{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:42Z","timestamp":1750221282100,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3140549.3140563","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Science, Security and Academic Literature"],"prefix":"10.1145","author":[{"given":"Paul C.","family":"van Oorschot","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0901404106"},{"key":"e_1_3_2_1_2_1","volume-title":"Truth and Logic","author":"Ayer Alfred Jules","year":"1946","unstructured":"Alfred Jules Ayer . 2014. Language , Truth and Logic . Dover Publications , New York (unaltered reproduction of 2\/e, 1946 ). Alfred Jules Ayer. 2014. Language, Truth and Logic. Dover Publications, New York (unaltered reproduction of 2\/e, 1946)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8093"},{"key":"e_1_3_2_1_4_1","volume-title":"What is this thing called Science?","author":"Chalmers Alan F.","unstructured":"Alan F. Chalmers . 2013. What is this thing called Science? ( 4 th edition). Hackett Publishing . Alan F. Chalmers. 2013. What is this thing called Science? (4th edition). Hackett Publishing.","edition":"4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.200"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/359104.359106"},{"key":"e_1_3_2_1_8_1","volume-title":"The limits of formal security models. Nat Computer Sys Security Award. Acceptance speech","author":"Denning Dorothy","year":"1999","unstructured":"Dorothy Denning . 1999. The limits of formal security models. Nat Computer Sys Security Award. Acceptance speech ( 1999 ). Dorothy Denning. 1999. The limits of formal security models. Nat Computer Sys Security Award. Acceptance speech (1999)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2447976.2447988"},{"key":"e_1_3_2_1_10_1","unstructured":"Richard P. Feynman. 2010. \"Surely You're Joking Mr. Feynman!\" Adventures of a Curious Character. Norton & Co.  Richard P. Feynman. 2010. \"Surely You're Joking Mr. Feynman!\" Adventures of a Curious Character. Norton & Co."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"volume-title":"Theory and reality: An introduction to the philosophy of science","author":"Godfrey-Smith Peter","key":"e_1_3_2_1_12_1","unstructured":"Peter Godfrey-Smith . 2009. Theory and reality: An introduction to the philosophy of science . University of Chicago Press. Peter Godfrey-Smith. 2009. Theory and reality: An introduction to the philosophy of science. University of Chicago Press."},{"key":"e_1_3_2_1_13_1","unstructured":"Donald I. Good. 1986. The Foundations of Computer Security: We Need Some. (1986). Essay.  Donald I. Good. 1986. The Foundations of Computer Security: We Need Some. (1986). Essay."},{"key":"e_1_3_2_1_14_1","volume-title":"van Oorschot","author":"Herley Cormac","year":"2017","unstructured":"Cormac Herley and Paul C . van Oorschot . 2017 . SoK: Science, Security , and the Elusive Goal of Security as a Scientific Pursuit IEEE Symp. Security and Privacy . 99--120. Cormac Herley and Paul C. van Oorschot. 2017. SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit IEEE Symp. Security and Privacy. 99--120."},{"key":"e_1_3_2_1_15_1","volume-title":"Report JSR-10-102.","author":"Program Office JASON","year":"2010","unstructured":"JASON Program Office , Report JSR-10-102. 2010 . Science of Cyber-security . (2010). JASON Program Office, Report JSR-10-102. 2010. Science of Cyber-security. (2010)."},{"key":"e_1_3_2_1_16_1","first-page":"972","article-title":"The uneasy relationship between mathematics and cryptography","volume":"54","author":"Koblitz Neal","year":"2007","unstructured":"Neal Koblitz . 2007 . The uneasy relationship between mathematics and cryptography . Notices of the AMS , Vol. 54 , 8 (2007), 972 -- 979 . Neal Koblitz. 2007. The uneasy relationship between mathematics and cryptography. Notices of the AMS, Vol. 54, 8 (2007), 972--979.","journal-title":"Notices of the AMS"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0432-z"},{"volume-title":"The Structure of Scientific Revolutions","author":"Kuhn Thomas S.","key":"e_1_3_2_1_18_1","unstructured":"Thomas S. Kuhn . 1962. The Structure of Scientific Revolutions . University of Chicago Press (first edition) . Thomas S. Kuhn. 1962. The Structure of Scientific Revolutions. University of Chicago Press (first edition)."},{"key":"e_1_3_2_1_19_1","volume-title":"Cybersecurity: From engineering to science.","author":"Landwehr Carl","year":"2012","unstructured":"Carl Landwehr . 2012 . Cybersecurity: From engineering to science. (2012), 2-5. In [28]. Carl Landwehr. 2012. Cybersecurity: From engineering to science. (2012), 2-5. In [28]."},{"key":"e_1_3_2_1_20_1","volume-title":"Barriers to achieving a science of cybersecurity. (2012), 14-15. In [27]","author":"Longstaff Tom","year":"2012","unstructured":"Tom Longstaff . 2012. Barriers to achieving a science of cybersecurity. (2012), 14-15. In [27] ; talk transcript (15 Mar 2012 ) at https:\/\/www.nsf.gov\/attachments\/123376\/public\/transcript.pdf. Tom Longstaff. 2012. Barriers to achieving a science of cybersecurity. (2012), 14-15. In [27]; talk transcript (15 Mar 2012) at https:\/\/www.nsf.gov\/attachments\/123376\/public\/transcript.pdf."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920281"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.31"},{"volume-title":"Proc. NSPW. ACM, 1--6.","author":"Maxion R. A.","key":"e_1_3_2_1_23_1","unstructured":"R. A. Maxion , T. A. Longstaff , and J. McHugh . 2010. Why is there no science in cyber science? (panel) . Proc. NSPW. ACM, 1--6. R. A. Maxion, T. A. Longstaff, and J. McHugh. 2010. Why is there no science in cyber science? (panel). Proc. NSPW. ACM, 1--6."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90065-1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465058"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.48795"},{"key":"e_1_3_2_1_27_1","volume-title":"Building a national program for cybersecurity science. The Next Wave","author":"NSA","year":"2012","unstructured":"NSA 2012. Building a national program for cybersecurity science. The Next Wave ( 2012 ). vol. 19 , no.4. NSA 2012. Building a national program for cybersecurity science. The Next Wave (2012). vol.19, no.4."},{"key":"e_1_3_2_1_28_1","volume-title":"Developing a blueprint for a science of cybersecurity. The Next Wave","author":"NSA","year":"2012","unstructured":"NSA 2012. Developing a blueprint for a science of cybersecurity. The Next Wave ( 2012 ). vol. 19 , no.2. NSA 2012. Developing a blueprint for a science of cybersecurity. The Next Wave (2012). vol.19, no.2."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.146.3642.347"},{"volume-title":"Conjectures and refutations: The growth of scientific knowledge","author":"Popper Karl","key":"e_1_3_2_1_30_1","unstructured":"Karl Popper . 1959. Conjectures and refutations: The growth of scientific knowledge . Routledge . Karl Popper. 1959. Conjectures and refutations: The growth of scientific knowledge. Routledge."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36275"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Marvin Schaefer. 1993. We Need to Think About the Foundations of Computer Security Proc. NSPW. ACM 120--125.  Marvin Schaefer. 1993. We Need to Think About the Foundations of Computer Security Proc. NSPW. ACM 120--125.","DOI":"10.1145\/283751.283801"},{"key":"e_1_3_2_1_33_1","unstructured":"Adam Shostack. 2012. The evolution of information security. (2012) 6--11. In [28].  Adam Shostack. 2012. The evolution of information security. (2012) 6--11. In [28]."},{"key":"e_1_3_2_1_34_1","volume-title":"The Sciences of the Artificial","author":"Simon Herbert A.","year":"1969","unstructured":"Herbert A. Simon . 1996. The Sciences of the Artificial . MIT Press , Cambridge, MA ( third edition; originally published 1969 ). Herbert A. Simon. 1996. The Sciences of the Artificial. MIT Press, Cambridge, MA (third edition; originally published 1969)."},{"volume-title":"Pasteur's Quadrant: Basic Science and Technological Innovation","author":"Stokes Donald E.","key":"e_1_3_2_1_35_1","unstructured":"Donald E. Stokes . 1997. Pasteur's Quadrant: Basic Science and Technological Innovation . Brookings Institution Press . Donald E. Stokes. 1997. Pasteur's Quadrant: Basic Science and Technological Innovation. Brookings Institution Press."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140563","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:21Z","timestamp":1750212681000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140563"}},"subtitle":["Can We Learn from History?"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":35,"alternative-id":["10.1145\/3140549.3140563","10.1145\/3140549"],"URL":"https:\/\/doi.org\/10.1145\/3140549.3140563","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}