{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:47Z","timestamp":1750220807001,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chaire C3S"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338468.3356827","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"47-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Run or Hide? Both! A Method Based on IPv6 Address Switching to Escape While Being Hidden"],"prefix":"10.1145","author":[{"given":"Maxime","family":"Ayrault","sequence":"first","affiliation":[{"name":"T\u00e9l\u00e9com Paris, Paris, France"}]},{"given":"Etienne","family":"Borde","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com Paris, Paris, France"}]},{"given":"Ulrich","family":"K\u00fchne","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com Paris, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"How the next evolution of the internet is changing everything","author":"Evans D.","year":"2011","unstructured":"D. Evans , \"The internet of things : How the next evolution of the internet is changing everything ,\" 2011 . [Online]. Available: http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf. [Accessed: 10-Jul-2019]. D. Evans, \"The internet of things: How the next evolution of the internet is changing everything,\" 2011. [Online]. Available: http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf. [Accessed: 10-Jul-2019]."},{"key":"e_1_3_2_1_2_1","volume-title":"Number of IoT devices now at 7B -- market accelerating","author":"Lueth K. L.","year":"2018","unstructured":"K. L. Lueth , \"State of the IoT 2018 : Number of IoT devices now at 7B -- market accelerating ,\" 2018 . [Online]. Available: https:\/\/iotanalytics.com\/state-of-the-iot-update-q1-q2--2018-number- of-iotdevices-now-7b\/. [Accessed: 10-Jul-2019]. K. L. Lueth, \"State of the IoT 2018: Number of IoT devices now at 7B -- market accelerating,\" 2018. [Online]. Available: https:\/\/iotanalytics.com\/state-of-the-iot-update-q1-q2--2018-number- of-iotdevices-now-7b\/. [Accessed: 10-Jul-2019]."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.006"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"MOTAG: Moving Target Defense against Internet Denial of Service Attacks,\" in 2013 22nd International Conference on Computer Communication and Networks (ICCCN)","author":"Jia Q.","year":"2013","unstructured":"Q. Jia , K. Sun , and A. Stavrou , \" MOTAG: Moving Target Defense against Internet Denial of Service Attacks,\" in 2013 22nd International Conference on Computer Communication and Networks (ICCCN) , 2013 , pp. 1 -- 9 . Q. Jia, K. Sun, and A. Stavrou, \"MOTAG: Moving Target Defense against Internet Denial of Service Attacks,\" in 2013 22nd International Conference on Computer Communication and Networks (ICCCN), 2013, pp. 1--9."},{"key":"e_1_3_2_1_6_1","first-page":"678","volume-title":"Effectiveness of IP address randomization in decoy-based moving target defense,\" in 52nd IEEE Conference on Decision and Control","author":"Clark A.","year":"2013","unstructured":"A. Clark , K. Sun , and R. Poovendran , \" Effectiveness of IP address randomization in decoy-based moving target defense,\" in 52nd IEEE Conference on Decision and Control , 2013 , pp. 678 -- 685 . A. Clark, K. Sun, and R. Poovendran, \"Effectiveness of IP address randomization in decoy-based moving target defense,\" in 52nd IEEE Conference on Decision and Control, 2013, pp. 678--685."},{"key":"e_1_3_2_1_7_1","first-page":"701","volume-title":"Analysis of network address shuffling as a moving target defense,\" in 2014 IEEE International Conference on Communications (ICC)","author":"Carroll T. E.","year":"2014","unstructured":"T. E. Carroll , M. Crouse , E. W. Fulp , and K. S. Berenhaut , \" Analysis of network address shuffling as a moving target defense,\" in 2014 IEEE International Conference on Communications (ICC) , 2014 , pp. 701 -- 706 . T. E. Carroll, M. Crouse, E. W. Fulp, and K. S. Berenhaut, \"Analysis of network address shuffling as a moving target defense,\" in 2014 IEEE International Conference on Communications (ICC), 2014, pp. 701--706."