{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:37:36Z","timestamp":1725806256977},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/cloudnet.2018.8549403","type":"proceedings-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:17:02Z","timestamp":1543537022000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Evolving Risk Management Against Advanced Persistent Threats in Fog Computing"],"prefix":"10.1109","author":[{"given":"Shaohan","family":"Feng","sequence":"first","affiliation":[]},{"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Leshem","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659059"},{"journal-title":"AIG","article-title":"Cyber insurance","year":"2018","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2012.12.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2000.2696"},{"journal-title":"Math Ed","article-title":"Cauchy-lipschitz theorem","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3108-8_5"},{"journal-title":"Healthcare provider hit by advanced persistent threat Protecting client information","year":"2014","author":"micro","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1324","DOI":"10.1109\/MIPRO.2015.7160480","article-title":"Advanced persistent threats-detection and defense","author":"vukalovi?","year":"2015","journal-title":"Information and Communication Technology Electronics and Microelectronics (MIPRO) 2015 38th International Convention on"},{"journal-title":"On cyber risk management of blockchain networks A game theoretic approach","year":"2018","author":"feng","key":"ref6"},{"key":"ref5","first-page":"51","article-title":"Baiting inside attackers using decoy documents","author":"bowen","year":"2009","journal-title":"International Conference on Security and Privacy in Communication Systems"},{"journal-title":"Defense against advanced persistent threats in dynamic cloud storage A colonel blotto game approach","year":"2018","author":"min","key":"ref8"},{"journal-title":"What is stuxnet who created it and how does it work?","year":"2017","author":"fruhlinger","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0090-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2475243"}],"event":{"name":"2018 IEEE 7th International Conference on Cloud Networking (CloudNet)","start":{"date-parts":[[2018,10,22]]},"location":"Tokyo","end":{"date-parts":[[2018,10,24]]}},"container-title":["2018 IEEE 7th International Conference on Cloud Networking (CloudNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8535098\/8549179\/08549403.pdf?arnumber=8549403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:03:51Z","timestamp":1643249031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8549403\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cloudnet.2018.8549403","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}