{"id":"https://openalex.org/W2765256768","doi":"https://doi.org/10.1145/3140549.3140564","title":"Moving Targets vs. Moving Adversaries","display_name":"Moving Targets vs. Moving Adversaries","publication_year":2017,"publication_date":"2017-10-30","ids":{"openalex":"https://openalex.org/W2765256768","doi":"https://doi.org/10.1145/3140549.3140564","mag":"2765256768"},"language":"en","primary_location":{"id":"doi:10.1145/3140549.3140564","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140549.3140564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["Technische Universita\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universita\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5079497016"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13976056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9721999764442444,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8344005346298218},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8010532259941101},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7307098507881165},{"id":"https://openalex.org/keywords/purchasing","display_name":"Purchasing","score":0.5806242227554321},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5777266621589661},{"id":"https://openalex.org/keywords/language-change","display_name":"Language change","score":0.44642943143844604},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4293181598186493},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.3744050860404968},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.21361002326011658},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21317028999328613},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15762320160865784},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.13064473867416382}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8344005346298218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8010532259941101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7307098507881165},{"id":"https://openalex.org/C2778813691","wikidata":"https://www.wikidata.org/wiki/Q1369832","display_name":"Purchasing","level":2,"score":0.5806242227554321},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5777266621589661},{"id":"https://openalex.org/C2780027415","wikidata":"https://www.wikidata.org/wiki/Q524648","display_name":"Language change","level":2,"score":0.44642943143844604},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4293181598186493},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3744050860404968},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.21361002326011658},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21317028999328613},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15762320160865784},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.13064473867416382},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3140549.3140564","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140549.3140564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1605557845","https://openalex.org/W1963947298","https://openalex.org/W1992741024","https://openalex.org/W2022413220","https://openalex.org/W2033593513","https://openalex.org/W2081105932","https://openalex.org/W2111927651","https://openalex.org/W2612403404"],"related_works":["https://openalex.org/W2141388993","https://openalex.org/W1978034799","https://openalex.org/W4385719733","https://openalex.org/W2999607548","https://openalex.org/W3085047896","https://openalex.org/W2956597637","https://openalex.org/W2241929320","https://openalex.org/W2979496624","https://openalex.org/W2044639210","https://openalex.org/W2293245356"],"abstract_inverted_index":{"Memory-corruption":[0],"vulnerabilities":[1,48],"pose":[2],"a":[3,30],"severe":[4],"threat":[5],"on":[6],"modern":[7,34],"systems":[8],"security.":[9],"Although":[10],"this":[11],"problem":[12],"is":[13,20,36],"known":[14],"for":[15,62],"almost":[16,53],"three":[17],"decades":[18],"it":[19],"unlikely":[21],"to":[22],"be":[23],"solved":[24],"in":[25,39,49],"the":[26,64],"near":[27],"future":[28],"because":[29],"large":[31],"amount":[32],"of":[33],"software":[35,51],"still":[37],"programmed":[38],"unsafe,":[40],"legacy":[41],"languages":[42],"such":[43],"as":[44],"C/C++.":[45],"With":[46],"new":[47],"popular":[50],"discovered":[52],"every":[54],"day,":[55],"and":[56],"with":[57],"high":[58],"third":[59],"party":[60],"demand":[61],"(purchasing)":[63],"corresponding":[65],"exploits,":[66],"runtime":[67],"attacks":[68],"are":[69],"more":[70],"prevalent":[71],"than":[72],"ever.":[73]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
