{"id":"https://openalex.org/W2720329411","doi":"https://doi.org/10.1109/tifs.2017.2718489","title":"Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach","display_name":"Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach","publication_year":2017,"publication_date":"2017-06-21","ids":{"openalex":"https://openalex.org/W2720329411","doi":"https://doi.org/10.1109/tifs.2017.2718489","mag":"2720329411"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2718489","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2718489","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100780558","display_name":"Juntao Chen","orcid":"https://orcid.org/0000-0001-7726-4926"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Juntao Chen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, New York University, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New York University, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081500464","display_name":"Quanyan Zhu","orcid":"https://orcid.org/0000-0002-0008-2953"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Quanyan Zhu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, New York University, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New York University, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100780558"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":29.9849,"has_fulltext":false,"cited_by_count":95,"citation_normalized_percentile":{"value":0.99626033,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"12","issue":"11","first_page":"2736","last_page":"2750"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8858102560043335},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7214192152023315},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.714484691619873},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5803453326225281},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5509079694747925},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5480334162712097},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4986233711242676},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4645163118839264},{"id":"https://openalex.org/keywords/service-quality","display_name":"Service quality","score":0.41041287779808044},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.40864843130111694},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3570953607559204},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16948369145393372},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15926054120063782},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.06927785277366638}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8858102560043335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7214192152023315},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.714484691619873},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5803453326225281},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5509079694747925},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5480334162712097},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4986233711242676},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4645163118839264},{"id":"https://openalex.org/C140781008","wikidata":"https://www.wikidata.org/wiki/Q1221081","display_name":"Service quality","level":3,"score":0.41041287779808044},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.40864843130111694},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3570953607559204},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16948369145393372},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15926054120063782},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.06927785277366638},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2718489","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2718489","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.44999998807907104}],"awards":[{"id":"https://openalex.org/G510610588","display_name":null,"funder_award_id":"DE-NE0008571","funder_id":"https://openalex.org/F4320306084","funder_display_name":"U.S. Department of Energy"},{"id":"https://openalex.org/G7543639573","display_name":null,"funder_award_id":"CNS-1544782","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7947630385","display_name":null,"funder_award_id":"SES-1541164","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W175068720","https://openalex.org/W320829365","https://openalex.org/W1501439223","https://openalex.org/W1533945010","https://openalex.org/W1548462700","https://openalex.org/W1571323288","https://openalex.org/W1964629557","https://openalex.org/W1986958759","https://openalex.org/W1988990477","https://openalex.org/W2001601386","https://openalex.org/W2002941278","https://openalex.org/W2011493390","https://openalex.org/W2015787697","https://openalex.org/W2015931693","https://openalex.org/W2020569685","https://openalex.org/W2039427951","https://openalex.org/W2039858940","https://openalex.org/W2049328142","https://openalex.org/W2062132646","https://openalex.org/W2067064328","https://openalex.org/W2069038223","https://openalex.org/W2075698179","https://openalex.org/W2093643399","https://openalex.org/W2098432798","https://openalex.org/W2105774558","https://openalex.org/W2111619626","https://openalex.org/W2123990969","https://openalex.org/W2129368140","https://openalex.org/W2140942578","https://openalex.org/W2147341361","https://openalex.org/W2154315278","https://openalex.org/W2157078218","https://openalex.org/W2162126029","https://openalex.org/W2169466806","https://openalex.org/W2188279472","https://openalex.org/W2209602157","https://openalex.org/W2223334785","https://openalex.org/W2260320574","https://openalex.org/W2295368058","https://openalex.org/W2484226763","https://openalex.org/W2505598063","https://openalex.org/W2528922300","https://openalex.org/W2963035816","https://openalex.org/W3098384795","https://openalex.org/W3122719071","https://openalex.org/W6630071846","https://openalex.org/W6634190070","https://openalex.org/W6692521219","https://openalex.org/W6722812849","https://openalex.org/W6725104148"],"related_works":["https://openalex.org/W2367468089","https://openalex.org/W2358591856","https://openalex.org/W2098133976","https://openalex.org/W2347416728","https://openalex.org/W2468219149","https://openalex.org/W2974100988","https://openalex.org/W2215702767","https://openalex.org/W4388137405","https://openalex.org/W1986097177","https://openalex.org/W2567150521"],"abstract_inverted_index":{"In":[0,180],"this":[1],"paper,":[2],"we":[3,138],"aim":[4],"to":[5,38,49,61,94,156],"establish":[6],"a":[7,16,57,63,115,122,187,213],"holistic":[8],"framework":[9],"that":[10,140,191],"integrates":[11],"the":[12,24,30,33,40,50,54,70,73,79,96,100,141,157,162,174,182,194,197,206],"cyber-physical":[13],"layers":[14],"of":[15,19,26,44,59,103,135,212],"cloud-enabled":[17,125,214],"Internet":[18],"Controlled":[20],"Things":[21],"(IoCT)":[22],"through":[23],"lens":[25],"contract":[27,111,142],"theory.":[28],"At":[29],"physical":[31,163],"layer,":[32],"device":[34,55,80,183],"uses":[35],"cloud":[36,45,74,101,136,159,177,188],"services":[37,46],"operate":[39],"system.":[41],"The":[42,110],"quality":[43,102],"is":[47,92],"unknown":[48],"device,":[51],"and":[52,65,99,131,152],"hence":[53],"designs":[56],"menu":[58],"contracts":[60,167,199],"enable":[62],"reliable":[64],"incentive-compatible":[66],"service.":[67,179],"Based":[68],"on":[69,129],"received":[71],"contracts,":[72],"service":[75,104,123],"provider":[76],"(SP)":[77],"serves":[78],"by":[81],"determining":[82],"its":[83],"optimal":[84,166,198],"cyber":[85],"defense":[86],"strategy.":[87],"A":[88],"contract-based":[89],"FlipCloud":[90],"game":[91],"used":[93],"assess":[95],"security":[97,120,178,189],"risk":[98],"(QoS)":[105],"under":[106],"advanced":[107],"persistent":[108],"threats.":[109],"design":[112,143],"approach":[113],"creates":[114],"pricing":[116],"mechanism":[117],"for":[118,124,186],"on-demand":[119],"as":[121],"IoCT.":[126],"By":[127],"focusing":[128],"high":[130],"low":[132],"QoS":[133],"types":[134],"SPs,":[137],"find":[139],"can":[144,192],"be":[145],"divided":[146],"into":[147],"two":[148],"regimes":[149],"(regimes":[150],"I":[151,171],"II)":[153],"with":[154],"respect":[155],"provided":[158],"QoS.":[160],"Specifically,":[161],"devices":[164],"whose":[165],"are":[168],"in":[169,201],"regime":[170,202],"always":[172],"request":[173],"best":[175],"possible":[176],"contrast,":[181],"only":[184],"asks":[185],"level":[190],"stabilize":[193],"system":[195],"when":[196],"lie":[200],"II.":[203],"We":[204],"illustrate":[205],"obtained":[207],"results":[208],"via":[209],"case":[210],"studies":[211],"smart":[215],"home.":[216]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":27},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
