{"id":"https://openalex.org/W4387350693","doi":"https://doi.org/10.1109/tase.2023.3319373","title":"Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds","display_name":"Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds","publication_year":2023,"publication_date":"2023-10-04","ids":{"openalex":"https://openalex.org/W4387350693","doi":"https://doi.org/10.1109/tase.2023.3319373"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2023.3319373","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033305584","display_name":"Deepika Saxena","orcid":"https://orcid.org/0000-0002-6654-5535"},"institutions":[{"id":"https://openalex.org/I141591182","display_name":"University of Aizu","ror":"https://ror.org/02pg0e883","country_code":"JP","type":"education","lineage":["https://openalex.org/I141591182"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Deepika Saxena","raw_affiliation_strings":["Department of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu, Japan","institution_ids":["https://openalex.org/I141591182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002305212","display_name":"Rishabh Gupta","orcid":"https://orcid.org/0000-0001-9305-1269"},"institutions":[{"id":"https://openalex.org/I141591182","display_name":"University of Aizu","ror":"https://ror.org/02pg0e883","country_code":"JP","type":"education","lineage":["https://openalex.org/I141591182"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Rishabh Gupta","raw_affiliation_strings":["Department of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu, Japan","institution_ids":["https://openalex.org/I141591182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013082893","display_name":"Ashutosh Kumar Singh","orcid":"https://orcid.org/0000-0002-8053-5050"},"institutions":[],"countries":["IN","PL"],"is_corresponding":false,"raw_author_name":"Ashutosh Kumar Singh","raw_affiliation_strings":["Department of Computer Science (Informatics), University of Economics and Human Sciences, Warsaw, Poland","Indian Institute of Information Tech-nology Bhopal, Bhopal, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Tech-nology Bhopal, Bhopal, India","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science (Informatics), University of Economics and Human Sciences, Warsaw, Poland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074022699","display_name":"Athanasios V. Vasilakos","orcid":"https://orcid.org/0000-0003-1902-9877"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Athanasios V. Vasilakos","raw_affiliation_strings":["Department of ICT, Center for AI Research(CAIR), University of Agder (UiA), Kristiansand, Norway"],"affiliations":[{"raw_affiliation_string":"Department of ICT, Center for AI Research(CAIR), University of Agder (UiA), Kristiansand, Norway","institution_ids":["https://openalex.org/I200650556"]}]}],"institution_assertions":[],"countries_distinct_count":4,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":8.193,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.999981,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"21","issue":"4","first_page":"5837","last_page":"5851"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9921,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource Management","score":0.54022187}],"concepts":[{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.7239821},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.57516956},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.54022187},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5369541},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4753979},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.47227252},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.44883746},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35740194},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.32613248},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3239417},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.314247},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1895605},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.1766651},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16829544}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2023.3319373","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W104805067","https://openalex.org/W2126105956","https://openalex.org/W2209602157","https://openalex.org/W2336467084","https://openalex.org/W2342942543","https://openalex.org/W2346868680","https://openalex.org/W2524545814","https://openalex.org/W2525165169","https://openalex.org/W2570757594","https://openalex.org/W2625891264","https://openalex.org/W2644225658","https://openalex.org/W2784288320","https://openalex.org/W2786073798","https://openalex.org/W2799627099","https://openalex.org/W2912787478","https://openalex.org/W2916437501","https://openalex.org/W2921318726","https://openalex.org/W2946517659","https://openalex.org/W2965270260","https://openalex.org/W3012015249","https://openalex.org/W3027406059","https://openalex.org/W3048922006","https://openalex.org/W3131645226","https://openalex.org/W3163796971","https://openalex.org/W3169434696","https://openalex.org/W3185051527","https://openalex.org/W3185407146","https://openalex.org/W4206652988","https://openalex.org/W4210519879","https://openalex.org/W4226199274","https://openalex.org/W4292387395","https://openalex.org/W4293211786","https://openalex.org/W4295789345","https://openalex.org/W4315481265","https://openalex.org/W4383752436"],"related_works":["https://openalex.org/W986318368","https://openalex.org/W950578619","https://openalex.org/W2990194547","https://openalex.org/W2547038763","https://openalex.org/W2384410913","https://openalex.org/W2352878646","https://openalex.org/W2130149817","https://openalex.org/W2004734601","https://openalex.org/W2000785801","https://openalex.org/W1480123525"],"abstract_inverted_index":{"The":[0,86,163,179,406],"inefficient":[1],"sharing":[2],"of":[3,12,29,104,127,148,165,187,191,193,200,285,295,319,337,378,383,415,419,421,426],"industrial":[4,296,384],"cloud":[5],"resour-ces":[6],"among":[7],"multiple":[8,97,374],"users":[9],"and":[10,16,31,57,80,107,115,136,141,155,176,198,207,232,237,251,257,283,306,311,326,393,402,409,424],"vulnerabilities":[11],"virtual":[13,288],"machines":[14],"(VM)s":[15],"servers":[17,202,428],"prompt":[18],"unauthorized":[19],"access":[20],"to":[21,157,204,216,224,244,261,266,328,367,391],"users'":[22],"sensitive":[23,339],"data":[24,352,357],"along":[25],"with":[26,182,210,263,411,429],"excess":[27],"consumption":[28],"power":[30,196],"resource":[32,81,117,152,213,312,323,432],"wastage.":[33],"To":[34,271],"address":[35],"these":[36],"entangled":[37],"issues,":[38],"this":[39,272],"paper":[40],"proposes":[41],"a":[42,92,277],"novel":[43,278],"E":[46,65],"merging":[47],"VM":[48,78,112,314],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">T":[51],"hreat":[52],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">P":[55],"rediction":[56],"Dynamic":[58],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">W":[61],"orkload":[62],"stimation":[66],"based":[67,304],"Resource":[68,365],"Allocation":[69],"(":[70],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">ETP-WE":[73],")":[74],"framework":[75,88,132,168,280,348,360],"that":[76,95],"predicts":[77],"threats":[79,398,423],"usage":[82],"proactively":[83,401],"in":[84,160,189,290,331,381,417],"real-time.":[85],"proposed":[87,105,167,276],"contributes":[89],"by":[90,119,354,371],"introducing":[91],"Risk-Score":[93],"Matrix":[94],"analyses":[96],"risks":[98,375],"for":[99,110,124,139,281,292,309],"each":[100],"VM;":[101],"utilizing":[102],"knowledge":[103],"security":[106,135,149,194,265,305,320,369,397],"workload":[108,137,307],"analyzers":[109],"efficient":[111,313],"Placement":[113],"(VMP),":[114],"estimating":[116,372],"utilization":[118,214,433],"developing":[120],"an":[121,211,430],"ensemble":[122],"predictor":[123],"prior":[125],"mitigation":[126,284],"over-/under-load":[128],"on":[129,287,298],"servers.":[130,300],"ETP-WE":[131,188,279,301,347,359,416],"collaborates":[133,302],"machine-learning-based":[134],"analysis":[138,308],"secure":[140,293,310],"resource-efficient":[142],"VMP,":[143],"thereby":[144,316],"reducing":[145,317],"the":[146,158,166,185,229,234,241,329,335,373,395],"number":[147,199,318,425],"threats,":[150,195,321],"optimizing":[151,322],"utilization,":[153,324],"power-consumption,":[154],"adapting":[156],"changes":[159,330],"application":[161,332],"demands.":[162,253,333],"performance":[164,370,407],"is":[169],"evaluated":[170],"using":[171],"two":[172],"benchmark":[173],"datasets":[174],"OpenNebula":[175],"Google":[177],"Cluster.":[178],"simulation-based":[180],"comparison":[181,410],"state-of-the-arts":[183,412],"validates":[184],"efficacy":[186],"terms":[190,418],"reduction":[192,420],"consumption,":[197],"active":[201,427],"up":[203,215],"86.9%,":[205],"66.67%":[206],"30%-80%,":[208],"respectively":[209],"improved":[212,351,431],"60%-75%":[217],"over":[218,434],"existing":[219,435],"approaches":[220],"Note":[223],"Practitioners":[225],"\u2014Industry":[226],"clouds":[227],"serve":[228],"precise":[230],"needs":[231,243],"provide":[233],"service":[235,269],"features":[236],"tools":[238],"as":[239,342],"per":[240],"industry's":[242],"help":[245,390],"organizations":[246,259],"meet":[247,267],"their":[248,404],"workloads":[249],"processing":[250,336],"storage":[252],"For":[254],"instance,":[255],"healthcare":[256],"financial":[258],"have":[260,275],"comply":[262],"extended":[264],"specific":[268],"requirements.":[270],"context,":[273],"we":[274],"prediction":[282],"cyberthreats":[286],"resources":[289],"real-time":[291],"execution":[294,382],"applications":[297],"third-party":[299],"machine-learning":[303],"allocation,":[315],"power-consumption":[325],"adaptating":[327],"During":[334],"any":[338],"transaction":[340],"such":[341],"medical":[343],"data,":[344],"bank":[345],"transactions,":[346],"will":[349,361,389],"induce":[350],"protection":[353],"mitigating":[355],"potential":[356],"breaches.":[358],"be":[362],"deployed":[363],"at":[364],"Scheduler":[366],"boost":[368],"score":[376],"status":[377],"VMs":[379],"engaged":[380],"transactions":[385],"or":[386,399],"workloads.":[387],"It":[388],"predict":[392],"analyze":[394],"probable":[396],"breaches":[400],"facilitate":[403],"mitigation.":[405],"evaluation":[408],"validate":[413],"potency":[414],"cybersecurity":[422],"approaches.":[436]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387350693","counts_by_year":[{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-09T02:21:39.870397","created_date":"2023-10-05"}