{"id":"https://openalex.org/W4413008023","doi":"https://doi.org/10.1186/s13677-025-00749-6","title":"A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks","display_name":"A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks","publication_year":2025,"publication_date":"2025-08-06","ids":{"openalex":"https://openalex.org/W4413008023","doi":"https://doi.org/10.1186/s13677-025-00749-6"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00749-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00749-6","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00749-6","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00749-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048614307","display_name":"Yu\u2010Fang Chen","orcid":"https://orcid.org/0000-0003-2872-0336"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yu-Fang Chen","raw_affiliation_strings":["Department of Information Management, National Taiwan University, Taipei, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taiwan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109123290","display_name":"Frank Yeong\u2010Sung Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Frank Yeong-Sung Lin","raw_affiliation_strings":["Department of Information Management, National Taiwan University, Taipei, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taiwan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088963953","display_name":"Kuang-Yen Tai","orcid":"https://orcid.org/0000-0003-1778-8896"},"institutions":[{"id":"https://openalex.org/I185940356","display_name":"Soochow University","ror":"https://ror.org/05kvm7n82","country_code":"TW","type":"education","lineage":["https://openalex.org/I185940356"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Kuang-Yen Tai","raw_affiliation_strings":["Department of Computer Science and Information Management, Soochow University, Taipei, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Management, Soochow University, Taipei, Taiwan","institution_ids":["https://openalex.org/I185940356"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045704694","display_name":"Chiu\u2010Han Hsiao","orcid":"https://orcid.org/0000-0002-8475-7400"},"institutions":[{"id":"https://openalex.org/I4210086894","display_name":"Research Center for Information Technology Innovation, Academia Sinica","ror":"https://ror.org/000zgvm20","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210086894","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chiu-Han Hsiao","raw_affiliation_strings":["Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan","institution_ids":["https://openalex.org/I4210086894"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wei-Hsin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wei-Hsin Wang","raw_affiliation_strings":["Department of Information Management, National Taiwan University, Taipei, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taiwan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101045539","display_name":"Ming-Chi Tsai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210086894","display_name":"Research Center for Information Technology Innovation, Academia Sinica","ror":"https://ror.org/000zgvm20","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210086894","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ming-Chi Tsai","raw_affiliation_strings":["Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan","institution_ids":["https://openalex.org/I4210086894"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003947062","display_name":"Tzu-Lung Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tzu-Lung Sun","raw_affiliation_strings":["Department of Information Management, National Taiwan University, Taipei, Taiwan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Taiwan University, Taipei, Taiwan","institution_ids":["https://openalex.org/I16733864"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5088963953"],"corresponding_institution_ids":["https://openalex.org/I185940356"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":2.78,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91723278,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7562695145606995},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.6123648881912231},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.590770423412323},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5723402500152588},{"id":"https://openalex.org/keywords/optimal-allocation","display_name":"Optimal allocation","score":0.5052540898323059},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.486366331577301},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3928840160369873},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.32618528604507446},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.1558762490749359},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07600229978561401},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.05241209268569946}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7562695145606995},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.6123648881912231},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.590770423412323},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5723402500152588},{"id":"https://openalex.org/C3020013979","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimal