{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:35Z","timestamp":1772164115698,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Red Hat Collaboratory at Boston University","award":["2025-01-RH05"],"award-info":[{"award-number":["2025-01-RH05"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["AST-2229104"],"award-info":[{"award-number":["AST-2229104"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,9]]},"DOI":"10.1145\/3726854.3727284","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T09:46:42Z","timestamp":1749030402000},"page":"178-180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting Kubernetes Autoscaling for Economic Denial of Sustainability"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7029-2836","authenticated-orcid":false,"given":"Jonathan","family":"Chamberlain","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0542-6955","authenticated-orcid":false,"given":"Jilin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, Boston, University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4413-6060","authenticated-orcid":false,"given":"Zeying","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Maryland, College Park, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9119-1679","authenticated-orcid":false,"given":"Zaoxing","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Maryland, College Park, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8071-3865","authenticated-orcid":false,"given":"David","family":"Starobinski","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, Boston, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448613"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3727114"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECOS.2017.8167135"},{"key":"e_1_3_2_1_4_1","volume-title":"Kubernetes Auto-Scaling: YoYo attack vulnerability and mitigation. Master's thesis","author":"David Ronen Ben","unstructured":"Ronen Ben David. 2021. Kubernetes Auto-Scaling: YoYo attack vulnerability and mitigation. Master's thesis. Reichman University."},{"key":"e_1_3_2_1_5_1","volume-title":"Docker: Accelerated Container Application Development. https:\/\/www.docker.com\/","author":"Docker Inc.","year":"2025","unstructured":"Docker Inc. 2025. Docker: Accelerated Container Application Development. https:\/\/www.docker.com\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Alain Jean-Marie and Emmanuel Hyon. 2024. Marmote's documentation. https:\/\/marmote.gitlabpages.inria.fr\/marmote\/index.html"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0011"},{"key":"e_1_3_2_1_8_1","unstructured":"The Kubernetes Authors. 2025. Horizontal Pod Autoscaling. https:\/\/kubernetes.io\/docs\/tasks\/run-application\/horizontal-pod-autoscale\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020984"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3052837"},{"key":"e_1_3_2_1_11_1","unstructured":"Jo\u00e3o Tom\u00e9. 2024. From Deals to DDoS: exploring Cyber Week 2024 Internet trends. https:\/\/blog.cloudflare.com\/from-deals-to-ddos-exploring-cyber-week-2024-internet-trends\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603532"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00030"}],"event":{"name":"SIGMETRICS '25: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems","location":"Stony Brook NY USA","acronym":"SIGMETRICS '25","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Abstracts of the 2025 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726854.3727284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726854.3727284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T22:23:46Z","timestamp":1752704626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726854.3727284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":13,"alternative-id":["10.1145\/3726854.3727284","10.1145\/3726854"],"URL":"https:\/\/doi.org\/10.1145\/3726854.3727284","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3744970.3727284","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"2025-06-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}