{"id":"https://openalex.org/W2620125626","doi":"https://doi.org/10.1109/tsusc.2017.2707563","title":"STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation","display_name":"STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation","publication_year":2017,"publication_date":"2017-05-24","ids":{"openalex":"https://openalex.org/W2620125626","doi":"https://doi.org/10.1109/tsusc.2017.2707563","mag":"2620125626"},"language":"en","primary_location":{"id":"doi:10.1109/tsusc.2017.2707563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2017.2707563","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/STC_exposing_hidden_compromised_devices_in_networked_sustainable_green_smart_computing_platforms_by_partial_observation/20837785","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081805488","display_name":"Derui Wang","orcid":"https://orcid.org/0000-0003-1388-7715"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Derek Wang","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, Vic, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, Vic, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020443147","display_name":"Tingmin Wu","orcid":"https://orcid.org/0000-0003-0626-3576"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tingmin Wu","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, Vic, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, Vic, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076576641","display_name":"Sheng Wen","orcid":"https://orcid.org/0000-0003-0655-666X"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sheng Wen","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, Vic, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, Vic, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047378133","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0000-0001-5858-5070"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xian Shi, Changan Qu, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xian Shi, Changan Qu, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xian Shi, Changan Qu, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xian Shi, Changan Qu, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051406984","display_name":"Wanlei Zhou","orcid":"https://orcid.org/0000-0002-1680-2521"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Wanlei Zhou","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, Vic, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, Vic, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081805488"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":0.2193,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56751269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":"2","first_page":"178","last_page":"190"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7176612019538879},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.5643277764320374},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.48799318075180054},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.4391736686229706},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42038416862487793},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40878236293792725},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3666750192642212},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35205167531967163},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15694168210029602},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11415219306945801},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.0894971489906311}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7176612019538879},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.5643277764320374},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48799318075180054},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4391736686229706},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42038416862487793},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40878236293792725},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3666750192642212},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35205167531967163},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15694168210029602},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11415219306945801},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0894971489906311}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tsusc.2017.2707563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2017.2707563","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30100388","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20837785","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/STC_exposing_hidden_compromised_devices_in_networked_sustainable_green_smart_computing_platforms_by_partial_observation/20837785","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/140329","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/140329","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20837785","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/STC_exposing_hidden_compromised_devices_in_networked_sustainable_green_smart_computing_platforms_by_partial_observation/20837785","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","score":0.41999998688697815,"display_name":"Responsible consumption and