{"id":"https://openalex.org/W2976636665","doi":"https://doi.org/10.1109/infcomw.2019.8845295","title":"Poster Abstract: Guardian - A Smart Cloud Fabric for Virtual Patching and Customized Defenses","display_name":"Poster Abstract: Guardian - A Smart Cloud Fabric for Virtual Patching and Customized Defenses","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2976636665","doi":"https://doi.org/10.1109/infcomw.2019.8845295","mag":"2976636665"},"language":"en","primary_location":{"id":"doi:10.1109/infcomw.2019.8845295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2019.8845295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089339406","display_name":"Rashid Tahir","orcid":"https://orcid.org/0000-0002-5888-0050"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rashid Tahir","raw_affiliation_strings":["University of Prince Mugrin, KSA"],"affiliations":[{"raw_affiliation_string":"University of Prince Mugrin, KSA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035116372","display_name":"Abdur Rahman Al-Ahmadi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdur Rahman Al-Ahmadi","raw_affiliation_strings":["University of Prince Mugrin, KSA"],"affiliations":[{"raw_affiliation_string":"University of Prince Mugrin, KSA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019075441","display_name":"Bashayyer Al-Sharyoufi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bashayyer Al-Sharyoufi","raw_affiliation_strings":["University of Prince Mugrin, KSA"],"affiliations":[{"raw_affiliation_string":"University of Prince Mugrin, KSA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083925013","display_name":"Rajin Azzouni","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajin Azzouni","raw_affiliation_strings":["University of Prince Mugrin, KSA"],"affiliations":[{"raw_affiliation_string":"University of Prince Mugrin, KSA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011363617","display_name":"Fareed Zaffar","orcid":null},"institutions":[{"id":"https://openalex.org/I207789805","display_name":"Lahore University of Management Sciences","ror":"https://ror.org/05b5x4a35","country_code":"PK","type":"education","lineage":["https://openalex.org/I207789805"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Fareed Zaffar","raw_affiliation_strings":["Lahore University of Management Sciences, PK"],"affiliations":[{"raw_affiliation_string":"Lahore University of Management Sciences, PK","institution_ids":["https://openalex.org/I207789805"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089339406"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11254812,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1043","last_page":"1044"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8195077180862427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.682898223400116},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6565958857536316},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.651197612285614},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5536704659461975},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5148917436599731},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5095327496528625},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5027875900268555},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.47697529196739197},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4704305827617645},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4632360339164734},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.45494982600212097},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.44710642099380493},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14577168226242065},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14099785685539246},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10872069001197815}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8195077180862427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.682898223400116},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6565958857536316},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.651197612285614},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5536704659461975},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5148917436599731},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5095327496528625},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5027875900268555},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.47697529196739197},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4704305827617645},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4632360339164734},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.45494982600212097},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.44710642099380493},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14577168226242065},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14099785685539246},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10872069001197815},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infcomw.2019.8845295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2019.8845295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4099999964237213,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2001759130","https://openalex.org/W2083017850","https://openalex.org/W2808675934"],"related_works":["https://openalex.org/W4253721122","https://openalex.org/W1671033612","https://openalex.org/W2921504876","https://openalex.org/W4389527383","https://openalex.org/W4206524843","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2139923244","https://openalex.org/W2348153269"],"abstract_inverted_index":{"The":[0,118,134,179,196],"ever-evolving":[1],"nature":[2],"of":[3,20,58,86,206],"the":[4,56,122,127,154,172,184,189,194,200],"threat":[5],"landscape":[6],"in":[7,53,99,139],"clouds":[8],"means":[9],"that":[10,104],"hackers":[11],"and":[12,22,26,35,94,125,131,144,160,188,208],"infrastructure":[13],"defenders":[14],"are":[15,77,137,147],"constantly":[16],"playing":[17],"a":[18,66,70,140,162,168,213,216],"game":[19],"cat":[21],"mouse.":[23],"As":[24],"newer":[25],"more":[27,42],"dangerous":[28],"vulnerabilities":[29],"surface":[30],"each":[31],"day,":[32],"software":[33],"developers":[34],"IT":[36],"security":[37,81,97,204],"specialists":[38],"find":[39],"it":[40],"increasingly":[41],"difficult":[43],"to":[44,84,149,182,193,202],"keep":[45],"attackers":[46,151],"at":[47],"bay.":[48],"This":[49],"is":[50,165,177,181],"particularly":[51],"true":[52],"cases":[54],"where":[55],"Window":[57],"Vulnerability":[59],"(WoV)":[60],"spans":[61],"multiple":[62],"days":[63],"or":[64,69,88],"requires":[65],"developer":[67],"patch":[68,164],"major":[71],"vendor":[72],"update.":[73],"Making":[74],"matters":[75],"worse":[76],"tenants":[78],"with":[79],"poor":[80],"hygiene":[82],"due":[83],"lack":[85],"awareness":[87],"plain":[89],"laziness.":[90],"To":[91],"remedy":[92],"these":[93],"other":[95],"similar":[96],"woes":[98],"multi-tenant":[100],"clouds,":[101],"we":[102],"propose":[103],"wherever":[105],"possible,":[106],"Cloud":[107],"Service":[108],"Providers":[109],"deploy":[110],"virtual":[111,163],"defenses":[112,146,190],"based":[113],"on":[114,215],"individual":[115],"tenant":[116],"needs.":[117],"proposed":[119,197],"fabric":[120,198],"clones":[121],"entire":[123],"deployment":[124],"scans":[126],"copy":[128],"for":[129],"any":[130],"all":[132],"vulnerabilities.":[133,155],"discovered":[135],"flaws":[136],"assessed":[138],"machine":[141],"learning":[142],"engine":[143],"corresponding":[145],"instantiated":[148],"prevent":[150],"from":[152],"exploiting":[153],"For,":[156],"newly":[157],"announced":[158],"bugs":[159],"flaws,":[161],"deployed":[166],"inside":[167],"proxy":[169],"appliance":[170],"(till":[171],"time":[173],"an":[174],"official":[175],"solution":[176],"published).":[178],"goal":[180],"make":[183],"pipeline":[185],"fully":[186],"automated":[187],"completely":[191],"oblivious":[192],"users.":[195],"has":[199],"potential":[201],"minimize":[203],"concerns":[205],"customers":[207],"can":[209],"be":[210],"offered":[211],"as":[212],"service":[214],"pay-per":[217],"use":[218],"basis.":[219]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
