{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:56:25Z","timestamp":1761663385641,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/inm.2015.7140494","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T17:19:27Z","timestamp":1436203167000},"page":"1351-1356","source":"Crossref","is-referenced-by-count":1,"title":["Multi-level VM replication based survivability for mission-critical cloud computing"],"prefix":"10.1109","author":[{"given":"Ming","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Francois","family":"D'Ugard","sequence":"additional","affiliation":[]},{"given":"Kevin A.","family":"Kwiat","sequence":"additional","affiliation":[]},{"given":"Charles A.","family":"Kamhoua","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Amazon Simple Storage Service (Amazon S3) URL","year":"0","key":"ref31"},{"journal-title":"Amazon Elastic Block Store (EBS) URL","year":"0","key":"ref30"},{"journal-title":"Business Insider URL","article-title":"Amazon Building Private Cloud for CIA","year":"0","key":"ref10"},{"key":"ref11","article-title":"A Virtual Machine Introspection Based Architecture for Intrusion Detection","author":"tal","year":"2003","journal-title":"NDSS"},{"key":"ref12","article-title":"Stealthy Malware Detection through VMM-based Out-Of-The-Box Semantic View Reconstruction","author":"xuxian","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/844128.844148","article-title":"ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay","author":"dunlap","year":"2002","journal-title":"ACM SIGOPS Operating Systems Review 36 SI"},{"key":"ref14","article-title":"Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm","volume":"39","author":"michael","year":"2005","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_13"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381916"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.30"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866313"},{"key":"ref19","article-title":"Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds","author":"thomas","year":"2009","journal-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security ACM"},{"key":"ref28","article-title":"Fuzzy Modeling based Resource Management for Virtualized Database Systems","author":"wang","year":"2011","journal-title":"Proceedings of the 19th Annual Meeting of the IEEE International Symposium on Modeling Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2011)"},{"journal-title":"Homeland Security News Wire URL","article-title":"Hackers using cloud networks to launch powerful attacks","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381916"},{"journal-title":"url","article-title":"OpenStack Open Source Cloud Computing Software","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.159"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.24"},{"journal-title":"Bloomberg URL","article-title":"Amazon.com Server Said to Have Been Used in Sony Attack","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"journal-title":"url","article-title":"VMware Inc","year":"0","key":"ref7"},{"journal-title":"url","article-title":"Windows Azure Platform","year":"0","key":"ref2"},{"journal-title":"url","article-title":"Kernel Based Virtual Machine","year":"0","key":"ref9"},{"journal-title":"url","article-title":"Amazon Elastic Compute Cloud (Amazon EC2)","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.31"},{"key":"ref22","article-title":"False Targets Efficiency in Defense Strategy","author":"gregory","year":"2009","journal-title":"European Journal of Operational Research"},{"key":"ref21","article-title":"Optimal Voting Strategy against Rational Attackers","author":"li","year":"2011","journal-title":"6th International Conference on Risk and Security of Internet and Systems (CRiSIS)"},{"key":"ref24","article-title":"Cuanta: Quantifying Effects of Shared On-Chip Resource Interference for Consolidated Virtual Machines","author":"sriram","year":"0","journal-title":"Proceedings of the 2nd ACM Symposium on Cloud Computing"},{"key":"ref23","article-title":"Optimal resource allocation for protecting system availability against random cyber attacks","author":"li","year":"2011","journal-title":"3rd IEEE International Conference on Computer Research and Development (ICCRD)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_13"},{"key":"ref25","article-title":"Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm","volume":"39","author":"michael","year":"2005","journal-title":"ACM SIGOPS Operating Systems Review"}],"event":{"name":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","start":{"date-parts":[[2015,5,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,5,15]]}},"container-title":["2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7121095\/7140257\/07140494.pdf?arnumber=7140494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T11:12:12Z","timestamp":1498216332000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7140494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/inm.2015.7140494","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}