{"id":"https://openalex.org/W4362496682","doi":"https://doi.org/10.1109/ciot57267.2023.10084903","title":"IaC cloud testbed for secure ML based management of IoT services","display_name":"IaC cloud testbed for secure ML based management of IoT services","publication_year":2023,"publication_date":"2023-03-20","ids":{"openalex":"https://openalex.org/W4362496682","doi":"https://doi.org/10.1109/ciot57267.2023.10084903"},"language":"en","primary_location":{"id":"doi:10.1109/ciot57267.2023.10084903","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ciot57267.2023.10084903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th Conference on Cloud and Internet of Things (CIoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027290703","display_name":"Toni Dimitrovski","orcid":null},"institutions":[{"id":"https://openalex.org/I148297040","display_name":"Netherlands Organisation for Applied Scientific Research","ror":"https://ror.org/01bnjb948","country_code":"NL","type":"funder","lineage":["https://openalex.org/I148297040"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Toni Dimitrovski","raw_affiliation_strings":["TNO,Networks Department,The Hague,Netherlands","Networks Department, TNO, The Hague, Netherlands"],"affiliations":[{"raw_affiliation_string":"TNO,Networks Department,The Hague,Netherlands","institution_ids":["https://openalex.org/I148297040"]},{"raw_affiliation_string":"Networks Department, TNO, The Hague, Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049042991","display_name":"Tim Bergman","orcid":null},"institutions":[{"id":"https://openalex.org/I148297040","display_name":"Netherlands Organisation for Applied Scientific Research","ror":"https://ror.org/01bnjb948","country_code":"NL","type":"funder","lineage":["https://openalex.org/I148297040"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tim Bergman","raw_affiliation_strings":["TNO,Networks Department,The Hague,Netherlands","Networks Department, TNO, The Hague, Netherlands"],"affiliations":[{"raw_affiliation_string":"TNO,Networks Department,The Hague,Netherlands","institution_ids":["https://openalex.org/I148297040"]},{"raw_affiliation_string":"Networks Department, TNO, The Hague, Netherlands","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089207786","display_name":"Piotr \u017buraniewski","orcid":"https://orcid.org/0000-0001-6357-9548"},"institutions":[{"id":"https://openalex.org/I148297040","display_name":"Netherlands Organisation for Applied Scientific Research","ror":"https://ror.org/01bnjb948","country_code":"NL","type":"funder","lineage":["https://openalex.org/I148297040"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Piotr Zuraniewski","raw_affiliation_strings":["TNO,Networks Department,The Hague,Netherlands","Networks Department, TNO, The Hague, Netherlands"],"affiliations":[{"raw_affiliation_string":"TNO,Networks Department,The Hague,Netherlands","institution_ids":["https://openalex.org/I148297040"]},{"raw_affiliation_string":"Networks Department, TNO, The Hague, Netherlands","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027290703"],"corresponding_institution_ids":["https://openalex.org/I148297040"],"apc_list":null,"apc_paid":null,"fwci":0.1996,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.46627449,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"abs/1811.04383","issue":null,"first_page":"239","last_page":"246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.874204158782959},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8534683585166931},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7959511280059814},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7597048282623291},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7106339931488037},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6800670027732849},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.57973313331604},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5356250405311584},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.45551174879074097},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.4478326439857483},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4475303292274475},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4214385747909546},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3920290470123291},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30108344554901123},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17924430966377258},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.14356571435928345},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11299663782119751}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.874204158782959},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8534683585166931},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7959511280059814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7597048282623291},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7106339931488037},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6800670027732849},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.57973313331604},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5356250405311584},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.45551174879074097},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.4478326439857483},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4475303292274475},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4214385747909546},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3920290470123291},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30108344554901123},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17924430966377258},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.14356571435928345},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11299663782119751},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ciot57267.2023.10084903","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ciot57267.2023.10084903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 6th Conference on Cloud and Internet of Things (CIoT)","raw_type":"proceedings-article"},{"id":"pmh:oai:oai-pmh.tno.nl:55982","is_oa":false,"landing_page_url":"https://resolver.tno.nl/uuid:f68c4175-d3e6-4420-9698-d70eb21bd2c5","pdf_url":null,"source":{"id":"https://openalex.org/S7407055233","display_name":"TNO Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2066376969","https://openalex.org/W2617095022","https://openalex.org/W2733765803","https://openalex.org/W2761278203","https://openalex.org/W2899689262","https://openalex.org/W2963197901","https://openalex.org/W3042972862","https://openalex.org/W3158045938","https://openalex.org/W4210670677","https://openalex.org/W6756386628","https://openalex.org/W6781325773"],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W2166943775","https://openalex.org/W1903420481","https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W1522996108","https://openalex.org/W4285325964","https://openalex.org/W3160929777","https://openalex.org/W3172909833"],"abstract_inverted_index":{"The":[0,91],"use":[1,104,116],"of":[2,21,74,84,146],"Machine":[3],"Learning":[4],"in":[5,29,71,107,142],"many":[6],"control":[7],"and":[8,25,95,103,111,149,162],"management":[9,20],"processes":[10],"is":[11,15,39,50,93],"rising":[12],"fast.":[13],"This":[14],"especially":[16,46],"true":[17],"for":[18,26,139],"the":[19,48,72,109,117,122,134,143,150,167],"cloud":[22,75,168],"native":[23],"applications":[24],"anomaly":[27],"detection":[28],"cyber-security":[30],"mechanisms.":[31],"However,":[32],"it":[33],"has":[34],"been":[35],"shown":[36],"that":[37],"ML":[38,54,88],"an":[40,137],"attack":[41,49],"surface":[42],"on":[43,166],"its":[44],"own,":[45],"when":[47],"performed":[51],"by":[52],"another":[53],"system.":[55],"Noting":[56],"this":[57,160],"issue,":[58],"we":[59],"develop":[60],"a":[61,131,153],"testbed":[62],"infrastructure":[63,92],"with":[64,87],"Infrastructure-as-Code":[65],"principles,":[66],"designed":[67],"to":[68,78,100,158],"support":[69,97],"research":[70],"area":[73],"services":[76],"vulnerability":[77],"massive":[79],"attacks":[80],"from":[81,130],"unsecure":[82],"Internet":[83],"Things":[85],"botnets":[86,102],"devised":[89],"strategies.":[90],"modular":[94],"can":[96],"different":[98,105],"malware":[99],"create":[101],"algorithms":[106],"both":[108],"defensive":[110],"offensive":[112],"sides,":[113],"provided":[114],"they":[115],"available":[118],"data":[119,123],"or":[120],"extend":[121],"collection.":[124],"We":[125],"also":[126],"present":[127],"some":[128],"results":[129],"scenario":[132],"where":[133],"defense":[135,161],"uses":[136,152],"autoencoder":[138],"detecting":[140],"anomalies":[141],"traffic":[144],"patterns":[145],"IoT":[147],"devices":[148],"attacker":[151],"Contextual":[154],"MultiArmed":[155],"Bandit":[156],"algorithm":[157],"penetrate":[159],"induce":[163],"resource":[164],"waste":[165],"service":[169],"behind":[170],"it.":[171]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