production"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W66982195","https://openalex.org/W131619556","https://openalex.org/W1574447377","https://openalex.org/W1873332500","https://openalex.org/W1875112053","https://openalex.org/W1963876301","https://openalex.org/W1966006953","https://openalex.org/W1967579779","https://openalex.org/W1973965874","https://openalex.org/W1980228577","https://openalex.org/W1984511722","https://openalex.org/W1994416662","https://openalex.org/W1995743503","https://openalex.org/W2005323058","https://openalex.org/W2005933972","https://openalex.org/W2012741001","https://openalex.org/W2017368948","https://openalex.org/W2018975076","https://openalex.org/W2019955255","https://openalex.org/W2025911229","https://openalex.org/W2034279876","https://openalex.org/W2040734156","https://openalex.org/W2050642268","https://openalex.org/W2058632086","https://openalex.org/W2065088268","https://openalex.org/W2073209910","https://openalex.org/W2073457560","https://openalex.org/W2075594102","https://openalex.org/W2078069521","https://openalex.org/W2084531279","https://openalex.org/W2096356985","https://openalex.org/W2100483895","https://openalex.org/W2100734403","https://openalex.org/W2103117727","https://openalex.org/W2107933610","https://openalex.org/W2110227539","https://openalex.org/W2111772797","https://openalex.org/W2112090702","https://openalex.org/W2112515575","https://openalex.org/W2116164611","https://openalex.org/W2128397999","https://openalex.org/W2132443513","https://openalex.org/W2140526378","https://openalex.org/W2146153813","https://openalex.org/W2150105124","https://openalex.org/W2151314039","https://openalex.org/W2160493082","https://openalex.org/W2162462435","https://openalex.org/W2171980820","https://openalex.org/W2400908863","https://openalex.org/W2481872069","https://openalex.org/W2528339895","https://openalex.org/W2563851203","https://openalex.org/W2569283211","https://openalex.org/W2587310998","https://openalex.org/W2996821993","https://openalex.org/W3105272691","https://openalex.org/W4206758461","https://openalex.org/W4238452917","https://openalex.org/W4242589925","https://openalex.org/W4249261887","https://openalex.org/W6639175750","https://openalex.org/W6665166143","https://openalex.org/W6728071003","https://openalex.org/W6986680717"],"related_works":["https://openalex.org/W2888673113","https://openalex.org/W2212288070","https://openalex.org/W2056065966","https://openalex.org/W2352602608","https://openalex.org/W2062641654","https://openalex.org/W3149975758","https://openalex.org/W3213987435","https://openalex.org/W3023262859","https://openalex.org/W2132420969","https://openalex.org/W1517786189"],"abstract_inverted_index":{"Large-scale":[0],"smart":[1,124],"computing":[2,125],"is":[3],"generally":[4],"more":[5],"vulnerable":[6],"to":[7,31,55,69,111,171,186,256,271,274],"cyber":[8,132],"attacks":[9],"since":[10],"their":[11],"system":[12,143],"devices":[13,51,76,115,149,226],"are":[14,62,78,151,196],"normally":[15],"distributed":[16],"as":[17],"networked":[18,121,201],"platforms":[19,61],"and":[20,27,38,140,164,210,243,268,277],"each":[21],"device":[22],"could":[23],"be":[24],"a":[25,49,64,70,182],"target":[26],"get":[28],"compromised.":[29],"Due":[30],"resource":[32],"constraints":[33],"(i.e.,":[34,41,52],"Sustainable":[35],"Computing":[36,43],"demand)":[37],"cost-efficiency":[39],"issues":[40],"Green":[42],"demand),":[44],"we":[45,99],"usually":[46],"monitor":[47],"only":[48],"few":[50],"partial":[53,117],"observation)":[54],"ensure":[56],"all":[57,264],"operations":[58],"across":[59],"different":[60],"under":[63],"secure":[65],"environment.":[66],"This":[67],"leads":[68],"critical":[71],"problem":[72,89],"for":[73],"detecting":[74],"compromised":[75,114,148,177,225],"that":[77,134,150,218],"out":[79,181],"of":[80,85,184,190,229,249],"surveillance.":[81],"To":[82,145],"the":[83,120,131,138,156,160,174,188,223,257],"best":[84],"our":[86,191],"knowledge,":[87],"this":[88,97],"has":[90],"not":[91],"been":[92],"solved":[93],"so":[94],"far.":[95],"In":[96],"paper,":[98],"propose":[100],"an":[101],"unsupervised":[102,279],"classifier":[103],"based":[104,197],"on":[105,119,130,167,198],"source-tracing":[106],"technique":[107],"(STC":[108],"in":[109,137,227],"short)":[110],"expose":[112,146,222],"hidden":[113,147,224],"with":[116],"observation":[118],"sustainable":[122],"green":[123],"platforms.":[126],"STC":[127,153,219],"mainly":[128],"focuses":[129],"threats":[133],"can":[135,220],"spread":[136],"platform":[139],"compromise":[141],"various":[142],"devices.":[144,178],"out-of-surveillance,":[152],"first":[154],"captures":[155],"spreading":[157],"source":[158,242],"by":[159],"reverse":[161],"dissemination":[162],"technique,":[163],"then":[165],"relies":[166],"microscopic":[168],"propagation":[169],"modelling":[170],"probabilistically":[172],"identify":[173],"most":[175],"probable":[176],"We":[179],"carried":[180],"series":[183],"experiments":[185],"validate":[187],"performance":[189],"proposed":[192],"method.":[193],"The":[194,214],"evaluations":[195],"three":[199,275],"real":[200,241,250],"platforms:":[202],"Air":[203],"Traffic":[204],"Control":[205],"system,":[206],"AS-level":[207],"Internet":[208],"platform,":[209],"US":[211],"Power":[212],"Grid.":[213],"experiment":[215],"results":[216],"demonstrated":[217],"accurately":[221],"terms":[228],"following":[230],"aspects:":[231],"1)":[232],"Source-tracing":[233],"(more":[234],"than":[235],"80":[236],"percent":[237,245],"runs":[238],"got":[239],"exact":[240],"95":[244],"within":[246],"two":[247,278],"hops":[248],"source);":[251],"2)":[252],"Modelling":[253],"(very":[254],"close":[255],"simulation":[258],"results);":[259],"3)":[260],"Exposing":[261],"accuracy":[262],"(almost":[263],">":[265],"90":[266],"percent);":[267],"4)":[269],"Comparison":[270],"baseline":[272],"(superiority":[273],"supervised":[276],"classifiers).":[280]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
