{"id":"https://openalex.org/W4243329861","doi":"https://doi.org/10.1145/3338468","title":"Proceedings of the 6th ACM Workshop on Moving Target Defense","display_name":"Proceedings of the 6th ACM Workshop on Moving Target Defense","publication_year":2019,"publication_date":"2019-11-08","ids":{"openalex":"https://openalex.org/W4243329861","doi":"https://doi.org/10.1145/3338468"},"language":"en","primary_location":{"id":"doi:10.1145/3338468","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.674574077129364},{"id":"https://openalex.org/keywords/disadvantage","display_name":"Disadvantage","score":0.6472651362419128},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.6229186654090881},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.49042102694511414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46042630076408386},{"id":"https://openalex.org/keywords/pleasure","display_name":"Pleasure","score":0.4559997618198395},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.416159063577652},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13718166947364807},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.10803315043449402},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08904117345809937}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.674574077129364},{"id":"https://openalex.org/C2777673361","wikidata":"https://www.wikidata.org/wiki/Q5281228","display_name":"Disadvantage","level":2,"score":0.6472651362419128},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.6229186654090881},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.49042102694511414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46042630076408386},{"id":"https://openalex.org/C2777113389","wikidata":"https://www.wikidata.org/wiki/Q208195","display_name":"Pleasure","level":2,"score":0.4559997618198395},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.416159063577652},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13718166947364807},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.10803315043449402},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08904117345809937},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3338468","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1603590763","https://openalex.org/W2171170310","https://openalex.org/W2190922845","https://openalex.org/W2376381135","https://openalex.org/W114017169","https://openalex.org/W2366083675","https://openalex.org/W2362400792","https://openalex.org/W2231036510","https://openalex.org/W2788891846","https://openalex.org/W2890483697"],"abstract_inverted_index":{"It":[0],"is":[1,95,113,186,205,231,271],"my":[2],"great":[3],"pleasure":[4],"to":[5,8,65,81,114,129,156,188,207,217,223,232,239,273],"welcome":[6],"you":[7,89],"the":[9,30,36,40,43,47,55,58,67,78,83,86,92,96,100,116,146,160,163,171,174,180,183,191,197,201,210,218,224,234,241,256,275,285],"2019":[10],"ACM":[11,48,101],"Workshop":[12],"on":[13,120],"Moving":[14],"Target":[15],"Defense":[16],"-":[17,249],"MTD":[18,185,230,281,302,306],"2019.":[19],"Putting":[20],"together":[21],"MTD'19":[22,93],"was":[23],"a":[24,149,214],"team":[25],"effort.":[26],"On":[27],"behalf":[28],"of":[29,42,57,85,99,109,148,162,196,229,255,262,280,316],"program":[31],"committee,":[32],"we":[33,264],"first":[34],"thank":[35,46,66],"authors":[37],"for":[38,51,72,245,296],"providing":[39],"content":[41],"program.":[44],"We":[45,258],"publication":[49,56],"staff":[50],"their":[52,73],"help":[53],"during":[54],"workshop":[59,94],"proceedings.":[60],"Finally,":[61],"I":[62],"would":[63],"like":[64],"reviewers":[68],"and":[69,126,131,136,158,168,182,194,220,247,278,314],"committee":[70],"members":[71],"hard":[74,206],"work":[75],"in":[76,253,303,307],"reviewing":[77],"paper":[79,299],"submissions":[80],"ensure":[82],"quality":[84],"workshop.":[87,106],"As":[88],"may":[90],"know,":[91],"6-th":[97],"edition":[98],"moving":[102,110],"target":[103,111],"defense":[104,112],"(MTD)":[105],"The":[107,226,292],"idea":[108],"impose":[115],"same":[117],"asymmetric":[118,143],"disadvantage":[119],"attackers":[121,248],"by":[122,209],"making":[123],"systems":[124],"dynamic":[125],"therefore":[127],"harder":[128],"explore":[130],"predict.":[132],"In":[133],"today's":[134],"computer":[135],"network":[137],"systems,":[138,305],"adversaries":[139],"do":[140],"have":[141,153],"an":[142],"advantage":[144],"over":[145],"defender":[147],"system":[150,172,181,198,203],"because":[151],"they":[152],"sufficient":[154,177],"time":[155],"observe":[157],"learn":[159],"behavior":[161,204],"system,":[164],"identify":[165],"possible":[166],"vulnerabilities,":[167],"only":[169],"attack":[170],"when":[173],"attacker":[175,219],"gains":[176],"knowledge":[178],"about":[179,288],"defender.":[184,225,257],"able":[187],"consistently":[189],"change":[190],"configurations,":[192],"settings,":[193],"parameters":[195],"such":[199],"that":[200],"observed":[202],"predict":[208],"attacker.":[211],"This":[212],"creates":[213],"significant":[215],"uncertainty":[216],"brings":[221],"benefits":[222],"ultimate":[227],"goal":[228],"increase":[233],"attackers'":[235],"workload":[236],"so":[237],"as":[238,282,284,310,312],"level":[240],"cybersecurity":[242],"playing":[243],"field":[244],"defenders":[246],"ultimately":[250],"tilting":[251],"it":[252],"favor":[254],"received":[259],"15":[260],"submissions,":[261],"which":[263],"accepted":[265],"8":[266],"papers.":[267],"One":[268],"keynote":[269],"speaker":[270],"invited":[272],"discuss":[274],"research":[276,290,298],"challenges":[277],"summary":[279],"well":[283,311],"speaker's":[286],"vision":[287],"future":[289],"directions.":[291],"other":[293],"sessions":[294],"are":[295],"full":[297],"presentation,":[300],"featuring":[301],"software":[304],"networking":[308],"applications,":[309],"modeling":[313],"analysis":[315],"MTD.":[317]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
