{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:18Z","timestamp":1740123678807,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:00:00Z","timestamp":1578009600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:00:00Z","timestamp":1578009600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11036-019-01446-w","type":"journal-article","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T11:04:48Z","timestamp":1578395088000},"page":"725-742","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Active Defense by Mimic Association Transmission in Edge Computing"],"prefix":"10.1007","volume":"25","author":[{"given":"Shuo","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0998-1517","authenticated-orcid":false,"given":"Qianmu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Shunmei","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Cangqi","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"1446_CR1","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680\u2013698","journal-title":"Futur Gener Comput Syst"},{"key":"1446_CR2","unstructured":"Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing. arXiv preprint arXiv:1709.08025"},{"issue":"2","key":"1446_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.dcan.2017.07.001","volume":"4","author":"Y Ai","year":"2018","unstructured":"Ai Y, Peng M, Zhang K (2018) Edge computing technologies for internet of things: a primer. Digit Commun Netw 4(2):77\u201386","journal-title":"Digit Commun Netw"},{"issue":"4","key":"1446_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1038\/scientificamerican1004-76","volume":"291","author":"N Gershenfeld","year":"2004","unstructured":"Gershenfeld N, Krikorian R, Cohen D (2004) The internet of things. Sci Am 291(4):76\u201381","journal-title":"Sci Am"},{"issue":"1","key":"1446_CR5","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","volume":"32","author":"H Li","year":"2018","unstructured":"Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Netw 32(1):96\u2013101","journal-title":"IEEE Netw"},{"key":"1446_CR6","unstructured":"Yang H (2016) Method for behavior-prediction of APT attack based on dynamic Bayesian game. In: 2016 IEEE international conference on cloud computing and big data analysis (ICCCBDA), pp 177\u2013182, Chengdu, China"},{"issue":"2","key":"1446_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCOM.2018.1700629","volume":"56","author":"J Wan","year":"2018","unstructured":"Wan J et al (2018) Toward dynamic resources management for IoT-based manufacturing. IEEE Commun Mag 56(2):52\u201359","journal-title":"IEEE Commun Mag"},{"issue":"7","key":"1446_CR8","doi-asserted-by":"publisher","first-page":"3277","DOI":"10.1007\/s11227-016-1947-9","volume":"73","author":"J Wang","year":"2017","unstructured":"Wang J, Cao J, Ji S, Park JH (2017) Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks. J Supercomput 73(7):3277\u20133290","journal-title":"J Supercomput"},{"key":"1446_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2018.2876146","volume":"7","author":"Y Yin","year":"2019","unstructured":"Yin Y, Zhang W, Xu Y, Zhang H, Mai Z, Yu L (2019) QoS prediction for Mobile edge service recommendation with auto-encoder. IEEE Access 7:1\u20131","journal-title":"IEEE Access"},{"key":"1446_CR10","doi-asserted-by":"crossref","unstructured":"Yin Y, Chen L, Xu Y, Wan J, Zhang H, Mai Z (2019) QoS prediction for service recommendation with deep feature learning in edge computing environment. Mob Networks Appl:1\u201311","DOI":"10.1007\/s11036-019-01241-7"},{"issue":"2","key":"1446_CR11","first-page":"2018","volume":"14","author":"H Gao","year":"2018","unstructured":"Gao H, Zhang K, Yang J, Wu F, Liu H (2018) Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks. Spec Collect Artic Int J Distrib Sens Netw 14(2):2018","journal-title":"Spec Collect Artic Int J Distrib Sens Netw"},{"key":"1446_CR12","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/j.future.2018.04.064","volume":"87","author":"H