{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:07:21Z","timestamp":1775837241238,"version":"3.50.1"},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Reliability Engineering &amp; System Safety"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.ress.2026.112487","type":"journal-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T17:38:19Z","timestamp":1772559499000},"page":"112487","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"P1","title":["Bionic job scheduling and resource management for cloud system considering co-resident attacks"],"prefix":"10.1016","volume":"272","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2434-9915","authenticated-orcid":false,"given":"Xiwei","family":"Qiu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2952-3206","authenticated-orcid":false,"given":"Yuanshun","family":"Dai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9907-9406","authenticated-orcid":false,"given":"Guilin","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.ress.2026.112487_bib0001","doi-asserted-by":"crossref","first-page":"98","DOI":"10.38094\/jastt1331","article-title":"Cloud computing virtualization of resources allocation for distributed systems","volume":"1","author":"Shukur","year":"2020","journal-title":"J Appl Sci Technol Trends"},{"key":"10.1016\/j.ress.2026.112487_bib0002","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s12243-019-00703-z","article-title":"Isolation in cloud computing infrastructures: new security challenges","volume":"74","author":"Bazm","year":"2019","journal-title":"Ann Telecommun"},{"key":"10.1016\/j.ress.2026.112487_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110265","article-title":"Optimal allocation of financial resources for ensuring reliable resilience in binary-state network infrastructure","volume":"250","author":"Yeh","year":"2024","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110447","article-title":"Joint optimization of job scheduling, condition-based maintenance planning, and spare parts ordering for degrading production systems","volume":"252","author":"Zhang","year":"2024","journal-title":"Reliab Eng Syst Saf"},{"issue":"4","key":"10.1016\/j.ress.2026.112487_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2788397","article-title":"et al. cloud computing resource scheduling and a survey of its evolutionary approaches","volume":"47","author":"Zhan","year":"2015","journal-title":"ACM Comput Surv"},{"issue":"4","key":"10.1016\/j.ress.2026.112487_bib0006","doi-asserted-by":"crossref","first-page":"233","DOI":"10.14257\/ijgdc.2016.9.4.21","article-title":"Central controller framework for mobile cloud computing","volume":"9","author":"Sarddar","year":"2016","journal-title":"Int J Grid Distrib Comput"},{"issue":"12","key":"10.1016\/j.ress.2026.112487_bib0007","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1016\/j.ress.2006.01.011","article-title":"A principled approach to the design of healthcare systems: autonomy vs","volume":"91","author":"Taleb-Bendiab","year":"2006","journal-title":"Governance Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.109978","article-title":"Integrated assessment of reliability and health status of multi-microgrids based on multiagent","volume":"245","author":"Guo","year":"2024","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0009","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.future.2015.03.014","article-title":"A multi-dimensional job scheduling","volume":"54","author":"Sheikhalishahi","year":"2016","journal-title":"Future Gen Comput Syst"},{"key":"10.1016\/j.ress.2026.112487_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110184","article-title":"A new self-adaptive mission aborting policy for systems operating in uncertain random shock environment","volume":"248","author":"Levitin","year":"2024","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110168","article-title":"Multi-attempt missions with multiple rescue options","volume":"248","author":"Levitin","year":"2024","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0012","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/s10723-018-09471-x","article-title":"A survey on global management view: toward combining system monitoring, resource management, and load prediction","volume":"17","author":"Da","year":"2019","journal-title":"J Grid Comput"},{"issue":"1","key":"10.1016\/j.ress.2026.112487_bib0013","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2567924","article-title":"Bionic autonomic nervous systems for self-defense against dos, spyware, malware, virus, and fishing","volume":"9","author":"Dai","year":"2014","journal-title":"ACM Trans Auton Adapt Syst"},{"key":"10.1016\/j.ress.2026.112487_bib0014","series-title":"IEEE 20th international conference on software quality, reliability and security (QRS)","first-page":"41","article-title":"Phm technology for memory anomalies in cloud computing for iaas","author":"Qiu","year":"2020"},{"key":"10.1016\/j.ress.2026.112487_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2023.109515","article-title":"Dependent failure behavior modeling for risk and reliability: a systematic and critical literature review","volume":"239","author":"Zeng","year":"2023","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110462","article-title":"Reliability modeling and optimization of a two-dimensional system considering performance sharing mechanism","volume":"252","author":"Chen","year":"2024","journal-title":"Rel Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2023.109305","article-title":"Reliability