Moving Target Defense for Service-oriented Mission-critical Networks Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2303.09893
Modern mission-critical systems (MCS) are increasingly softwarized and interconnected. As a result, their complexity increased, and so their vulnerability against cyber-attacks. The current adoption of virtualization and service-oriented architectures (SOA) in MCSs provides additional flexibility that can be leveraged to withstand and mitigate attacks, e.g., by moving critical services or data flows. This enables the deployment of strategies for moving target defense (MTD), which allows stripping attackers of their asymmetric advantage from the long reconnaissance of MCSs. However, it is challenging to design MTD strategies, given the diverse threat landscape, resource limitations, and potential degradation in service availability. In this paper, we combine two optimization models to explore feasible service configurations for SOA-based systems and to derive subsequent MTD actions with their time schedule based on an attacker-defender game. Our results indicate that even for challenging and diverse attack scenarios, our models can defend the system by up to 90% of the system operation time with a limited MTD defender budget.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2303.09893
- https://arxiv.org/pdf/2303.09893
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4327991923
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4327991923Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2303.09893Digital Object Identifier
- Title
-
Moving Target Defense for Service-oriented Mission-critical NetworksWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-03-17Full publication date if available
- Authors
-
Doğanalp Ergenç, Florian Schneider, Peter Kling, Mathias FischerList of authors in order
- Landing page
-
https://arxiv.org/abs/2303.09893Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2303.09893Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2303.09893Direct OA link when available
- Concepts
-
Software deployment, Computer science, Schedule, Flexibility (engineering), Service (business), Virtualization, Vulnerability (computing), Computer security, Resource (disambiguation), Distributed computing, Critical infrastructure, Computer network, Business, Cloud computing, Software engineering, Operating system, Statistics, Mathematics, MarketingTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4327991923 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2303.09893 |
| ids.doi | https://doi.org/10.48550/arxiv.2303.09893 |
| ids.openalex | https://openalex.org/W4327991923 |
| fwci | |
| type | preprint |
| title | Moving Target Defense for Service-oriented Mission-critical Networks |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10734 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9990000128746033 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Information and Cyber Security |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9980000257492065 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T10714 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.993399977684021 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Software-Defined Networks and 5G |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C105339364 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6475155353546143 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q2297740 |
| concepts[0].display_name | Software deployment |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6191144585609436 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C68387754 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5898125767707825 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q7271585 |
| concepts[2].display_name | Schedule |
| concepts[3].id | https://openalex.org/C2780598303 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5860174298286438 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q65921492 |
| concepts[3].display_name | Flexibility (engineering) |
| concepts[4].id | https://openalex.org/C2780378061 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5516536831855774 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q25351891 |
| concepts[4].display_name | Service (business) |
| concepts[5].id | https://openalex.org/C513985346 |
| concepts[5].level | 3 |
| concepts[5].score | 0.5440418720245361 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q270471 |
| concepts[5].display_name | Virtualization |
| concepts[6].id | https://openalex.org/C95713431 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5328481793403625 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[6].display_name | Vulnerability (computing) |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4576164782047272 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C206345919 |
| concepts[8].level | 2 |
| concepts[8].score | 0.42569664120674133 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q20380951 |
| concepts[8].display_name | Resource (disambiguation) |
| concepts[9].id | https://openalex.org/C120314980 |
| concepts[9].level | 1 |
| concepts[9].score | 0.4222843050956726 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[9].display_name | Distributed computing |
| concepts[10].id | https://openalex.org/C29852176 |
| concepts[10].level | 2 |
| concepts[10].score | 0.41593778133392334 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q373338 |
| concepts[10].display_name | Critical infrastructure |
| concepts[11].id | https://openalex.org/C31258907 |
| concepts[11].level | 1 |
| concepts[11].score | 0.1937406361103058 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[11].display_name | Computer network |
