{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T03:18:03Z","timestamp":1773803883825,"version":"3.50.1"},"reference-count":35,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064849","type":"journal-article","created":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T02:17:48Z","timestamp":1749694668000},"page":"3765-3786","source":"Crossref","is-referenced-by-count":2,"title":["Multi-Agent Reinforcement Learning for Moving Target Defense Temporal Decision-Making Approach Based on Stackelberg-FlipIt Games"],"prefix":"10.32604","volume":"84","author":[{"given":"Rongbo","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jinlong","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Yuefei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhongyu","family":"Guo","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/COMST.2019.2963791","article-title":"Toward proactive, adaptive defense: a survey on moving target defense","volume":"22","author":"Cho","year":"2020","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref2","series-title":"Proceedings of the First ACM Workshop on Moving Target Defense","article-title":"Towards a theory of moving target defense","author":"Zhuang","year":"2014 Nov 7"},{"key":"ref3","series-title":"52nd IEEE Conference on Decision and Control","article-title":"Effectiveness of IP address randomization in decoy-based moving target defense","author":"Clark","year":"2013 Dec 10\u201313"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"102342","DOI":"10.1016\/j.cose.2021.102342","article-title":"Optimal temporospatial strategy selection approach to moving target defense: a FlipIt differential game model","volume":"108","author":"Tan","year":"2021","journal-title":"Comput Secur"},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"Li H, Zheng Z. Optimal timing of moving target defense: a Stackelberg game model. arXiv:1905.13293. 2019.","DOI":"10.1109\/MILCOM47813.2019.9020963"},{"key":"ref6","series-title":"Proceedings of the 7th ACM Workshop on Moving Target Defense","article-title":"Moving target defense decision-making method","author":"Zhang","year":"2020 Nov 9"},{"key":"ref7","unstructured":"Cook PR. Limitations and extensions of the WoLF-PHC algorithm [master\u2019s thesis]. Provo, UT, USA: Brigham Young University; 2007."},{"key":"ref8","first-page":"124","article-title":"A framework for moving target defense quantification","volume":"502","author":"Connell","year":"2017","journal-title":"IFIP Adv Inf Commun Technol"},{"key":"ref9","series-title":"Proceedings of the 2nd International Conference on Cryptography, Security and Privacy","first-page":"175","article-title":"A system attack surface based MTD effectiveness and cost quantification framework","author":"Xiong","year":"2018 Mar 16\u201318"},{"key":"ref10","series-title":"MTD 2015\u2014Proceedings of the 2nd ACM Workshop on Moving Target Defense, Co-Located with: CCS","first-page":"3","article-title":"A quantitative framework for moving target defense effectiveness evaluation","author":"Zaffarano","year":"2015 Oct 12"},{"key":"ref11","author":"Barron","year":"2024","journal-title":"Game theory: an introduction"},{"key":"ref12","series-title":"Proceedings of the ACM Conference on Computer and Communications Security","first-page":"51","article-title":"Reinforcement learning algorithms for adaptive cyber defense against heartbleed","author":"Zhu","year":"2014 Nov 3\u20137"},{"key":"ref13","series-title":"MTD 2016\u2014Proceedings of the 2016 ACM Workshop on Moving Target Defense, Co-Located with CCS","first-page":"93","article-title":"Moving target defense against DDoS attacks: an empirical game-theoretic analysis","author":"Wright","year":"2016 Oct 24\u201328"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2023.100544","volume":"48","author":"Tan","year":"2023","journal-title":"Computer science review"},{"key":"ref15","first-page":"185","article-title":"Toward effectiveness and agility of network security situational awareness using moving target defense (MTD)","volume":"9085","author":"Ge","year":"2014","journal-title":"Sens Syst Space Appl VII"},{"key":"ref16","series-title":"Proceedings of the First ACM Workshop on Moving Target Defense","first-page":"1","article-title":"A game theoretic approach to strategy determination for dynamic platform defenses","author":"Carter","year":"2014 Nov 7"},{"key":"ref17","first-page":"1","author":"Manadhata","year":"2012","journal-title":"Moving target defense II"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","article-title":"FlipIt: the game of \u201c\n\nstealthy takeover\u201d","volume":"26","author":"van