analysis of body sensor networks with correlated isolation groups","volume":"236","author":"Zhao","year":"2023","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"10.1016\/j.ress.2026.112487_bib0018","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TSMC.2015.2452898","article-title":"A hierarchical correlation model for evaluating reliability, performance, and power consumption of a cloud service","volume":"46","author":"Qiu","year":"2015","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"3","key":"10.1016\/j.ress.2026.112487_bib0019","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1109\/TCC.2017.2691323","article-title":"Correlation modeling and resource optimization for cloud service with fault recovery","volume":"7","author":"Qiu","year":"2017","journal-title":"IEEE Trans Cloud Comput"},{"key":"10.1016\/j.ress.2026.112487_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.107834","article-title":"Optimal task replication considering reliability, performance, and energy consumption for parallel computing in cloud systems","volume":"215","author":"Qiu","year":"2021","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.107705","article-title":"Minimization of expected user losses considering co-resident attacks in cloud system with task replication and cancellation","volume":"214","author":"Levitin","year":"2021","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2020.106969","article-title":"Optimal early warning defense of n-version programming service against co-resident attacks in cloud system","volume":"201","author":"Levitin","year":"2020","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2022.108415","article-title":"Co-residence based data theft game in cloud system with virtual machine replication and cancellation","volume":"222","author":"Levitin","year":"2022","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0024","first-page":"1","article-title":"Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks","volume":"2020","author":"Tian","year":"2020","journal-title":"EURASIP J Inf Secur"},{"key":"10.1016\/j.ress.2026.112487_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2025.110967","article-title":"Optimal operation and maintenance scheduling in generalized repairable m-out-of-n standby systems with common shocks","volume":"260","author":"Levitin","year":"2025","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0026","series-title":"IEEE Symposium on computers and communications (ISCC)","first-page":"0285","article-title":"A vm placement based approach to proactively mitigate co-resident attacks in cloud","author":"Miao","year":"2018"},{"key":"10.1016\/j.ress.2026.112487_bib0027","doi-asserted-by":"crossref","first-page":"509","DOI":"10.7717\/peerj-cs.509","article-title":"Efficiency aware scheduling techniques in cloud computing: a descriptive literature review","volume":"7","author":"Sana","year":"2021","journal-title":"PeerJ Comput Sci"},{"key":"10.1016\/j.ress.2026.112487_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2023.109270","article-title":"Timely reliability modeling and evaluation of wireless sensor networks with adaptive n-policy sleep scheduling","volume":"235","author":"Zhang","year":"2023","journal-title":"Reliab Eng Syst Saf"},{"issue":"2","key":"10.1016\/j.ress.2026.112487_bib0029","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1109\/JSYST.2019.2945555","article-title":"Autonomic intrusion detection and response using big data","volume":"14","author":"Vieira","year":"2019","journal-title":"IEEE Syst J"},{"key":"10.1016\/j.ress.2026.112487_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110447","article-title":"Joint optimization of job scheduling, condition-based maintenance planning, and spare parts ordering for degrading production systems","volume":"252","author":"Zhang","year":"2024","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110129","article-title":"An integrated framework of preventive maintenance and task scheduling for repairable multi-unit systems","volume":"247","author":"Zhang","year":"2024","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0032","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2025.110990","article-title":"Reliability analysis and optimization of multi-state tree-structured systems with performance sharing mechanism","volume":"260","author":"Gu","year":"2025","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110523","article-title":"An agent-based framework for resilience analysis of service networks","volume":"253","author":"Geng","year":"2025","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2025.111022","article-title":"Kernel reinforcement learning for sampling-efficient risk management of large-scale engineering systems","volume":"260","author":"Zhang","year":"2025","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2024.110401","article-title":"Reinforcement learning in reliability and maintenance optimization: a tutorial","volume":"251","author":"Zhang","year":"2024","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.ress.2026.112487_bib0036","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jksuci.2015.09.001","article-title":"A novel agent based autonomous and service composition framework for cost optimization of resource provisioning in cloud computing","volume":"29","author":"Singh","year":"2017","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"10.1016\/j.ress.2026.112487_bib0037","series-title":"21st