| concepts[12].id | https://openalex.org/C144133560 |
| concepts[12].level | 0 |
| concepts[12].score | 0.166624516248703 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[12].display_name | Business |
| concepts[13].id | https://openalex.org/C79974875 |
| concepts[13].level | 2 |
| concepts[13].score | 0.1462516188621521 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[13].display_name | Cloud computing |
| concepts[14].id | https://openalex.org/C115903868 |
| concepts[14].level | 1 |
| concepts[14].score | 0.13272133469581604 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q80993 |
| concepts[14].display_name | Software engineering |
| concepts[15].id | https://openalex.org/C111919701 |
| concepts[15].level | 1 |
| concepts[15].score | 0.09649264812469482 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[15].display_name | Operating system |
| concepts[16].id | https://openalex.org/C105795698 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q12483 |
| concepts[16].display_name | Statistics |
| concepts[17].id | https://openalex.org/C33923547 |
| concepts[17].level | 0 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[17].display_name | Mathematics |
| concepts[18].id | https://openalex.org/C162853370 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q39809 |
| concepts[18].display_name | Marketing |
| keywords[0].id | https://openalex.org/keywords/software-deployment |
| keywords[0].score | 0.6475155353546143 |
| keywords[0].display_name | Software deployment |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6191144585609436 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/schedule |
| keywords[2].score | 0.5898125767707825 |
| keywords[2].display_name | Schedule |
| keywords[3].id | https://openalex.org/keywords/flexibility |
| keywords[3].score | 0.5860174298286438 |
| keywords[3].display_name | Flexibility (engineering) |
| keywords[4].id | https://openalex.org/keywords/service |
| keywords[4].score | 0.5516536831855774 |
| keywords[4].display_name | Service (business) |
| keywords[5].id | https://openalex.org/keywords/virtualization |
| keywords[5].score | 0.5440418720245361 |
| keywords[5].display_name | Virtualization |
| keywords[6].id | https://openalex.org/keywords/vulnerability |
| keywords[6].score | 0.5328481793403625 |
| keywords[6].display_name | Vulnerability (computing) |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.4576164782047272 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/resource |
| keywords[8].score | 0.42569664120674133 |
| keywords[8].display_name | Resource (disambiguation) |
| keywords[9].id | https://openalex.org/keywords/distributed-computing |
| keywords[9].score | 0.4222843050956726 |
| keywords[9].display_name | Distributed computing |
| keywords[10].id | https://openalex.org/keywords/critical-infrastructure |
| keywords[10].score | 0.41593778133392334 |
| keywords[10].display_name | Critical infrastructure |
| keywords[11].id | https://openalex.org/keywords/computer-network |
| keywords[11].score | 0.1937406361103058 |
| keywords[11].display_name | Computer network |
| keywords[12].id | https://openalex.org/keywords/business |
| keywords[12].score | 0.166624516248703 |
| keywords[12].display_name | Business |
| keywords[13].id | https://openalex.org/keywords/cloud-computing |
| keywords[13].score | 0.1462516188621521 |
| keywords[13].display_name | Cloud computing |
| keywords[14].id | https://openalex.org/keywords/software-engineering |
| keywords[14].score | 0.13272133469581604 |
| keywords[14].display_name | Software engineering |
| keywords[15].id | https://openalex.org/keywords/operating-system |
| keywords[15].score | 0.09649264812469482 |
| keywords[15].display_name | Operating system |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2303.09893 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2303.09893 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2303.09893 |
| locations[1].id | doi:10.48550/arxiv.2303.09893 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2303.09893 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5013341097 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-4640-031X |
| authorships[0].author.display_name | Doğanalp Ergenç |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ergenç, Doğanalp |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5007178893 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-6596-0833 |
| authorships[1].author.display_name | Florian Schneider |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Schneider, Florian |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5007675663 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-0000-8689 |
| authorships[2].author.display_name | Peter Kling |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Kling, Peter |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5033270363 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-6254-8288 |
| authorships[3].author.display_name | Mathias Fischer |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Fischer, Mathias |
| authorships[3].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2303.09893 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-03-21T00:00:00 |
| display_name | Moving Target Defense for Service-oriented Mission-critical Networks |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10734 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9990000128746033 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Information and Cyber Security |