},{"key":"e_1_3_2_1_8_1","first-page":"31","volume-title":"Catch Me If You Can: Dynamic Concealment of Network Entities,\" in Proceedings of the 5th ACM Workshop on Moving Target Defense - MTD '18","author":"Fraunholz D.","year":"2018","unstructured":"D. Fraunholz , D. Krohmer , S. Duque Anton , and H. D. Schotten , \" Catch Me If You Can: Dynamic Concealment of Network Entities,\" in Proceedings of the 5th ACM Workshop on Moving Target Defense - MTD '18 , 2018 , pp. 31 -- 39 . D. Fraunholz, D. Krohmer, S. Duque Anton, and H. D. Schotten, \"Catch Me If You Can: Dynamic Concealment of Network Entities,\" in Proceedings of the 5th ACM Workshop on Moving Target Defense - MTD '18, 2018, pp. 31--39."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/2663474.2663486","article-title":"Comparing Different Moving Target Defense Techniques","author":"Xu J.","year":"2014","unstructured":"J. Xu and al. , \" Comparing Different Moving Target Defense Techniques ,\" in First ACMWorkshop on Moving Target Defense , 2014 , pp. 97 -- 107 . J. Xu and al., \"Comparing Different Moving Target Defense Techniques,\" in First ACMWorkshop on Moving Target Defense, 2014, pp. 97--107.","journal-title":"First ACMWorkshop on Moving Target Defense"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3759626"},{"key":"e_1_3_2_1_11_1","unstructured":"C. Miller and C. Valasek \"Remote Exploitation of an Unaltered Passenger Vehicle \" Aug-2015. [Online]. Available: http:\/\/illmatics.com\/Remote%20Car%20Hacking.pdf. [Accessed: 10-Jul-2019].  C. Miller and C. Valasek \"Remote Exploitation of an Unaltered Passenger Vehicle \" Aug-2015. [Online]. Available: http:\/\/illmatics.com\/Remote%20Car%20Hacking.pdf. [Accessed: 10-Jul-2019]."},{"key":"e_1_3_2_1_12_1","volume-title":"Nmap Project","author":"Lyon G. F.","year":"2009","unstructured":"G. F. Lyon , Nmap network scanning: The official nmap project guide to network discovery and security scanning . Nmap Project , 2009 . G. F. Lyon, Nmap network scanning: The official nmap project guide to network discovery and security scanning. Nmap Project, 2009."},{"key":"e_1_3_2_1_13_1","volume-title":"Adventures in Automotive Networks and Control Units","author":"Valasek C.","year":"2014","unstructured":"C. Valasek and C. Miller , \" Adventures in Automotive Networks and Control Units ,\" 2014 . [Online]. Available: http:\/\/illmatics.com\/car_hacking.pdf. [Accessed: 10-Jul-2019]. C. Valasek and C. Miller, \"Adventures in Automotive Networks and Control Units,\" 2014. [Online]. Available: http:\/\/illmatics.com\/car_hacking.pdf. [Accessed: 10-Jul-2019]."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-1-4614-0977-9_2","volume-title":"Effectiveness of moving target defenses,\" in Moving target defense: Creating asymmetric uncertainty for cyber threats","author":"Evans D.","year":"2011","unstructured":"D. Evans , A. Nguyen-Tuong , and J. Knight , \" Effectiveness of moving target defenses,\" in Moving target defense: Creating asymmetric uncertainty for cyber threats , S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Eds. New York, NY : Springer New York , 2011 , pp. 29 -- 48 . D. Evans, A. Nguyen-Tuong, and J. Knight, \"Effectiveness of moving target defenses,\" in Moving target defense: Creating asymmetric uncertainty for cyber threats, S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Eds. New York, NY: Springer New York, 2011, pp. 29--48."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 6th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338468.3356827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338468.3356827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338468.3356827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":14,"alternative-id":["10.1145\/3338468.3356827","10.1145\/3338468"],"URL":"https:\/\/doi.org\/10.1145\/3338468.3356827","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}