{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:14:30Z","timestamp":1725732870821},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44885-4_6","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T09:10:25Z","timestamp":1409130625000},"page":"73-85","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems"],"prefix":"10.1007","author":[{"given":"Suaad","family":"Alarifi","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"199","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"T. Ristenpart","year":"2009","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199\u2013212. ACM, New York (2009)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Oprea, A., Reiter, M.: Homealone: Co-residency detection in the cloud via side-channel analysis. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 313\u2013328 (2011)","DOI":"10.1109\/SP.2011.31"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Alarifi, S., Wolthusen, S.D.: Robust coordination of cloud-internal denial of service attacks. In: Third International Conference on Cloud and Green Computing (CGC), pp. 135\u2013142 (2013)","DOI":"10.1109\/CGC.2013.28"},{"issue":"13","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1002\/cpe.1867","volume":"24","author":"A. Beloglazov","year":"2012","unstructured":"Beloglazov, A., Buyya, R.: Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurr. Comput.: Pract. Exper.\u00a024(13), 1397\u20131420 (2012)","journal-title":"Concurr. Comput. : Pract. Exper."},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2381913.2381915","volume-title":"Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, CCSW 2012","author":"A. Bates","year":"2012","unstructured":"Bates, A., Mood, B., Pletcher, J., Pruse, H., Valafar, M., Butler, K.: Detecting co-residency with active traffic analysis techniques. In: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, CCSW 2012, pp. 1\u201312. ACM, New York (2012)"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1145\/2382196.2382228","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012","author":"V. Varadarajan","year":"2012","unstructured":"Varadarajan, V., Kooburat, T., Farley, B., Ristenpart, T., Swift, M.M.: Resource-freeing attacks: Improve your cloud performance (at your neighbor\u2019s expense). In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 281\u2013292. ACM, New York (2012)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-10665-1_23","volume-title":"Cloud Computing","author":"W. Voorsluys","year":"2009","unstructured":"Voorsluys, W., Broberg, J., Venugopal, S., Buyya, R.: Cost of virtual machine live migration in clouds: A performance evaluation. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol.\u00a05931, pp. 254\u2013265. Springer, Heidelberg (2009)"},{"key":"6_CR8","unstructured":"Bala, A., Chana, I.: Vm migration approach for autonomic fault tolerance in cloud computing. In: Int\u2019l Conf. Grid and Cloud Computing and Applications, GCA 2013 (2013)"},{"key":"6_CR9","first-page":"106","volume-title":"Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research, CASCON 2013","author":"I.J. Davis","year":"2013","unstructured":"Davis, I.J., Hemmati, H., Holt, R.C., Godfrey, M.W., Neuse, D.M., Mankovskii, S.: Regression-based utilization prediction algorithms: An empirical investigation. In: Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research, CASCON 2013, pp. 106\u2013120. IBM Corp, Riverton (2013)"},{"key":"6_CR10","doi-asserted-by":"crossref","first-page":"364","DOI":"10.21275\/SR13729104445","volume":"2","author":"A. Singh","year":"2013","unstructured":"Singh, A., Kinger, S.: Virtual machine migration policies in clouds. International Journal of Science and Research (IJSR)\u00a02, 364\u2013367 (2013)","journal-title":"International Journal of Science and Research (IJSR)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Cherkasova, L., Ozonat, K.M., Mi, N., Symons, J., Smirni, E.: Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. In: DSN, pp. 452\u2013461. IEEE Computer Society (2008)","DOI":"10.1109\/DSN.2008.4630116"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44885-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T07:30:18Z","timestamp":1689492618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44885-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44885-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}