Gao","year":"2018","unstructured":"Gao H, Huang W, Yang X, Duan Y, Yin Y (2018) Toward service selection for workflow reconfiguration: an interface-based computing solution. Futur Gener Comput Syst 87:298\u2013311","journal-title":"Futur Gener Comput Syst"},{"key":"1446_CR13","doi-asserted-by":"crossref","unstructured":"Dunlop M, Groat S, Urbanski W, Marchany R, Tront J (2011) MT6D: a moving target IPv6 defense. In: 2011 \u2013 MILCOM 2011 military communications conference, pp 1321\u20131326, Baltimore, MD, USA","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"1446_CR14","unstructured":"Atighetchi M, Pal P, Webber F, Jones C (2003) Adaptive use of network-centric mechanisms in cyber-defense. In: Second IEEE international symposium on network computing and applications. NCA 2003, pp 179\u2013188, Cambridge, MA, USA"},{"key":"1446_CR15","doi-asserted-by":"crossref","unstructured":"Badishi G, Herzberg A, Keidar I (2007) Keeping denial-of-service attackers in the dark. IEEE Transactions on Dependable and Secure Computing 4(3):191\u2013204","DOI":"10.1109\/TDSC.2007.70209"},{"key":"1446_CR16","doi-asserted-by":"crossref","unstructured":"Antonatos S, Akritidis P, Markatos EP, Anagnostakis KG (2005) Defending against Hitlist Worms using network address space randomization. Computer Networks 51(12):3471\u20133490","DOI":"10.1145\/1103626.1103633"},{"key":"1446_CR17","doi-asserted-by":"crossref","unstructured":"Jafarian JH, Al-Shaer E, Duan Q (2012) OpenFlow random host mutation: transparent moving target defense using software defined networking. Proceedings of the first workshop on Hot topics in software defined networks. ACM, pp 127\u2013132","DOI":"10.1145\/2342441.2342467"},{"issue":"4","key":"1446_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2012.28","volume":"10","author":"M Dunlop","year":"2012","unstructured":"Dunlop M, Groat S, Urbanski W, Marchany R, Tront J (Jul. 2012) The blind man\u2019s bluff approach to security using IPv6. IEEE Secur Priv Mag 10(4):35\u201343","journal-title":"IEEE Secur Priv Mag"},{"key":"1446_CR19","doi-asserted-by":"crossref","unstructured":"Jafarian JH, Al-Shaer E, Duan Q (2014) Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers. Proceedings of the First ACM Workshop on Moving Target Defense. ACM, pp 69\u201378","DOI":"10.1145\/2663474.2663483"},{"key":"1446_CR20","doi-asserted-by":"crossref","unstructured":"MacFarland DC, Shue CA (2015) The SDN shuffle. In: Proceedings of the second ACM workshop on moving target defense \u2013 MTD \u201815, pp 37\u201341, Denver, Colorado, US","DOI":"10.1145\/2808475.2808485"},{"key":"1446_CR21","doi-asserted-by":"crossref","unstructured":"Skowyra R, Bauer K, Dedhia V, Okhravi H (2016) Have no phear: Networks without identifiers. Proceedings of the 2016 ACM Workshop on Moving Target Defense. ACM, pp 3\u201314","DOI":"10.1145\/2995272.2995276"},{"key":"1446_CR22","doi-asserted-by":"crossref","unstructured":"Sun J, Sun K (2016) DESIR: decoy-enhanced seamless IP randomization. In: IEEE INFOCOM 2016 \u2013 the 35th annual IEEE international conference on computer communications, pp 1\u20139","DOI":"10.1109\/INFOCOM.2016.7524602"},{"key":"1446_CR23","unstructured":"Jiangxing Wu. C. M. Defense, \u201cResearch on Cyber Mimic Defense,\u201d. J Cyber Secur vol. 1, no. 4, pp. 1\u201310, 2016"},{"issue":"10","key":"1446_CR24","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1142\/S0218194018500390","volume":"28","author":"H Gao","year":"2018","unstructured":"Gao H, Miao H, Liu L, Kai J, Zhao K (2018) Automated quantitative verification for service-based system design: a visualization transform tool perspective. Int J Softw Eng Knowl Eng 28(10):1369\u20131397","journal-title":"Int J Softw Eng Knowl Eng"},{"issue":"3","key":"1446_CR25","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TCSS.2018.2865217","volume":"5","author":"H Gao","year":"2018","unstructured":"Gao H, Mao S, Huang W, Yang X (2018) Applying probabilistic model checking to financial