{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:50Z","timestamp":1750221050889,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,2]],"date-time":"2018-11-02T00:00:00Z","timestamp":1541116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,2]]},"DOI":"10.1145\/3290480.3290485","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T13:37:41Z","timestamp":1544103461000},"page":"7-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The Effectiveness Assessment for Network Based MTD Strategies"],"prefix":"10.1145","author":[{"given":"Xinli","family":"Xiong","sequence":"first","affiliation":[{"name":"Army Engineering University of People's Liberation Army, Nanjing, Jiangsu, China"}]},{"given":"Weiguang","family":"Xu","sequence":"additional","affiliation":[{"name":"Army Engineering University of People's Liberation Army, Nanjing, Jiangsu, China"}]},{"given":"Guangsheng","family":"Zhao","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, Hunan, China"}]}],"member":"320","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.30"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663479"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127498"},{"volume-title":"2016 18th International Conference on Advanced Communication Technology (ICACT). 185--190","author":"Cai G.","key":"e_1_3_2_1_4_1","unstructured":"G. Cai , B. Wang , X. Wang , Y. Yuan , and S. Li . 2016. An introduction to network address shufing . In 2016 18th International Conference on Advanced Communication Technology (ICACT). 185--190 . G. Cai, B. Wang, X. Wang, Y. Yuan, and S. Li. 2016. An introduction to network address shufing. In 2016 18th International Conference on Advanced Communication Technology (ICACT). 185--190."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103633"},{"key":"e_1_3_2_1_6_1","volume-title":"DARPA Information Survivability Conference and Exposition, (DISCEX)","volume":"01","author":"Fink R.","unstructured":"R. Fink , D. Kewley , J. Lowry , and M. Dean . 2001. Dynamic Approaches to Thwart Adversary Intelligence Gathering . In DARPA Information Survivability Conference and Exposition, (DISCEX) , Vol. 01 . 0176. R. Fink, D. Kewley, J. Lowry, and M. Dean. 2001. Dynamic Approaches to Thwart Adversary Intelligence Gathering. In DARPA Information Survivability Conference and Exposition, (DISCEX), Vol. 01. 0176."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2467358"},{"key":"e_1_3_2_1_8_1","volume-title":"2015 International Conference on Information and Communications Technologies (ICT","author":"Luo Yue-Bin","year":"2015","unstructured":"Yue-Bin Luo , Bao-Sheng Wang , Xiao-Feng Wang , Xiao-Feng Hu , and Gui-Lin Cai . 2015 . TPAH: A universal and multi-platform deployable Port and Address Hopping mechanism . In 2015 International Conference on Information and Communications Technologies (ICT 2015). 1--6. Yue-Bin Luo, Bao-Sheng Wang, Xiao-Feng Wang, Xiao-Feng Hu, and Gui-Lin Cai. 2015. TPAH: A universal and multi-platform deployable Port and Address Hopping mechanism. In 2015 International Conference on Information and Communications Technologies (ICT 2015). 1--6."},{"key":"e_1_3_2_1_9_1","volume-title":"Network and Parallel Computing Workshops, IFIP International Conference on(NPC)","volume":"00","author":"Shi L.","unstructured":"L. Shi , C. Jia , and S. Lu . 2007. DoS Evading Mechanism upon Service Hopping . In Network and Parallel Computing Workshops, IFIP International Conference on(NPC) , Vol. 00 . 119--122. L. Shi, C. Jia, and S. Lu. 2007. DoS Evading Mechanism upon Service Hopping. In Network and Parallel Computing Workshops, IFIP International Conference on(NPC), Vol. 00. 119--122."},{"key":"e_1_3_2_1_10_1","volume-title":"Adaptive Use of Network Centric Mechanisms in Cyber-Defense. In Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003. (NCA)","volume":"00","author":"Jones C.","unstructured":"C. Jones , P. Pal , M. Atighetchi , and F. Webber . 2003 . Adaptive Use of Network Centric Mechanisms in Cyber-Defense. In Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003. (NCA) , Vol. 00 . 