal Cybersecurity Research and Development Program . http:\/\/www.whitehouse.gov\/. (December 2011). Executive Office of the President, National Science and Technology Council 2011. Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. http:\/\/www.whitehouse.gov\/. (December 2011)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of SPIE Defense + Security","author":"Katheryn","year":"2015","unstructured":"Katheryn A. Farris and George Cybenko. 2015. Quantification of Moving Target Cyber Defenses . In Proceedings of SPIE Defense + Security 2015 . Baltimore, MD, USA. Katheryn A. Farris and George Cybenko. 2015. Quantification of Moving Target Cyber Defenses. In Proceedings of SPIE Defense + Security 2015. Baltimore, MD, USA."},{"key":"e_1_3_2_1_15_1","volume-title":"Amin","author":"Hutchins Eric M.","year":"2010","unstructured":"Eric M. Hutchins , Michael J. Cloppert , and Rohan M . Amin . 2010 . Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Lockheed Martin Corporation . (2010). Eric M. Hutchins, Michael J. Cloppert, and Rohan M. Amin. 2010. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Lockheed Martin Corporation. (2010)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663483"},{"key":"e_1_3_2_1_18_1","volume-title":"Advances in Information Security","volume":"54","author":"Jajodia Sushil","year":"2011","unstructured":"Sushil Jajodia , Anup K. Ghosh , Vipin Swarup , Cliff Wang , and Xiaoyang Sean Wang ( Eds .). 2011 . Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats (1st ed.) . Advances in Information Security , Vol. 54 . Springer. Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and Xiaoyang Sean Wang (Eds.). 2011. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats (1st ed.). Advances in Information Security, Vol. 54. Springer."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614155"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.35"},{"volume-title":"Queueing Systems. Volume 1: Theory","author":"Kleinrock Leonard","key":"e_1_3_2_1_21_1","unstructured":"Leonard Kleinrock . 1975. Queueing Systems. Volume 1: Theory . Wiley-Interscience . Leonard Kleinrock. 1975. Queueing Systems. Volume 1: Theory. Wiley-Interscience."},{"key":"e_1_3_2_1_22_1","unstructured":"Gordon Fyodor Lyon. 2009. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure.  Gordon Fyodor Lyon. 2009. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995273"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1200305"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2006.37"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13173-012-0062-x"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995280"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822645"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808476"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140550","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:20Z","timestamp":1750212680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140550"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":30,"alternative-id":["10.1145\/3140549.3140550","10.1145\/3140549"],"URL":"https:\/\/doi.org\/10.1145\/3140549.3140550","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}