{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:53:33Z","timestamp":1742939613384,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031535543"},{"type":"electronic","value":"9783031535550"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53555-0_17","type":"book-chapter","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:02:10Z","timestamp":1707800530000},"page":"173-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Monitoring Power Usage Effectiveness to\u00a0Detect Cooling Systems Attacks and\u00a0Failures in\u00a0Cloud Data Centers"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6415-1180","authenticated-orcid":false,"given":"Michele","family":"Mastroianni","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4199-8199","authenticated-orcid":false,"given":"Massimo","family":"Ficco","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1760-5527","authenticated-orcid":false,"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[]},{"given":"Vincenzo Emanuele","family":"Martone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"17_CR1","unstructured":"Avelar, V., Azevedo, D., French, A., Power, E.N.: PUE: a comprehensive examination of the metric. White paper 49 (2012)"},{"issue":"5","key":"17_CR2","doi-asserted-by":"publisher","first-page":"4702","DOI":"10.1109\/TSG.2017.2667586","volume":"9","author":"M Chlela","year":"2018","unstructured":"Chlela, M., Mascarella, D., Jo\u00f3s, G., Kassouf, M.: Fallback control for isochronous energy storage systems in autonomous microgrids under denial-of-service cyber-attacks. IEEE Trans. Smart Grid 9(5), 4702\u20134711 (2018). https:\/\/doi.org\/10.1109\/TSG.2017.2667586","journal-title":"IEEE Trans. Smart Grid"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Chung, K., Formicola, V., Kalbarczyk, Z.T., Iyer, R.K., Withers, A., Slagell, A.J.: Attacking supercomputers through targeted alteration of environmental control: a data driven case study. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 406\u2013410 (2016). https:\/\/doi.org\/10.1109\/CNS.2016.7860528","DOI":"10.1109\/CNS.2016.7860528"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Ficco, M.: Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? Inf. Sci. 476, 474\u2013490 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.05.029, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025518303955","DOI":"10.1016\/j.ins.2018.05.029"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/JSYST.2015.2414822","volume":"11","author":"M Ficco","year":"2017","unstructured":"Ficco, M., Palmieri, F.: Introducing fraudulent energy consumption in cloud infrastructures: a new generation of denial-of-service attacks. IEEE Syst. J. 11(2), 460\u2013470 (2017). https:\/\/doi.org\/10.1109\/JSYST.2015.2414822","journal-title":"IEEE Syst. J."},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"38606","DOI":"10.1109\/ACCESS.2020.2975110","volume":"8","author":"MU Ghazi","year":"2020","unstructured":"Ghazi, M.U., Khan Khattak, M.A., Shabir, B., Malik, A.W., Sher Ramzan, M.: Emergency message dissemination in vehicular networks: a review. IEEE Access 8, 38606\u201338621 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2975110","journal-title":"IEEE Access"},{"key":"17_CR7","unstructured":"Grid, T.G.: Green grid data center power efficiency metrics: Pue and dcie, the green grid. White Paper 6, 1\u201316 (2008)"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1007\/s11227-010-0504-1","volume":"62","author":"D Kliazovich","year":"2012","unstructured":"Kliazovich, D., Bouvry, P., Khan, S.U.: Greencloud: a packet-level simulator of energy-aware cloud computing data centers. J. Supercomput. 62, 1263\u20131283 (2012)","journal-title":"J. Supercomput."},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"Kurpicz, M., Orgerie, A.C., Sobe, A.: How much does a VM cost? energy-proportional accounting in vm-based environments. In: 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), pp. 651\u2013658 (2016). https:\/\/doi.org\/10.1109\/PDP.2016.70","DOI":"10.1109\/PDP.2016.70"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Li, J., Jurasz, J., Li, H., Tao, W.Q., Duan, Y., Yan, J.: A new indicator for a fair comparison on the energy performance of data centers. Appl. Energy 276, 115497 (2020). https:\/\/doi.org\/10.1016\/j.apenergy.2020.115497, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306261920310096","DOI":"10.1016\/j.apenergy.2020.115497"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Lin, J.C., Leu, F.Y., Chen, Y.p.: Analyzing job completion reliability and job energy consumption for a general mapreduce infrastructure. Journal of High Speed Networks 19, 203\u2013214 (2013). https:\/\/doi.org\/10.3233\/JHS-130473","DOI":"10.3233\/JHS-130473"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Long, S., Li, Y., Huang, J., Li, Z., Li, Y.: A review of energy efficiency evaluation technologies in cloud data centers. Energy and Buildings 260, 111848 (2022). https:\/\/doi.org\/10.1016\/j.enbuild.2022.111848, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0378778822000196","DOI":"10.1016\/j.enbuild.2022.111848"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"102144","DOI":"10.1016\/j.simpat.2020.102144","volume":"104","author":"N Mansouri","year":"2020","unstructured":"Mansouri, N., Ghafari, R., Zade, B.M.H.: Cloud computing simulators: a comprehensive review. Simul. Model. Pract. Theory 104, 102144 (2020)","journal-title":"Simul. Model. Pract. Theory"},{"issue":"6481","key":"17_CR14","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1126\/science.aba3758","volume":"367","author":"E Masanet","year":"2020","unstructured":"Masanet, E., Shehabi, A., Lei, N., Smith, S., Koomey, J.: Recalibrating global data center energy-use estimates. Science 367(6481), 984\u2013986 (2020)","journal-title":"Science"},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Mastroianni, M., Palmieri, F.: Energy-aware optimization of data centers and cybersecurity issues. In: 2022 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). pp.\u00a01\u20137 (2022). https:\/\/doi.org\/10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927965","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927965"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Palmieri, F., Ricciardi, S., Fiore, U.: Evaluating network-based dos attacks under the energy consumption perspective: new security issues in the coming green ICT area. In: 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 374\u2013379. IEEE (2011)","DOI":"10.1109\/BWCCA.2011.66"},{"issue":"5","key":"17_CR17","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1007\/s11227-014-1242-6","volume":"71","author":"F Palmieri","year":"2015","unstructured":"Palmieri, F., Ricciardi, S., Fiore, U., Ficco, M., Castiglione, A.: Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. J. Supercomput. 71(5), 1620\u20131641 (2015). https:\/\/doi.org\/10.1007\/s11227-014-1242-6","journal-title":"J. Supercomput."},{"key":"17_CR18","doi-asserted-by":"publisher","unstructured":"Park, K., et al.: An advanced persistent threat (apt)-style cyberattack testbed for distributed energy resources (der). In: 2021 IEEE Design Methodologies Conference (DMC), pp.\u00a01\u20135 (2021). https:\/\/doi.org\/10.1109\/DMC51747.2021.9529953","DOI":"10.1109\/DMC51747.2021.9529953"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"195216","DOI":"10.1109\/ACCESS.2020.3033791","volume":"8","author":"A Shaikh","year":"2020","unstructured":"Shaikh, A., Uddin, M., Elmagzoub, M.A., Alghamdi, A.: PEMC: power efficiency measurement calculator to compute power efficiency and co2 emissions in cloud data centers. IEEE Access 8, 195216\u2013195228 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3033791","journal-title":"IEEE Access"},{"issue":"6","key":"17_CR20","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TDSC.2012.70","volume":"9","author":"Z Wu","year":"2012","unstructured":"Wu, Z., Xie, M., Wang, H.: On energy security of server systems. IEEE Trans. Dependable Secure Comput. 9(6), 865\u2013876 (2012). https:\/\/doi.org\/10.1109\/TDSC.2012.70","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Yugha, R., Chithra, S.: A survey on technologies and security protocols: reference for future generation IoT. J. Netw. Comput. Appl. 169, 102763 (2020) https:\/\/doi.org\/10.1016\/j.jnca.2020.102763, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S108480452030237X","DOI":"10.1016\/j.jnca.2020.102763"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53555-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:06:08Z","timestamp":1707800768000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53555-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535543","9783031535550"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53555-0_17","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}