production risk evaluation and control: a case study of Alibaba\u2019s Yu\u2019e Bao. IEEE Trans Comput Soc Syst 5(3):785\u2013795","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1446_CR26","unstructured":"Haggerty J, Shi Q, Merabti M (2002) Beyond the perimeter: the need for early detection of denial of service attacks. In: Proceedings of 18th annual computer security applications conference, pp 413\u2013422, Las Vegas, NV, USA"},{"key":"1446_CR27","doi-asserted-by":"crossref","unstructured":"Zhang J, Gunter CA (2010) Application-aware secure multicast for power grid communications. In: 2010 first IEEE international conference on smart grid communications, pp 339\u2013344, Gaithersburg, MD, USA","DOI":"10.1109\/SMARTGRID.2010.5622066"},{"key":"1446_CR28","doi-asserted-by":"publisher","first-page":"62815","DOI":"10.1109\/ACCESS.2018.2877137","volume":"6","author":"Y Yin","year":"2018","unstructured":"Yin Y, Chen L, Xu Y, Wan J (2018) Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 6:62815\u201362825","journal-title":"IEEE Access"},{"issue":"9","key":"1446_CR29","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.3390\/s17092059","volume":"17","author":"Y Yin","year":"2017","unstructured":"Yin Y, Yu F, Xu Y, Yu L, Mu J (2017) Network location-aware service recommendation with random walk in cyber-physical systems. Sensors 17(9):2059","journal-title":"Sensors"},{"key":"1446_CR30","first-page":"1","volume":"2018","author":"W Liang","year":"2018","unstructured":"Liang W et al (2018) A security situation prediction algorithm based on HMM in Mobile network. Wirel Commun Mob Comput 2018:1\u201311","journal-title":"Wirel Commun Mob Comput"},{"issue":"3","key":"1446_CR31","first-page":"447","volume":"55","author":"M Wan","year":"2018","unstructured":"Wan M, Yao J, Jing Y, Jin X (2018) Event-based anomaly detection for non-public industrial communication protocols in SDN-based control systems. CMC 55(3):447\u2013463","journal-title":"CMC"},{"issue":"2","key":"1446_CR32","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.2018.1700621","volume":"56","author":"Q Yan","year":"2018","unstructured":"Yan Q, Huang W, Luo X, Gong Q, Yu FR (2018) A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Commun Mag 56(2):30\u201336","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"1446_CR33","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.3390\/e17042367","volume":"17","author":"P Berezi\u0144ski","year":"2015","unstructured":"Berezi\u0144ski P, Jasiul B, Szpyrka M, Berezi\u0144ski P, Jasiul B, Szpyrka M (2015) An entropy-based network anomaly detection method. Entropy 17(4):2367\u20132408","journal-title":"Entropy"},{"issue":"24","key":"1446_CR34","doi-asserted-by":"publisher","first-page":"25623","DOI":"10.1007\/s11042-017-4355-0","volume":"76","author":"S Prasanth Vaidya","year":"2017","unstructured":"Prasanth Vaidya S, Chandra Mouli PVSSR (2017) A robust semi-blind watermarking for color images based on multiple decompositions. Multimed Tools Appl 76(24):25623\u201325656","journal-title":"Multimed Tools Appl"},{"key":"1446_CR35","doi-asserted-by":"crossref","unstructured":"Zhao C, Jia C (2013) Research on spatial adaptive strategy of end-hopping system. In: 2013 fourth international conference on emerging intelligent data and web technologies, pp 661\u2013666, Xi\\\"an, Shaanxi, China","DOI":"10.1109\/EIDWT.2013.119"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01446-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01446-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01446-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:49:38Z","timestamp":1609548578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01446-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,3]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1446"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01446-w","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2020,1,3]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}