| related_works | https://openalex.org/W2770234245, https://openalex.org/W96612179, https://openalex.org/W4229499248, https://openalex.org/W2566006169, https://openalex.org/W2987774938, https://openalex.org/W4256492088, https://openalex.org/W632915154, https://openalex.org/W2055733372, https://openalex.org/W4297199789, https://openalex.org/W2380314794 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2303.09893 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2303.09893 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2303.09893 |
| primary_location.id | pmh:oai:arXiv.org:2303.09893 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2303.09893 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2303.09893 |
| publication_date | 2023-03-17 |
| publication_year | 2023 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 10, 156 |
| abstract_inverted_index.As | 9 |
| abstract_inverted_index.In | 98 |
| abstract_inverted_index.an | 126 |
| abstract_inverted_index.be | 37 |
| abstract_inverted_index.by | 45, 146 |
| abstract_inverted_index.in | 30, 95 |
| abstract_inverted_index.is | 79 |
| abstract_inverted_index.it | 78 |
| abstract_inverted_index.of | 24, 56, 67, 75, 150 |
| abstract_inverted_index.on | 125 |
| abstract_inverted_index.or | 49 |
| abstract_inverted_index.so | 16 |
| abstract_inverted_index.to | 39, 81, 106, 115, 148 |
| abstract_inverted_index.up | 147 |
| abstract_inverted_index.we | 101 |
| abstract_inverted_index.90% | 149 |
| abstract_inverted_index.MTD | 83, 118, 158 |
| abstract_inverted_index.Our | 129 |
| abstract_inverted_index.The | 21 |
| abstract_inverted_index.and | 7, 15, 26, 41, 92, 114, 136 |
| abstract_inverted_index.are | 4 |
| abstract_inverted_index.can | 36, 142 |
| abstract_inverted_index.for | 58, 111, 134 |
| abstract_inverted_index.our | 140 |
| abstract_inverted_index.the | 54, 72, 86, 144, 151 |
| abstract_inverted_index.two | 103 |
| abstract_inverted_index.MCSs | 31 |
| abstract_inverted_index.This | 52 |
| abstract_inverted_index.data | 50 |
| abstract_inverted_index.even | 133 |
| abstract_inverted_index.from | 71 |
| abstract_inverted_index.long | 73 |
| abstract_inverted_index.that | 35, 132 |
| abstract_inverted_index.this | 99 |
| abstract_inverted_index.time | 122, 154 |
| abstract_inverted_index.with | 120, 155 |
| abstract_inverted_index.(MCS) | 3 |
| abstract_inverted_index.(SOA) | 29 |
| abstract_inverted_index.MCSs. | 76 |
| abstract_inverted_index.based | 124 |
| abstract_inverted_index.e.g., | 44 |
| abstract_inverted_index.game. | 128 |
| abstract_inverted_index.given | 85 |
| abstract_inverted_index.their | 12, 17, 68, 121 |
| abstract_inverted_index.which | 63 |
| abstract_inverted_index.(MTD), | 62 |
| abstract_inverted_index.Modern | 0 |
| abstract_inverted_index.allows | 64 |
| abstract_inverted_index.attack | 138 |
| abstract_inverted_index.defend | 143 |
| abstract_inverted_index.derive | 116 |
| abstract_inverted_index.design | 82 |
| abstract_inverted_index.flows. | 51 |
| abstract_inverted_index.models | 105, 141 |
| abstract_inverted_index.moving | 46, 59 |
| abstract_inverted_index.paper, | 100 |
| abstract_inverted_index.system | 145, 152 |
| abstract_inverted_index.target | 60 |
| abstract_inverted_index.threat | 88 |
| abstract_inverted_index.actions | 119 |
| abstract_inverted_index.against | 19 |
| abstract_inverted_index.budget. | 160 |
| abstract_inverted_index.combine | 102 |
| abstract_inverted_index.current | 22 |
| abstract_inverted_index.defense | 61 |
| abstract_inverted_index.diverse | 87, 137 |
| abstract_inverted_index.enables | 53 |
| abstract_inverted_index.explore | 107 |
| abstract_inverted_index.limited | 157 |
| abstract_inverted_index.result, | 11 |
| abstract_inverted_index.results | 130 |
| abstract_inverted_index.service | 96, 109 |
| abstract_inverted_index.systems | 2, 113 |
| abstract_inverted_index.However, | 77 |
| abstract_inverted_index.adoption | 23 |
| abstract_inverted_index.attacks, | 43 |
| abstract_inverted_index.critical | 47 |
| abstract_inverted_index.defender | 159 |
| abstract_inverted_index.feasible | 108 |
| abstract_inverted_index.indicate | 131 |
| abstract_inverted_index.mitigate | 42 |
| abstract_inverted_index.provides | 32 |
| abstract_inverted_index.resource | 90 |
| abstract_inverted_index.schedule | 123 |
| abstract_inverted_index.services | 48 |
| abstract_inverted_index.SOA-based | 112 |
| abstract_inverted_index.advantage | 70 |
| abstract_inverted_index.attackers | 66 |
| abstract_inverted_index.leveraged | 38 |
| abstract_inverted_index.operation | 153 |
| abstract_inverted_index.potential | 93 |
| abstract_inverted_index.stripping | 65 |
| abstract_inverted_index.withstand | 40 |
| abstract_inverted_index.additional | 33 |
| abstract_inverted_index.asymmetric | 69 |
| abstract_inverted_index.complexity | 13 |
| abstract_inverted_index.deployment | 55 |
| abstract_inverted_index.increased, | 14 |
| abstract_inverted_index.landscape, | 89 |
| abstract_inverted_index.scenarios, | 139 |
| abstract_inverted_index.strategies | 57 |
| abstract_inverted_index.subsequent | 117 |
| abstract_inverted_index.challenging | 80, 135 |
| abstract_inverted_index.degradation | 94 |
| abstract_inverted_index.flexibility | 34 |
| abstract_inverted_index.softwarized | 6 |
| abstract_inverted_index.strategies, | 84 |
| abstract_inverted_index.increasingly | 5 |
| abstract_inverted_index.limitations, | 91 |
| abstract_inverted_index.optimization | 104 |
| abstract_inverted_index.architectures | 28 |
| abstract_inverted_index.availability. | 97 |
| abstract_inverted_index.vulnerability | 18 |
| abstract_inverted_index.configurations | 110 |
| abstract_inverted_index.cyber-attacks. | 20 |
| abstract_inverted_index.reconnaissance | 74 |
| abstract_inverted_index.virtualization | 25 |
| abstract_inverted_index.interconnected. | 8 |
| abstract_inverted_index.mission-critical | 1 |
| abstract_inverted_index.service-oriented | 27 |
| abstract_inverted_index.attacker-defender | 127 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |