{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:22:13Z","timestamp":1777591333808,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T00:00:00Z","timestamp":1521158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,16]]},"DOI":"10.1145\/3199478.3199487","type":"proceedings-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T16:26:42Z","timestamp":1531240002000},"page":"175-179","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A System Attack Surface Based MTD Effectiveness and Cost Quantification Framework"],"prefix":"10.1145","author":[{"given":"Xinli","family":"Xiong","sequence":"first","affiliation":[{"name":"Army Engineering University of People's Liberation Army, Nanjing, Jiangsu, China"}]},{"given":"Guangsheng","family":"Zhao","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, Hunan, China"}]},{"given":"Xian","family":"Wang","sequence":"additional","affiliation":[{"name":"Research Institute of Petroleum Exploration and Development, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Moving Target Defense","author":"Jajodia S.","unstructured":"Jajodia , S. , Ghosh , A. K. , Swarup , V. , Wang , C. , & Wang , X. S. 2011. Moving Target Defense . Springer , New York . Jajodia, S., Ghosh, A. K., Swarup, V., Wang, C., & Wang, X. S. 2011. Moving Target Defense. Springer, New York."},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"A formal model for a system's attack surface","volume":"54","author":"Manadhata P. K.","year":"2011","unstructured":"Manadhata , P. K. , & Wing , J. M. 2011 . A formal model for a system's attack surface . Advances in Information Security , 54 , 1 -- 28 . Manadhata, P. K., & Wing, J. M. 2011. A formal model for a system's attack surface. Advances in Information Security, 54, 1--28.","journal-title":"Advances in Information Security"},{"key":"e_1_3_2_1_3_1","volume-title":"Parameterizing Moving Target Defenses. Ifip International Conference on New Technologies, Mobility and Security (NTMS '16)","author":"Anderson N.","year":"2016","unstructured":"Anderson , N. , Mitchell , R. , & Chen , I. R. 2016 . Parameterizing Moving Target Defenses. Ifip International Conference on New Technologies, Mobility and Security (NTMS '16) . IEEE. Larnaca, Cyprus. 1--6. Anderson, N., Mitchell, R., & Chen, I. R. 2016. Parameterizing Moving Target Defenses. Ifip International Conference on New Technologies, Mobility and Security (NTMS '16). IEEE. Larnaca, Cyprus. 1--6."},{"key":"e_1_3_2_1_4_1","first-page":"16","volume-title":"Proceedings of the 18th Symposium on Communications & Networking (CNS '15)","author":"Ben W.","unstructured":"Ben W. Priest , Era Vuksani, Neal Wagner , Brady Tello, Kevin M. Carter , and William W. Streilein . 2015. Agent-based simulation in support of moving target cyber defense technology development and evaluation . In Proceedings of the 18th Symposium on Communications & Networking (CNS '15) . Society for Computer Simulation International, San Diego, CA, USA , 16 - 23 . Ben W. Priest, Era Vuksani, Neal Wagner, Brady Tello, Kevin M. Carter, and William W. Streilein. 2015. Agent-based simulation in support of moving target cyber defense technology development and evaluation. In Proceedings of the 18th Symposium on Communications & Networking (CNS '15). Society for Computer Simulation International, San Diego, CA, USA, 16-23."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995273"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795421"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Soule N. Simidchieva B. Yaman F. Watro R. Loyall J. & Atighetchi M. etal 2015. Quantifying & minimizing attack surfaces containing moving target defenses. Resilience Week. IEEE. Philadelphia PA USA. 1--6.  Soule N. Simidchieva B. Yaman F. Watro R. Loyall J. & Atighetchi M. et al. 2015. Quantifying & minimizing attack surfaces containing moving target defenses. Resilience Week. IEEE. Philadelphia PA USA. 1--6.","DOI":"10.1109\/RWEEK.2015.7287449"},{"key":"e_1_3_2_1_9_1","unstructured":"Zhuang R. 2015. A theory for understanding and quantifying moving target defense. Dissertations & Theses - Gradworks.  Zhuang R. 2015. A theory for understanding and quantifying moving target defense. Dissertations & Theses - Gradworks."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665936.2665939"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357570"},{"key":"e_1_3_2_1_12_1","volume-title":"Technical Aspects of Cyber Kill Chain. Security in Computing and Communications","author":"Yadav T.","unstructured":"Yadav , T. , & Rao , A. M. 2015. Technical Aspects of Cyber Kill Chain. Security in Computing and Communications . Springer International Publishing . Yadav, T., & Rao, A. M. 2015. Technical Aspects of Cyber Kill Chain. Security in Computing and Communications. Springer International Publishing."}],"event":{"name":"ICCSP 2018: 2018 the 2nd International Conference on Cryptography, Security and Privacy","location":"Guiyang China","acronym":"ICCSP 2018","sponsor":["Wuhan Univ. Wuhan University, China","University of Electronic Science and Technology of China University of Electronic Science and Technology of China"]},"container-title":["Proceedings of the 2nd International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3199478.3199487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3199478.3199487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:51Z","timestamp":1750210791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3199478.3199487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,16]]},"references-count":11,"alternative-id":["10.1145\/3199478.3199487","10.1145\/3199478"],"URL":"https:\/\/doi.org\/10.1145\/3199478.3199487","relation":{},"subject":[],"published":{"date-parts":[[2018,3,16]]},"assertion":[{"value":"2018-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}