{"id":"https://openalex.org/W7128381791","doi":"https://doi.org/10.1016/j.future.2026.108419","title":"MTD in depth: Multi-phased moving target defense techniques against cyber-attacks based on cyber kill chain","display_name":"MTD in depth: Multi-phased moving target defense techniques against cyber-attacks based on cyber kill chain","publication_year":2026,"publication_date":"2026-02-07","ids":{"openalex":"https://openalex.org/W7128381791","doi":"https://doi.org/10.1016/j.future.2026.108419"},"language":"en","primary_location":{"id":"doi:10.1016/j.future.2026.108419","is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.future.2026.108419","pdf_url":null,"source":{"id":"https://openalex.org/S186357190","display_name":"Future Generation Computer Systems","issn_l":"0167-739X","issn":["0167-739X","1872-7115"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Generation Computer Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048500989","display_name":"Minjune Kim","orcid":"https://orcid.org/0000-0002-6161-7982"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Minjune Kim","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125380969","display_name":"Jin-Hee Cho","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jin-Hee Cho","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067672248","display_name":"Hyuk Lim","orcid":"https://orcid.org/0000-0002-9926-3913"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hyuk Lim","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089839780","display_name":"Tina Moghaddam","orcid":"https://orcid.org/0000-0002-7234-9127"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tina Moghaddam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004437273","display_name":"Terrence J. Moore","orcid":"https://orcid.org/0000-0003-3279-2965"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Terrence J. Moore","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032152029","display_name":"Frederica F. Nelson","orcid":"https://orcid.org/0000-0001-8641-384X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Frederica F. Nelson","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5121244526","display_name":"Dan Dongseong Kim","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dan Dongseong Kim","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5048500989"],"corresponding_institution_ids":[],"apc_list":{"value":3340,"currency":"USD","value_usd":3340},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32094983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"181","issue":null,"first_page":"108419","last_page":"108419"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.1762000024318695,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.1762000024318695,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.08410000056028366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.04879999905824661,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chain","display_name":"Chain (unit)","score":0.5203999876976013},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.27399998903274536},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.23880000412464142},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.2345999926328659}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8733000159263611},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5480999946594238},{"id":"https://openalex.org/C199185054","wikidata":"https://www.wikidata.org/wiki/Q552299","display_name":"Chain (unit)","level":2,"score":0.5203999876976013},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2777999937534332},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2401999980211258},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.23880000412464142},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.2345999926328659},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.23250000178813934},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2321999967098236}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.future.2026.108419","is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.future.2026.108419","pdf_url":null,"source":{"id":"https://openalex.org/S186357190","display_name":"Future Generation Computer Systems","issn_l":"0167-739X","issn":["0167-739X","1872-7115"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Generation Computer Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1612694023","https://openalex.org/W1978584859","https://openalex.org/W1995327224","https://openalex.org/W2029418637","https://openalex.org/W2036906376","https://openalex.org/W2553733554","https://openalex.org/W2725073272","https://openalex.org/W2883263864","https://openalex.org/W2901442573","https://openalex.org/W2907753699","https://openalex.org/W2923077998","https://openalex.org/W2996903041","https://openalex.org/W3013219028","https://openalex.org/W4313174306","https://openalex.org/W4321490422"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-10T00:00:00"}
