{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:17:23Z","timestamp":1771658243305,"version":"3.50.1"},"reference-count":94,"publisher":"Zhejiang University Press","issue":"11","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1631\/fitee.1601321","type":"journal-article","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T21:07:50Z","timestamp":1478725670000},"page":"1122-1153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":99,"title":["Moving target defense: state of the art and characteristics"],"prefix":"10.1631","volume":"17","author":[{"given":"Gui-lin","family":"Cai","sequence":"first","affiliation":[]},{"given":"Bao-sheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Tian-zuo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2016,11,11]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/cns.2013.6682717"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36883-7_19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663484"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247115"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/depend.2009.15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ccst.2010.5678724"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2011.6127449"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icact.2016.7423324"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2014.6883401"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663478"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2014.30"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/mis.2012.45"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/isrcs.2013.6623772"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04717-1_14"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ccst.2015.7389661"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/cdc.2013.6759960"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icsmc.2012.6378159"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2013.136"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808480"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/iccnc.2016.7440635"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2011.6127486"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808486"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808484"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600180"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663480"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2015.2443790"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_8"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663483"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808487"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/icccn.2013.6614155"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2598394.2605437"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/wowmom.2014.6918979"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_7"},{"issue":"3","key":"ref47","first-page":"21","article-title":"Research on dynamic model for network security based on artificial immunity","volume":"2","author":"Liu","year":"2011","journal-title":"Int. J. Knowl. Lang. Process."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/sec.738"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808479"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602100"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/sectech.2014.9"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2015.383"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808485"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_1"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2010.60"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_1"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257559"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663485"},{"key":"ref59","volume-title":"National Cyber Leap Year Summit 2009 Co-chairs\u2019 Report","year":"2009"},{"key":"ref60","year":"2010","journal-title":"Cybersecurity Game-Change Research & Development Recommendations"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460018"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24864-1_8"},{"issue":"3","key":"ref63","first-page":"9","article-title":"Achieving cyber survivability in a contested environment using a cyber moving target","volume":"7","author":"Okhravi","year":"2011b","journal-title":"High Front. J."},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.01.002"},{"key":"ref65","article-title":"Survey of Cyber Moving Targets","volume-title":"Technical Report, No. MIT\/LL-TR-1166","author":"Okhravi","year":"2013"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2013.137"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_20"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_9"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2014.6883418"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808483"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663482"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_6"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1813654.1813655"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2010.5680489"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/iri.2015.84"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/isrcs.2014.6900086"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_5"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2015.7357570"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/cns.2013.6682692"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2012.10.017"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663486"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2011.6127498"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_6"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460040"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808476"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2011.05.012"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2516916"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663481"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_15"},{"key":"ref90","first-page":"1","article-title":"Simulation-based approaches to studying effectiveness of moving-target network defense","volume-title":"Proc. National Symp. on Moving Target Research","author":"Zhuang","year":"2012"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/isrcs.2013.6623770"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602088"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663479"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808478"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1601321\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1601321.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1601321.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:57:12Z","timestamp":1771657032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1601321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":94,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["134"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1601321","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11]]}}}