allocation","level":2,"score":0.5052540898323059},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.486366331577301},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3928840160369873},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.32618528604507446},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.1558762490749359},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07600229978561401},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.05241209268569946}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00749-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00749-6","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00749-6","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6d9ec4914ec342bc87e5fb000131d555","is_oa":true,"landing_page_url":"https://doaj.org/article/6d9ec4914ec342bc87e5fb000131d555","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 14, Iss 1, Pp 1-21 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00749-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00749-6","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00749-6","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321041","display_name":"Academia Sinica","ror":"https://ror.org/05bxb3784"},{"id":"https://openalex.org/F4320331164","display_name":"National Science and Technology Council","ror":"https://ror.org/00wnb9798"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413008023.pdf","grobid_xml":"https://content.openalex.org/works/W4413008023.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W2197538184","https://openalex.org/W2596760110","https://openalex.org/W2888560279","https://openalex.org/W2937446013","https://openalex.org/W2967136126","https://openalex.org/W2993353322","https://openalex.org/W2999919898","https://openalex.org/W3002783472","https://openalex.org/W3005779233","https://openalex.org/W3007368744","https://openalex.org/W3014556208","https://openalex.org/W3016198673","https://openalex.org/W3020610382","https://openalex.org/W3025899234","https://openalex.org/W3065783609","https://openalex.org/W3122398868","https://openalex.org/W3129780405","https://openalex.org/W3135360585","https://openalex.org/W3138773454","https://openalex.org/W3160423723","https://openalex.org/W3164559343","https://openalex.org/W3204976923","https://openalex.org/W3213880983","https://openalex.org/W4206004758","https://openalex.org/W4206408922","https://openalex.org/W4210654990","https://openalex.org/W4220722089","https://openalex.org/W4229034842","https://openalex.org/W4229045001","https://openalex.org/W4281865134","https://openalex.org/W4306697656","https://openalex.org/W4323355853","https://openalex.org/W4327662957","https://openalex.org/W4381332160","https://openalex.org/W4385626652","https://openalex.org/W4386159312","https://openalex.org/W4386231202","https://openalex.org/W4386413518","https://openalex.org/W4387428659","https://openalex.org/W4388757606","https://openalex.org/W4389549215","https://openalex.org/W4393035841","https://openalex.org/W4393380739","https://openalex.org/W4395677213","https://openalex.org/W4399689327","https://openalex.org/W4400911260","https://openalex.org/W4401584475","https://openalex.org/W4403124305","https://openalex.org/W4404030733"],"related_works":["https://openalex.org/W2080802605","https://openalex.org/W3133864837","https://openalex.org/W2364828369","https://openalex.org/W2376125997","https://openalex.org/W2366787476","https://openalex.org/W4292606895","https://openalex.org/W2371461469","https://openalex.org/W1968403428","https://openalex.org/W2057542959","https://openalex.org/W2372161071"],"abstract_inverted_index":{"Abstract":[0],"The":[1,64,99,145],"cloud":[2,61,143,155],"industry":[3],"has":[4],"evolved":[5],"significantly,":[6],"driven":[7],"by":[8,116,128],"advancements":[9],"in":[10,60],"network":[11],"infrastructure":[12],"and":[13,73,96,124,141,151,165],"business":[14],"applications.":[15],"However,":[16],"security":[17,123],"concerns,":[18],"especially":[19],"attack-defense":[20],"scenarios":[21],"related":[22],"to":[23,38,51,86,138,161],"hacker":[24,57],"computing":[25,58,62],"attacks,":[26],"remain":[27],"a":[28,44,81,158],"critical":[29],"challenge.":[30],"Despite":[31],"existing":[32],"detection":[33],"systems,":[34],"sophisticated":[35],"attacks":[36,59,107],"continue":[37],"evade":[39],"identification.":[40],"This":[41,90],"study":[42],"presents":[43],"novel,":[45],"optimization-based":[46],"resource":[47,111,126],"allocation":[48],"strategy":[49],"designed":[50],"mitigate":[52],"the":[53,75],"worst-case":[54],"impacts":[55],"of":[56,122,148],"centers.":[63],"proposed":[65],"model":[66,100],"integrates":[67],"Virtual":[68],"Machine":[69],"(VM)":[70],"initiation":[71],"decisions":[72],"employs":[74],"Contest":[76],"Success":[77],"Function":[78],"(CSF)":[79],"within":[80],"two-player":[82],"max\u2013min":[83],"game":[84],"framework":[85],"dynamically":[87],"allocate":[88],"resources.":[89],"approach":[91],"effectively":[92],"balances":[93],"security,":[94,164],"cost,":[95],"service":[97,156],"quality.":[98],"not":[101],"only":[102],"enhances":[103],"defense":[104],"mechanisms":[105],"against":[106],"but":[108],"also":[109],"optimizes":[110],"utilization,":[112],"reducing":[113],"operational":[114],"costs":[115],"25%":[117],"while":[118],"maintaining":[119],"high":[120],"levels":[121],"improving":[125],"efficiency":[127],"30%.":[129],"Its":[130],"dual-solution":[131],"methodology":[132],"ensures":[133],"scalability,":[134],"making":[135],"it":[136],"applicable":[137],"both":[139],"small":[140],"large-scale":[142],"environments.":[144],"innovative":[146],"integration":[147],"economic":[149],"theory":[150],"multi-objective":[152],"optimization":[153],"offers":[154],"providers":[157],"powerful":[159],"tool":[160],"enhance":[162],"reliability,":[163],"cost-effectiveness.":[166]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
