{"id":"https://openalex.org/W2897909608","doi":"https://doi.org/10.1145/3268966.3268973","title":"Cloxy","display_name":"Cloxy","publication_year":2018,"publication_date":"2018-01-15","ids":{"openalex":"https://openalex.org/W2897909608","doi":"https://doi.org/10.1145/3268966.3268973","mag":"2897909608"},"language":"en","primary_location":{"id":"doi:10.1145/3268966.3268973","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3268966.3268973","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078305527","display_name":"Daniel Fraunholz","orcid":"https://orcid.org/0000-0002-9201-261X"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Daniel Fraunholz","raw_affiliation_strings":["German Research Center for Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053869071","display_name":"Daniel Reti","orcid":"https://orcid.org/0000-0001-8071-6188"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Daniel Reti","raw_affiliation_strings":["German Research Center for Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066653225","display_name":"Simon D. Duque Ant\u00f3n","orcid":"https://orcid.org/0000-0003-4005-9165"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Simon Duque Anton","raw_affiliation_strings":["German Research Center for Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008473850","display_name":"Hans D. Schotten","orcid":"https://orcid.org/0000-0001-5005-3635"},"institutions":[{"id":"https://openalex.org/I33256026","display_name":"German Research Centre for Artificial Intelligence","ror":"https://ror.org/01ayc5b57","country_code":"DE","type":"funder","lineage":["https://openalex.org/I33256026"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hans Dieter Schotten","raw_affiliation_strings":["German Research Center for Artificial Intelligence, Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"German Research Center for Artificial Intelligence, Kaiserslautern, Germany","institution_ids":["https://openalex.org/I33256026"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078305527"],"corresponding_institution_ids":["https://openalex.org/I33256026"],"apc_list":null,"apc_paid":null,"fwci":1.3211,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.82065902,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"40","last_page":"47"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7845458984375},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.6608511209487915},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5313079357147217},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.5035619139671326},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4946996867656708},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.47219881415367126},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4711626470088959},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4700271785259247},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.4641128182411194},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4416746497154236},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.31851744651794434},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.2789621949195862}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7845458984375},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.6608511209487915},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5313079357147217},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.5035619139671326},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4946996867656708},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.47219881415367126},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4711626470088959},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4700271785259247},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.4641128182411194},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4416746497154236},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.31851744651794434},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.2789621949195862},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3268966.3268973","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3268966.3268973","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W769785222","https://openalex.org/W1514368868","https://openalex.org/W1517527854","https://openalex.org/W1607167266","https://openalex.org/W1669806660","https://openalex.org/W1882088395","https://openalex.org/W2064462335","https://openalex.org/W2072610876","https://openalex.org/W2087740020","https://openalex.org/W2093397575","https://openalex.org/W2159601538","https://openalex.org/W2161125296","https://openalex.org/W2161482094","https://openalex.org/W2238077846","https://openalex.org/W2330304364","https://openalex.org/W2410465342","https://openalex.org/W2468331754","https://openalex.org/W2499232106","https://openalex.org/W2512166484","https://openalex.org/W2611013608","https://openalex.org/W2766183686","https://openalex.org/W2766667285","https://openalex.org/W2794834625","https://openalex.org/W2809494870","https://openalex.org/W2904526305","https://openalex.org/W4285719527","https://openalex.org/W4299301436","https://openalex.org/W4301329292"],"related_works":["https://openalex.org/W2156201195","https://openalex.org/W2613374639","https://openalex.org/W2187625726","https://openalex.org/W2371044121","https://openalex.org/W99446231","https://openalex.org/W1967778478","https://openalex.org/W2134466605","https://openalex.org/W2003115932","https://openalex.org/W4313139008","https://openalex.org/W186778346"],"abstract_inverted_index":{"Legacy":[0],"software,":[1],"outdated":[2],"applications":[3,106],"and":[4,23,36,72,93,112,122,132,173],"fast":[5],"changing":[6],"technologies":[7],"pose":[8],"a":[9,46,50,83,179],"serious":[10],"threat":[11],"to":[12,63,68,80,90,95,147],"information":[13],"security.":[14],"Several":[15],"domains,":[16],"such":[17,107],"as":[18,82,108],"long-life":[19],"industrial":[20],"control":[21],"systems":[22,111],"Internet":[24],"of":[25,125,153,160],"Things":[26],"devices,":[27],"suffer":[28],"from":[29],"it.":[30],"In":[31,43],"many":[32],"cases,":[33],"system":[34],"updates":[35],"new":[37],"acquisitions":[38],"are":[39,130,145],"not":[40],"an":[41],"option.":[42],"this":[44],"paper,":[45],"framework":[47,86,156],"that":[48],"combines":[49],"reverse":[51],"proxy":[52],"with":[53,103,162],"various":[54],"deception-based":[55],"defense":[56],"mechanisms":[57],"is":[58,61,87,101,135,169],"presented.":[59],"It":[60,100,134],"designed":[62],"autonomously":[64],"provide":[65,91],"deception":[66],"methods":[67],"web":[69,149,165],"applications.":[70],"Context-awareness":[71],"minimal":[73],"configuration":[74],"overhead":[75],"make":[76],"it":[77],"perfectly":[78],"suited":[79],"work":[81],"service.":[84],"The":[85,151],"built":[88],"modularly":[89],"flexibility":[92],"adaptability":[94],"the":[96,120,126,148,154,158,163],"application":[97],"use":[98],"case.":[99],"evaluated":[102],"common":[104],"web-based":[105],"content":[109],"management":[110],"several":[113],"frequent":[114],"attack":[115,143],"vectors":[116,144],"against":[117],"them.":[118],"Furthermore,":[119],"security":[121,128],"performance":[123,152],"implications":[124],"additional":[127],"layer":[129],"quantified":[131],"discussed.":[133],"found":[136],"that,":[137],"given":[138],"sound":[139],"implementation,":[140],"no":[141],"further":[142,176],"introduced":[146],"application.":[150,166],"prototypical":[155],"increases":[157],"delay":[159,168],"communication":[161],"underlying":[164],"This":[167],"within":[170],"tolerable":[171],"boundaries":[172],"can":[174],"be":[175],"reduced":[177],"by":[178],"more":[180],"efficient":[181],"implementation.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2018-10-26T00:00:00"}
