{"id":"https://openalex.org/W2582259743","doi":"https://doi.org/10.1109/jsac.2017.2659418","title":"Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study","display_name":"Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study","publication_year":2017,"publication_date":"2017-01-26","ids":{"openalex":"https://openalex.org/W2582259743","doi":"https://doi.org/10.1109/jsac.2017.2659418","mag":"2582259743"},"language":"en","primary_location":{"id":"doi:10.1109/jsac.2017.2659418","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2017.2659418","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068976123","display_name":"Liang Xiao","orcid":"https://orcid.org/0000-0003-2402-611X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liang Xiao","raw_affiliation_strings":["Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Key Laboratory of Underwater Acoustic Communication and Marine Information Technology Ministry of Education, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Key Laboratory of Underwater Acoustic Communication and Marine Information Technology Ministry of Education, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103796622","display_name":"Dongjin Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongjin Xu","raw_affiliation_strings":["Department of Communication Engineering, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Department of Communication Engineering, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103135884","display_name":"Caixia Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Caixia Xie","raw_affiliation_strings":["Department of Communication Engineering, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Department of Communication Engineering, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055303802","display_name":"Narayan B. Mandayam","orcid":"https://orcid.org/0000-0001-5744-0814"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Narayan B. Mandayam","raw_affiliation_strings":["Wireless Information Network Laboratory, Rutgers University, New Brunswick, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Information Network Laboratory, Rutgers University, New Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042307561","display_name":"H. Vincent Poor","orcid":"https://orcid.org/0000-0002-2062-131X"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"H. Vincent Poor","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068976123"],"corresponding_institution_ids":["https://openalex.org/I191208505","https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":13.2354,"has_fulltext":false,"cited_by_count":106,"citation_normalized_percentile":{"value":0.99098237,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"35","issue":"3","first_page":"534","last_page":"544"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7899265885353088},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6746431589126587},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6385802030563354},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6116282343864441},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6097971796989441},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.5618659257888794},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.480839341878891},{"id":"https://openalex.org/keywords/interval","display_name":"Interval (graph theory)","score":0.46041589975357056},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43343526124954224},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4247973561286926},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.1344638168811798},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09891834855079651},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.09602481126785278}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7899265885353088},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6746431589126587},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6385802030563354},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6116282343864441},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6097971796989441},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.5618659257888794},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.480839341878891},{"id":"https://openalex.org/C2778067643","wikidata":"https://www.wikidata.org/wiki/Q166507","display_name":"Interval (graph theory)","level":2,"score":0.46041589975357056},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43343526124954224},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4247973561286926},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.1344638168811798},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09891834855079651},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.09602481126785278},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsac.2017.2659418","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2017.2659418","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1501439223","https://openalex.org/W1533945010","https://openalex.org/W1622908323","https://openalex.org/W1972022566","https://openalex.org/W1972106554","https://openalex.org/W1985906366","https://openalex.org/W1987880201","https://openalex.org/W2001833896","https://openalex.org/W2004220223","https://openalex.org/W2015787697","https://openalex.org/W2039052858","https://openalex.org/W2039858940","https://openalex.org/W2040061501","https://openalex.org/W2041946752","https://openalex.org/W2065067102","https://openalex.org/W2067195421","https://openalex.org/W2099161251","https://openalex.org/W2099720195","https://openalex.org/W2133469585","https://openalex.org/W2190764372","https://openalex.org/W2209602157","https://openalex.org/W2226622036","https://openalex.org/W2260320574","https://openalex.org/W2584406126","https://openalex.org/W3011865677","https://openalex.org/W3099945124","https://openalex.org/W3122760232","https://openalex.org/W6647234361"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W4312141693","https://openalex.org/W1536009559","https://openalex.org/W1969185016","https://openalex.org/W2103821767","https://openalex.org/W2111030377","https://openalex.org/W2037619003"],"abstract_inverted_index":{"Cloud":[0],"storage":[1,20,40,72,86,106,161],"is":[2,28,61,109,186],"vulnerable":[3],"to":[4,30],"advanced":[5],"persistent":[6],"threats":[7],"(APTs),":[8],"in":[9,112,180],"which":[10,60,113],"an":[11,43,144],"attacker":[12,45,92,119,146,179],"launches":[13],"stealthy,":[14],"continuous,":[15],"and":[16,42,88,117,205],"targeted":[17],"attacks":[18],"on":[19],"devices.":[21],"In":[22,68],"this":[23],"paper,":[24],"prospect":[25],"theory":[26],"(PT)":[27],"applied":[29],"formulate":[31],"the":[32,35,54,69,78,89,124,140,149,152,160,169,174,178,181,193,198,207,210,214],"interaction":[33],"between":[34],"defender":[36,79,116,162],"of":[37,56,64,98,126,133,143,151,168,177,201,209],"a":[38,62,81],"cloud":[39,71],"system":[41],"APT":[44,91,118,145,156,170,183,203],"who":[46],"makes":[47],"subjective":[48,90,105,115,141,202],"decisions":[49],"that":[50,139,159,192],"sometimes":[51],"deviate":[52],"from":[53],"results":[55,190],"expected":[57],"utility":[58,150,208],"theory,":[59],"basis":[63],"traditional":[65],"game":[66,74,108,185],"theory.":[67],"PT-based":[70],"defense":[73,107,157,184,195,217],"with":[75,213],"pure":[76],"strategy,":[77],"chooses":[80,93],"scan":[82],"interval":[83,97],"for":[84],"each":[85,101,114],"device":[87],"his":[94],"or":[95,173],"her":[96],"attack":[99,171,199],"against":[100],"device.":[102],"A":[103,154],"mixed-strategy":[104],"also":[110,187],"investigated,":[111],"acts":[120],"under":[121],"uncertainty":[122],"about":[123],"action":[125],"its":[127],"opponent.":[128],"The":[129],"Nash":[130],"equilibria":[131],"(NEs)":[132],"both":[134],"games":[135],"are":[136],"derived,":[137],"showing":[138],"view":[142],"can":[147,163],"improve":[148],"defender.":[153],"Q-learning-based":[155],"scheme":[158,196],"apply":[164],"without":[165],"being":[166],"aware":[167],"model":[172,176],"subjectivity":[175],"dynamic":[182],"proposed.":[188],"Simulation":[189],"show":[191],"proposed":[194],"suppresses":[197],"motivation":[200],"attackers":[204],"improves":[206],"defender,":[211],"compared":[212],"benchmark":[215],"greedy":[216],"strategy.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":26},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":12}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
