{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:46:53Z","timestamp":1762033613222,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/allerton.2018.8636050","type":"proceedings-article","created":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T03:04:31Z","timestamp":1551409471000},"page":"78-83","source":"Crossref","is-referenced-by-count":1,"title":["Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework"],"prefix":"10.1109","author":[{"given":"Ahmed H.","family":"Anwar","sequence":"first","affiliation":[]},{"given":"George","family":"Atia","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Guirguis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"A game-theoretic framework for the virtual machines migration timing problem","volume":"abs 1803 5542","author":"anwar","year":"2018","journal-title":"CoRR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"ref12","first-page":"299","article-title":"Wait a minute! A fast, Cross-VM attack on AES","author":"irazoqui","year":"2014","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref13","first-page":"254","article-title":"Cost of virtual machine live migration in clouds: A performance evaluation","volume":"9","author":"voorsluys","year":"2009","journal-title":"CloudCom"},{"key":"ref14","first-page":"99","article-title":"Security games for virtual machine allocation in cloud computing","author":"han","year":"2013","journal-title":"International Journal of Game Theory"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.75"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.80"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.80"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808483"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02786-9_11"},{"key":"ref28","first-page":"195","article-title":"FlipLeakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage","author":"farhang","year":"2016","journal-title":"Conference on Decision and Game Theory for Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.23"},{"key":"ref27","first-page":"289","article-title":"Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats","author":"pawlick","year":"2015","journal-title":"International Journal of Game Theory"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262745"},{"key":"ref6","first-page":"719","article-title":"FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack","author":"yarom","year":"2014","journal-title":"USENIX Security Symposium"},{"journal-title":"Dynamic Noncooperative Game Theory","year":"1998","author":"ba?ar","key":"ref29"},{"key":"ref5","first-page":"725","article-title":"It&#x2019;s time to migrate! a game-theoretic framework for protecting a multi-tenant cloud against collocation attacks","author":"anwar","year":"2018","journal-title":"IEEE International Conference on Cloud Computing (CLOUD)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972552"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"journal-title":"Moving Target Defense","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108094"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25594-1_4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"ref21","first-page":"248","article-title":"Defending against the Unknown Enemy: Applying FlipIt to System Security","author":"bowers","year":"2012","journal-title":"Computers and Games"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357413"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34266-0_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2014.7032232"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218444"}],"event":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2018,10,2]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2018,10,5]]}},"container-title":["2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8630872\/8635635\/08636050.pdf?arnumber=8636050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:10:07Z","timestamp":1598227807000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8636050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/allerton.2018.8636050","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}