{"id":"https://openalex.org/W2765722122","doi":"https://doi.org/10.1145/3140549.3140560","title":"Path Hopping","display_name":"Path Hopping","publication_year":2017,"publication_date":"2017-10-30","ids":{"openalex":"https://openalex.org/W2765722122","doi":"https://doi.org/10.1145/3140549.3140560","mag":"2765722122"},"language":"en","primary_location":{"id":"doi:10.1145/3140549.3140560","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140549.3140560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035170010","display_name":"Alireza Poostindouz","orcid":"https://orcid.org/0000-0002-3221-472X"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Alireza Poostindouz","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049724462","display_name":"Viliam Lis\u00fd","orcid":"https://orcid.org/0000-0002-1647-1507"},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Viliam Lisy","raw_affiliation_strings":["Czech Technical University, Prague, Czech Rep"],"affiliations":[{"raw_affiliation_string":"Czech Technical University, Prague, Czech Rep","institution_ids":["https://openalex.org/I44504214"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010447902"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":0.091,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.47595642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"114"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7688683271408081},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7531275749206543},{"id":"https://openalex.org/keywords/disjoint-sets","display_name":"Disjoint sets","score":0.707791805267334},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5874716639518738},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49154314398765564},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.47274908423423767},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45290619134902954},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.44147688150405884},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42447957396507263},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3723950982093811},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14710363745689392},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.07174620032310486}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7688683271408081},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7531275749206543},{"id":"https://openalex.org/C45340560","wikidata":"https://www.wikidata.org/wiki/Q215382","display_name":"Disjoint sets","level":2,"score":0.707791805267334},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5874716639518738},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49154314398765564},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.47274908423423767},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45290619134902954},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.44147688150405884},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42447957396507263},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3723950982093811},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14710363745689392},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.07174620032310486},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3140549.3140560","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140549.3140560","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1573812554","https://openalex.org/W1605940800","https://openalex.org/W1877783666","https://openalex.org/W1976540969","https://openalex.org/W2007466965","https://openalex.org/W2034144210","https://openalex.org/W2156858199","https://openalex.org/W2269066968","https://openalex.org/W2537496976","https://openalex.org/W3111297213"],"related_works":["https://openalex.org/W4256429076","https://openalex.org/W1971174658","https://openalex.org/W4388150944","https://openalex.org/W2099195351","https://openalex.org/W2348092930","https://openalex.org/W4242235492","https://openalex.org/W2012063272","https://openalex.org/W3129272755","https://openalex.org/W4237162029","https://openalex.org/W2367268135"],"abstract_inverted_index":{"Moving":[0],"target":[1],"defense":[2],"(MTD)":[3],"strategies":[4,18],"have":[5],"been":[6],"widely":[7],"studied":[8],"for":[9,23],"securing":[10],"computer":[11,35],"communication":[12,26],"systems.":[13],"We":[14,46,71,86],"consider":[15],"using":[16],"MTD":[17,79],"as":[19,90,124],"a":[20,33,41,73,91,130],"cryptographic":[21,74],"mechanism":[22],"providing":[24],"secure":[25],"when":[27],"the":[28,65,68,88,126],"adversary":[29],"has":[30],"access":[31],"to":[32,101,120],"quantum":[34],"and":[36,49,94,108,118],"security":[37,97],"is":[38],"required":[39],"over":[40],"long":[42],"period":[43],"of":[44,59,104,128],"time.":[45,70],"assume":[47],"Alice":[48],"Bob":[50],"are":[51],"connected":[52],"by":[53,64],"multiple":[54],"disjoint":[55],"paths,":[56],"not":[57],"all":[58],"which":[60],"can":[61],"be":[62],"eavesdropped":[63],"attacker":[66],"at":[67],"same":[69],"propose":[72,95],"system":[75,89,116],"that":[76,81,99],"uses":[77],"an":[78],"strategy":[80],"achieves":[82],"long-term":[83],"quantum-safe":[84],"security.":[85],"model":[87],"Markov":[92],"chain,":[93],"two":[96,102],"measures":[98],"correspond":[100],"types":[103],"adversaries,":[105],"called":[106],"risk-taking":[107],"risk-averse.":[109],"Our":[110],"numerical":[111],"simulations":[112],"shows":[113],"dependencies":[114],"between":[115],"parameters,":[117],"leads":[119],"new":[121],"insights,":[122],"such":[123],"quantifying":[125],"cost":[127],"being":[129],"risk-averse":[131],"adversary.":[132]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-11-10T00:00:00"}
