{"id":"https://openalex.org/W3017780268","doi":"https://doi.org/10.1109/tsc.2020.2989215","title":"Job Completion Time Under Migration-Based Dynamic Platform Technique","display_name":"Job Completion Time Under Migration-Based Dynamic Platform Technique","publication_year":2020,"publication_date":"2020-04-21","ids":{"openalex":"https://openalex.org/W3017780268","doi":"https://doi.org/10.1109/tsc.2020.2989215","mag":"3017780268"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2020.2989215","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2020.2989215","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024597522","display_name":"Xiaolin Chang","orcid":"https://orcid.org/0000-0002-2975-8857"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaolin Chang","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101597408","display_name":"Yu Shi","orcid":"https://orcid.org/0000-0003-1872-3429"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Shi","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000856830","display_name":"Zhenjiang Zhang","orcid":"https://orcid.org/0000-0003-0217-3012"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenjiang Zhang","raw_affiliation_strings":["School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083915362","display_name":"Zhen Xu","orcid":"https://orcid.org/0000-0001-7011-3236"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Xu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036851432","display_name":"Kishor S. Trivedi","orcid":"https://orcid.org/0000-0001-7396-6330"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kishor S. Trivedi","raw_affiliation_strings":["Electrical Engineering Department, University of Duke, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, University of Duke, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5024597522"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":1.3876,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.82396187,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"15","issue":"3","first_page":"1345","last_page":"1357"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7939099073410034},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.579361081123352},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5536367893218994},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5087729096412659},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.47447970509529114},{"id":"https://openalex.org/keywords/job-queue","display_name":"Job queue","score":0.4683149755001068},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4603540599346161},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.4272688329219818},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.42263263463974},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3633188009262085},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1582932472229004},{"id":"https://openalex.org/keywords/job-scheduler","display_name":"Job scheduler","score":0.1472318172454834},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.11888936161994934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7939099073410034},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.579361081123352},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5536367893218994},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5087729096412659},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.47447970509529114},{"id":"https://openalex.org/C171627638","wikidata":"https://www.wikidata.org/wiki/Q6206744","display_name":"Job queue","level":4,"score":0.4683149755001068},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4603540599346161},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.4272688329219818},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.42263263463974},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3633188009262085},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1582932472229004},{"id":"https://openalex.org/C111873713","wikidata":"https://www.wikidata.org/wiki/Q1641413","display_name":"Job scheduler","level":3,"score":0.1472318172454834},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.11888936161994934},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C160403385","wikidata":"https://www.wikidata.org/wiki/Q220543","display_name":"Queue","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2020.2989215","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2020.2989215","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G4018853349","display_name":null,"funder_award_id":"U1836105","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W39385419","https://openalex.org/W41015297","https://openalex.org/W132116302","https://openalex.org/W270234110","https://openalex.org/W1989892116","https://openalex.org/W2016668099","https://openalex.org/W2018198031","https://openalex.org/W2029418637","https://openalex.org/W2032074358","https://openalex.org/W2041198666","https://openalex.org/W2060356161","https://openalex.org/W2063524226","https://openalex.org/W2073524356","https://openalex.org/W2090650780","https://openalex.org/W2112903725","https://openalex.org/W2129946623","https://openalex.org/W2158379985","https://openalex.org/W2346714907","https://openalex.org/W2460276206","https://openalex.org/W2494110282","https://openalex.org/W2537496976","https://openalex.org/W2552811423","https://openalex.org/W2561520848","https://openalex.org/W2612956469","https://openalex.org/W2621056358","https://openalex.org/W2742315206","https://openalex.org/W2765940564","https://openalex.org/W2775398184","https://openalex.org/W2783070990","https://openalex.org/W2786668512","https://openalex.org/W2790159620","https://openalex.org/W2793800929","https://openalex.org/W2889617130","https://openalex.org/W2894129193","https://openalex.org/W2894413690","https://openalex.org/W2896089892","https://openalex.org/W2901442573","https://openalex.org/W2901450325","https://openalex.org/W2963218066","https://openalex.org/W4238097735","https://openalex.org/W6739035412"],"related_works":["https://openalex.org/W4242235492","https://openalex.org/W2367268135","https://openalex.org/W4237162029","https://openalex.org/W2385701518","https://openalex.org/W2379651310","https://openalex.org/W1541249122","https://openalex.org/W2113019827","https://openalex.org/W2367222340","https://openalex.org/W2162286586","https://openalex.org/W4255368532"],"abstract_inverted_index":{"Migration-based":[0],"Dynamic":[1],"Platform":[2],"(MDP)":[3],"technique,":[4],"a":[5,22,46,106,118,133],"type":[6],"of":[7,36,66,98,126,143,153],"Moving":[8],"Target":[9],"Defense":[10],"(MTD)":[11],"techniques,":[12],"defends":[13],"against":[14],"sophisticated":[15],"cyber-attacks":[16],"by":[17],"randomly":[18],"and":[19,51,132,160],"dynamically":[20],"selecting":[21],"platform":[23],"for":[24,122,139],"executing":[25],"service/job.":[26],"Security":[27],"defense":[28],"mechanisms":[29],"protect":[30],"service/job":[31,49,68,71,79],"usually":[32],"at":[33],"the":[34,74,96,127,129,141,151],"cost":[35],"degrading":[37],"its":[38,52,84],"performance.":[39,53],"Therefore,":[40],"it":[41],"is":[42,147],"valuable":[43],"to":[44,89,94,116,149],"make":[45,80],"trade-off":[47],"between":[48],"security":[50,162],"However,":[54],"previous":[55],"researches":[56],"on":[57,62,78,83,101,156],"MTD":[58,64],"techniques":[59,93],"either":[60],"focused":[61],"analyzing":[63],"effectiveness":[65],"protecting":[67],"or":[69],"studied":[70],"performance":[72],"with":[73],"assumption":[75],"that":[76],"attacks":[77],"no":[81],"influence":[82],"execution.":[85],"This":[86],"article":[87],"aims":[88],"apply":[90],"analytical":[91],"modeling":[92],"investigate":[95],"impact":[97,152],"MDP":[99],"technique":[100],"job":[102,157,161],"completion":[103,158],"time":[104,159],"in":[105],"system":[107,131],"under":[108],"attack.":[109],"We":[110],"use":[111],"Stochastic":[112],"Reward":[113],"Nets":[114],"(SRNs)":[115],"develop":[117],"Markov":[119],"chain-based":[120],"model":[121],"capturing":[123],"typical":[124],"behaviors":[125],"adversary,":[128],"vulnerable":[130],"job.":[134],"The":[135],"formulas":[136],"are":[137],"derived":[138],"calculating":[140],"metrics":[142],"interest.":[144],"Numerical":[145],"analysis":[146],"conducted":[148],"study":[150],"key":[154],"parameters":[155],"loss.":[163]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
