{"id":"https://openalex.org/W1979504060","doi":"https://doi.org/10.1109/icitst.2013.6750225","title":"Virtual machine remote detection method using network timestamp in cloud computing","display_name":"Virtual machine remote detection method using network timestamp in cloud computing","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W1979504060","doi":"https://doi.org/10.1109/icitst.2013.6750225","mag":"1979504060"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2013.6750225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034589363","display_name":"Matrazali Noorafiza","orcid":null},"institutions":[{"id":"https://openalex.org/I148798404","display_name":"Tokyo University of Technology","ror":"https://ror.org/021a26605","country_code":"JP","type":"education","lineage":["https://openalex.org/I148798404"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Matrazali Noorafiza","raw_affiliation_strings":["Graduate School of Computer Science, Tokyo University of Technology, Hachioji, Tokyo, Japan","Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji, 192-0982, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Computer Science, Tokyo University of Technology, Hachioji, Tokyo, Japan","institution_ids":["https://openalex.org/I148798404"]},{"raw_affiliation_string":"Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji, 192-0982, Japan","institution_ids":["https://openalex.org/I148798404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112020437","display_name":"Hiroshi Maeda","orcid":null},"institutions":[{"id":"https://openalex.org/I148798404","display_name":"Tokyo University of Technology","ror":"https://ror.org/021a26605","country_code":"JP","type":"education","lineage":["https://openalex.org/I148798404"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroshi Maeda","raw_affiliation_strings":["Graduate School of Computer Science, Tokyo University of Technology, Hachioji, Tokyo, Japan","Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji, 192-0982, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Computer Science, Tokyo University of Technology, Hachioji, Tokyo, Japan","institution_ids":["https://openalex.org/I148798404"]},{"raw_affiliation_string":"Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji, 192-0982, Japan","institution_ids":["https://openalex.org/I148798404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104358300","display_name":"Toshiyuki Kinoshita","orcid":null},"institutions":[{"id":"https://openalex.org/I148798404","display_name":"Tokyo University of Technology","ror":"https://ror.org/021a26605","country_code":"JP","type":"education","lineage":["https://openalex.org/I148798404"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toshiyuki Kinoshita","raw_affiliation_strings":["Graduate School of Computer Science, Tokyo University of Technology, Hachioji, Tokyo, Japan","Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji, 192-0982, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Computer Science, Tokyo University of Technology, Hachioji, Tokyo, Japan","institution_ids":["https://openalex.org/I148798404"]},{"raw_affiliation_string":"Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji, 192-0982, Japan","institution_ids":["https://openalex.org/I148798404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108726661","display_name":"Ryuya Uda","orcid":null},"institutions":[{"id":"https://openalex.org/I148798404","display_name":"Tokyo University of Technology","ror":"https://ror.org/021a26605","country_code":"JP","type":"education","lineage":["https://openalex.org/I148798404"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryuya Uda","raw_affiliation_strings":["Graduate School of Computer Science, Tokyo University of Technology, Hachioji, Tokyo, Japan","Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji, 192-0982, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Computer Science, Tokyo University of Technology, Hachioji, Tokyo, Japan","institution_ids":["https://openalex.org/I148798404"]},{"raw_affiliation_string":"Graduate School of Computer Science, Tokyo University of Technology, 1404-1 Katakuramachi, Hachioji, 192-0982, Japan","institution_ids":["https://openalex.org/I148798404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034589363"],"corresponding_institution_ids":["https://openalex.org/I148798404"],"apc_list":null,"apc_paid":null,"fwci":0.3624,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6286906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"375","last_page":"380"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8928266167640686},{"id":"https://openalex.org/keywords/timestamp","display_name":"Timestamp","score":0.8769891262054443},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8595848083496094},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.719014048576355},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.6992040872573853},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4913574755191803},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.44269251823425293},{"id":"https://openalex.org/keywords/cloud-testing","display_name":"Cloud