international conference on advanced information networking and applications (AINA\u201907","first-page":"250","article-title":"et al. modeling for nasa autonomous nano-technology swarm missions and model-driven autonomic computing","author":"Hinchey","year":"2007"},{"key":"10.1016\/j.ress.2026.112487_bib0038","series-title":"An architectural blueprint for autonomic computing","volume":"vol. 31","author":"Computing","year":"2006"},{"key":"10.1016\/j.ress.2026.112487_bib0039","series-title":"Architecting software systems for runtime self-adaptation: Concepts, models, and challenges. Managing trade-offs in adaptable software architectures","author":"Villegas","year":"2017"},{"key":"10.1016\/j.ress.2026.112487_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2020.106973","article-title":"System reliability-redundancy optimization with cold-standby strategy by an enhanced nest cuckoo optimization algorithm","volume":"201","author":"Mellal","year":"2020","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2020.107142","article-title":"Mimicking nature for resilient resource and infrastructure network design","volume":"204","author":"Chatterjee","year":"2020","journal-title":"Reliab Eng Syst Saf"},{"issue":"9","key":"10.1016\/j.ress.2026.112487_bib0042","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1109\/TSMC.2018.2883907","article-title":"Cooperative adaptive event-triggered control for multiagent systems with actuator failures","volume":"49","author":"Zhang","year":"2018","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"10.1016\/j.ress.2026.112487_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2023.109207","article-title":"Resilience modeling for multi-state systems based on markov processes","volume":"235","author":"Tan","year":"2023","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0044","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s13042-013-0166-4","article-title":"Virtual machine security challenges: case studies","volume":"5","author":"Rehman","year":"2014","journal-title":"Int J Mach Learn Cybern"},{"key":"10.1016\/j.ress.2026.112487_bib0045","series-title":"Threats to virtual environments","first-page":"1","author":"Wueest","year":"2014"},{"key":"10.1016\/j.ress.2026.112487_bib0046","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.future.2018.09.066","article-title":"Speed up genetic algorithms in the cloud using software containers","volume":"92","author":"Salza","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.ress.2026.112487_bib0047","article-title":"Optimal inspections and mission abort policies for multistate systems","volume":"214","author":"Levitin","year":"2022","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2026.112487_bib0048","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2022.108604","article-title":"An improved particle swarm optimization algorithm for the reliabilitycredundancy allocation problem with global reliability","volume":"225","author":"Li","year":"2022","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"10.1016\/j.ress.2026.112487_bib0049","doi-asserted-by":"crossref","first-page":"920","DOI":"10.3390\/s22030920","article-title":"ADPSO: adaptive pso-based task scheduling approach for cloud computing","volume":"22","author":"Nabi","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.ress.2026.112487_bib0050","doi-asserted-by":"crossref","first-page":"1170","DOI":"10.1016\/j.ins.2019.10.035","article-title":"A scheduling scheme in the cloud computing environment using deep q-learning","volume":"512","author":"Tong","year":"2020","journal-title":"Inf Sci"},{"issue":"6","key":"10.1016\/j.ress.2026.112487_bib0051","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/s10586-025-05217-z","article-title":"Enhancing heuristic workflow scheduling algorithms using q-learning technique in cloud computing","volume":"28","author":"Namdev","year":"2025","journal-title":"Cluster Comput"},{"issue":"5","key":"10.1016\/j.ress.2026.112487_bib0052","doi-asserted-by":"crossref","first-page":"2202","DOI":"10.1109\/TNET.2018.2863647","article-title":"Randomized algorithms for scheduling multi-resource jobs in the cloud","volume":"26","author":"Psychas","year":"2018","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"10.1016\/j.ress.2026.112487_bib0053","first-page":"13","article-title":"Efficient load balancing algorithm for cloud computing using divisible load scheduling and weighted round robin methods","volume":"11","author":"Narayanan","year":"2017","journal-title":"Adv Nat Appl Sci"}],"container-title":["Reliability Engineering &amp; System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832026003030?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832026003030?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T15:39:51Z","timestamp":1775835591000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832026003030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":53,"alternative-id":["S0951832026003030"],"URL":"https:\/\/doi.org\/10.1016\/j.ress.2026.112487","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Bionic job scheduling and resource management for cloud system considering co-resident attacks","name":"articletitle","label":"Article Title"},{"value":"Reliability Engineering & System Safety","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ress.2026.112487","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112487"}}