Dijk","year":"2013","journal-title":"J Cryptol"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"012039","DOI":"10.1088\/1742-6596\/1812\/1\/012039","article-title":"Reinforcement learning based self-adaptive moving target defense against DDoS attacks","volume":"1812","author":"Gao","year":"2021","journal-title":"J Phys Conf Ser"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1057\/s41288-022-00266-6","article-title":"Cyber risk and cybersecurity: a systematic review of data availability","volume":"47","author":"Cremer","year":"2022","journal-title":"Geneva Pap Risk Insur-Issues Pract"},{"key":"ref21","series-title":"Proceedings of the Second ACM Workshop on Moving Target Defense\u2014MTD '15","article-title":"Empirical game-theoretic analysis for moving target defense","author":"Prakash","year":"2015 Oct 12"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/TNSM.2021.3117698","article-title":"Foureye: defensive deception against advanced persistent threats via hypergame theory","volume":"19","author":"Wan","year":"2021","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.jlp.2018.02.007","article-title":"Estimating probability of success of escape, evacuation, and rescue (EER) on the offshore platform by integrating Bayesian network and fuzzy AHP","volume":"54","author":"Ping","year":"2018","journal-title":"J Loss Prev Process Ind"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"109402","DOI":"10.1016\/j.comnet.2022.109402","article-title":"Estimation of the success probability of a malicious attacker on blockchain-based edge network","volume":"219","author":"Halgamuge","year":"2022","journal-title":"Comput Netw"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1111\/mafi.12378","article-title":"Improving reinforcement learning algorithms: towards optimal learning rate policies","volume":"34","author":"Mounjid","year":"2024","journal-title":"Math Financ"},{"key":"ref26","first-page":"28","article-title":"Friend or faux: deception for cyber defense","volume":"16","author":"Ferguson-Walter","year":"2017","journal-title":"J Inf Warf"},{"key":"ref27","author":"Johnson","year":"2022","journal-title":"Decision-making biases in cybersecurity: measuring the impact of the sunk cost fallacy to delay attacker behavior"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TNSM.2018.2889842","article-title":"Fast IP hopping randomization to secure hop-by-hop access in SDN","volume":"16","author":"Chang","year":"2019","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref29","first-page":"69","article-title":"OpenFlow: enabling innovation in campus networks","volume":"38","author":"McKeown","year":"2008","journal-title":"ACM Spec Interest Group Data Commun"},{"key":"ref30","series-title":"2014 IEEE Colombian Conference on Communications and Computing (COLCOM)","article-title":"Using mininet for emulation and prototyping software-defined networks","author":"Rodr\u00edguez","year":"2014 Jun 4\u20136"},{"key":"ref31","series-title":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","first-page":"1","article-title":"Offensive security: study on penetration testing attacks, methods, and their types","author":"Aibekova","year":"2022 Apr 23\u201324"},{"key":"ref32","series-title":"Proceedings of the First Workshop on Hot Topics in Software Defined Networks","article-title":"OpenFlow random host mutation: transparent moving target defense using software defined networking","author":"Jafar","year":"2013 Aug 16"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"3249","DOI":"10.1007\/s13369-017-2430-5","article-title":"Network moving target defense technique based on self-adaptive end-point hopping","volume":"42","author":"Lei","year":"2017","journal-title":"Arab J Sci Eng"},{"key":"ref34","series-title":"Proceedings of the International Conference on Industrial Control Network and System Engineering Research (ICNSER2019)","first-page":"64","article-title":"The design and implementation of a dynamic IP defense system accelerated by vector packet processing","author":"Miao","year":"2019 Mar 15\u201316"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"8848473","DOI":"10.1155\/2021\/8848473","article-title":"An adaptive IP hopping approach for moving target defense using a light-weight CNN detector","volume":"2021","author":"Xu","year":"2021","journal-title":"Secur Commun Netw"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_64849\/TSP_CMC_64849.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:50:34Z","timestamp":1763344234000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064849","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}