testing","score":0.43082094192504883},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.41172540187835693},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3805752694606781},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.30220139026641846},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2763904333114624}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8928266167640686},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.8769891262054443},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595848083496094},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.719014048576355},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6992040872573853},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4913574755191803},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.44269251823425293},{"id":"https://openalex.org/C120115606","wikidata":"https://www.wikidata.org/wiki/Q5135723","display_name":"Cloud testing","level":4,"score":0.43082094192504883},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.41172540187835693},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3805752694606781},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.30220139026641846},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2763904333114624}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2013.6750225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W23711711","https://openalex.org/W130289478","https://openalex.org/W1489922337","https://openalex.org/W1509316335","https://openalex.org/W1554705736","https://openalex.org/W1977367431","https://openalex.org/W2108834246","https://openalex.org/W2127133592","https://openalex.org/W2139033758","https://openalex.org/W2159460804","https://openalex.org/W2160693197","https://openalex.org/W2230612441","https://openalex.org/W2278472211","https://openalex.org/W2381052739","https://openalex.org/W6601006388","https://openalex.org/W6605339223","https://openalex.org/W6689610273"],"related_works":["https://openalex.org/W2088620127","https://openalex.org/W2743348030","https://openalex.org/W1963799338","https://openalex.org/W2160885694","https://openalex.org/W2900408237","https://openalex.org/W2036412865","https://openalex.org/W2542775576","https://openalex.org/W2947629119","https://openalex.org/W2545334782","https://openalex.org/W2346893066"],"abstract_inverted_index":{"As":[0],"any":[1],"new":[2],"technology":[3],"advancement,":[4],"cloud":[5,22,51,80,117,148,175],"computing":[6,23,52,118,149,176],"also":[7],"creates":[8],"disruptive":[9],"possibilities":[10],"and":[11,34,44,92,98,105,139],"security":[12,63],"risk":[13],"potentials.":[14],"Virtualization":[15],"which":[16],"are":[17,102],"the":[18,25,61,67,99,110,132,179,188,199],"engine":[19],"that":[20,70,126,157],"drives":[21],"turns":[24],"data":[26],"center":[27],"into":[28],"self-managing,":[29],"highly":[30,32],"scalable,":[31],"available":[33],"pools":[35],"of":[36,46,58,76,181],"easily":[37],"consumable":[38],"resources.":[39],"The":[40,120],"increase":[41],"in":[42,50,79,114,131,143,172,194],"virtualization":[43],"usage":[45],"virtual":[47,77],"machines":[48,78,141],"(VM)":[49],"environment":[53,190],"has":[54],"attracted":[55],"a":[56,144,154,167],"lot":[57],"attention":[59],"from":[60,73,122,137],"computer":[62],"research":[64],"community":[65],"on":[66],"potential":[68,156],"treats":[69],"could":[71,161],"occurs":[72],"vast":[74],"use":[75],"computing.":[81],"In":[82],"this":[83,123,182],"paper,":[84],"methods":[85,97],"for":[86,187],"detecting":[87],"VM":[88,138,168],"using":[89],"remote":[90],"IP":[91],"ICMP":[93],"packet":[94],"timestamp":[95,100,133,158,193],"detection":[96,159,169],"behavior":[101],"studied,":[103],"tested":[104],"investigated":[106],"to":[107,191,198],"determine":[108],"either":[109],"problem":[111],"still":[112],"exist":[113],"high":[115,145,173],"performance":[116,146,174],"infrastructure.":[119,177],"results":[121,152],"study":[124],"shows":[125],"there":[127],"were":[128],"distinguishable":[129],"differences":[130,196],"replies":[134],"behaviors":[135],"received":[136],"nonVM":[140],"even":[142,171],"private":[147],"environment.":[150],"These":[151],"prove":[153],"significant":[155],"method":[160,170],"be":[162],"exploited":[163],"by":[164],"malware":[165],"as":[166],"From":[178],"finding":[180],"study,":[183],"we":[184],"proposed":[185],"theory":[186],"stand-alone":[189],"reply":[192],"such":[195],"similar":[197],"VM.":[200]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