179. C. Jones, P. Pal, M. Atighetchi, and F. Webber. 2003. Adaptive Use of Network Centric Mechanisms in Cyber-Defense. In Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003. (NCA), Vol. 00. 179."},{"volume-title":"Effectiveness of Moving Target Defenses","author":"Evans David","key":"e_1_3_2_1_11_1","unstructured":"David Evans and John Nguyen-Tuong , Anhand Knight . 2011. Effectiveness of Moving Target Defenses . Springer New York , New York, NY , 29--48. David Evans and John Nguyen-Tuong, Anhand Knight. 2011. Effectiveness of Moving Target Defenses. Springer New York, New York, NY, 29--48."},{"volume-title":"A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses","author":"Collins M. Patrick","key":"e_1_3_2_1_12_1","unstructured":"M. Patrick Collins . 2012. A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses . Springer Berlin Heidelberg , Berlin, Heidelberg , 221--233. M. Patrick Collins. 2012. A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses. Springer Berlin Heidelberg, Berlin, Heidelberg, 221--233."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808480"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/850985.855567"},{"key":"e_1_3_2_1_15_1","unstructured":"L. Y. Shi C. F. Jia and S. W. Lu. 2008. Research on end hopping for active network confrontation. Journal on Communications (2008).  L. Y. Shi C. F. Jia and S. W. Lu. 2008. Research on end hopping for active network confrontation. Journal on Communications (2008)."},{"volume-title":"Multi End-Hopping Modeling and Optimization Using Cooperative Game. In 2017 4th International Conference on Information Science and Control Engineering (ICISCE). 470--474","author":"Xiong X.","key":"e_1_3_2_1_16_1","unstructured":"X. Xiong and L. Yang . 2017 . Multi End-Hopping Modeling and Optimization Using Cooperative Game. In 2017 4th International Conference on Information Science and Control Engineering (ICISCE). 470--474 . X. Xiong and L. Yang. 2017. Multi End-Hopping Modeling and Optimization Using Cooperative Game. In 2017 4th International Conference on Information Science and Control Engineering (ICISCE). 470--474."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808484"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995273"},{"volume-title":"2014 IEEE International Conference on Communications (ICC). 701--706","author":"Carroll T. E.","key":"e_1_3_2_1_19_1","unstructured":"T. E. Carroll , M. Crouse , E. W. Fulp , and K. S. Berenhaut . 2014. Analysis of network address shuffling as a moving target defense . In 2014 IEEE International Conference on Communications (ICC). 701--706 . T. E. Carroll, M. Crouse, E. W. Fulp, and K. S. Berenhaut. 2014. Analysis of network address shuffling as a moving target defense. In 2014 IEEE International Conference on Communications (ICC). 701--706."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecTech.2014.9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646975.711521"},{"volume-title":"Generating Functionology","author":"Wilf Herbert S.","key":"e_1_3_2_1_22_1","unstructured":"Herbert S. Wilf . 1990. Generating Functionology . Academic Press Professional, Inc. , San Diego, CA, USA . Herbert S. Wilf. 1990. Generating Functionology. Academic Press Professional, Inc., San Diego, CA, USA."}],"event":{"name":"ICCNS 2018: 2018 the 8th International Conference on Communication and Network Security","acronym":"ICCNS 2018","location":"Qingdao China"},"container-title":["Proceedings of the 8th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290480.3290485","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290480.3290485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:16Z","timestamp":1750207456000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290480.3290485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,2]]},"references-count":22,"alternative-id":["10.1145\/3290480.3290485","10.1145\/3290480"],"URL":"https:\/\/doi.org\/10.1145\/3290480.3290485","relation":{},"subject":[],"published":{"date-parts":[[2018,11,2]]},"assertion":[{"value":"2018-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}