{"id":"https://openalex.org/W3128426930","doi":"https://doi.org/10.1007/s12083-021-01084-8","title":"Cost-effective migration-based dynamic platform defense technique: a CTMDP approach","display_name":"Cost-effective migration-based dynamic platform defense technique: a CTMDP approach","publication_year":2021,"publication_date":"2021-01-30","ids":{"openalex":"https://openalex.org/W3128426930","doi":"https://doi.org/10.1007/s12083-021-01084-8","mag":"3128426930"},"language":"en","primary_location":{"id":"doi:10.1007/s12083-021-01084-8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12083-021-01084-8","pdf_url":null,"source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081425657","display_name":"Yipin Zhang","orcid":"https://orcid.org/0000-0003-1533-6407"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yipin Zhang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People\u2019s Republic of China","Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024597522","display_name":"Xiaolin Chang","orcid":"https://orcid.org/0000-0002-2975-8857"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolin Chang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People\u2019s Republic of China","Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017004453","display_name":"Jelena Mi\u0161i\u0107","orcid":"https://orcid.org/0000-0002-1251-3730"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jelena Mi\u0161i\u0107","raw_affiliation_strings":["Ryerson University, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Ryerson University, Toronto, ON, Canada","institution_ids":["https://openalex.org/I530967"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019465701","display_name":"Vojislav B. Mi\u0161i\u0107","orcid":"https://orcid.org/0000-0001-7760-9920"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Vojislav B. Mi\u0161i\u0107","raw_affiliation_strings":["Ryerson University, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Ryerson University, Toronto, ON, Canada","institution_ids":["https://openalex.org/I530967"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102539271","display_name":"Yutong Cai","orcid":"https://orcid.org/0000-0002-4850-7148"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yutong Cai","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People\u2019s Republic of China","Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5081425657"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":{"value":2790,"currency":"EUR","value_usd":3590},"apc_paid":null,"fwci":0.4773,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64688778,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"14","issue":"3","first_page":"1207","last_page":"1217"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.7755173444747925},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.7156206369400024},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6725119352340698},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.576497495174408},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.53780597448349},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4683883488178253},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4082217216491699},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.3992652893066406},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.3965904712677002},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38682928681373596},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.38042330741882324},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18136101961135864},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.12164682149887085},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12086722254753113}],"concepts":[{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.7755173444747925},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.7156206369400024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6725119352340698},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.576497495174408},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.53780597448349},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4683883488178253},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4082217216491699},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3992652893066406},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.3965904712677002},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38682928681373596},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.38042330741882324},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18136101961135864},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.12164682149887085},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12086722254753113},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12083-021-01084-8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s12083-021-01084-8","pdf_url":null,"source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W132116302","https://openalex.org/W1488312983","https://openalex.org/W1984187922","https://openalex.org/W1995341513","https://openalex.org/W2029418637","https://openalex.org/W2034144210","https://openalex.org/W2050315535","https://openalex.org/W2119567691","https://openalex.org/W2158379985","https://openalex.org/W2295393338","https://openalex.org/W2494110282","https://openalex.org/W2511921700","https://openalex.org/W2521798747","https://openalex.org/W2537496976","https://openalex.org/W2569569679","https://openalex.org/W2765449849","https://openalex.org/W2889617130","https://openalex.org/W2943381217","https://openalex.org/W2946001656","https://openalex.org/W2961522049","https://openalex.org/W2973181217","https://openalex.org/W2999638941","https://openalex.org/W3009468109","https://openalex.org/W3017780268","https://openalex.org/W3031716757","https://openalex.org/W7001894244"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2131575257","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2360897455","https://openalex.org/W2377660959","https://openalex.org/W187740018","https://openalex.org/W2162286586","https://openalex.org/W4255368532"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
